Analysis
-
max time kernel
151s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe
Resource
win10v2004-20220812-en
General
-
Target
245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe
-
Size
156KB
-
MD5
e69e4db4459b30fcaa2bcabd707cc948
-
SHA1
aba85fd52a9f133e88064834ea56251c94594aed
-
SHA256
245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1
-
SHA512
b656d1d406c1f7377266215bc2ccc82b0e1884bfe5c2f756a73e748c31073dd64ea7f65395aba5730501d40f5498d3df87dff66cbaa1e2539fdc8d7e7d9de585
-
SSDEEP
3072:KANPhL3DsZtSxch3Z1C5GbWyleXkbxy6cg48Al4oQZiE7k:FPh3sZ5b1OGbU0NByXWq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jeoxoig.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 jeoxoig.exe -
Loads dropped DLL 2 IoCs
pid Process 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /Q" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /d" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /F" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /z" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /c" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /q" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /K" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /b" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /h" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /Y" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /M" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /S" jeoxoig.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /k" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /g" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /w" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /P" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /E" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /v" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /e" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /j" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /L" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /O" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /G" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /y" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /e" 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /T" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /u" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /Z" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /X" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /D" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /m" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /t" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /C" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /n" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /I" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /N" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /s" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /l" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /H" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /R" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /p" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /W" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /U" jeoxoig.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /f" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /o" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /B" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /J" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /i" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /V" jeoxoig.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\jeoxoig = "C:\\Users\\Admin\\jeoxoig.exe /A" jeoxoig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe 2020 jeoxoig.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 2020 jeoxoig.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 784 wrote to memory of 2020 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 26 PID 784 wrote to memory of 2020 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 26 PID 784 wrote to memory of 2020 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 26 PID 784 wrote to memory of 2020 784 245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe"C:\Users\Admin\AppData\Local\Temp\245cb7150829d114b8e69d2fa66e7c99c80d4acbcfc2a7c637797a824fd799b1.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\jeoxoig.exe"C:\Users\Admin\jeoxoig.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5473763c96723cda2a305fe47d8f1dbcf
SHA13f9c212486a32500002f2dbf48a6784cc302ae4e
SHA256fe244a443437b72ae5468a9f57dc32ee988ac6db8c8bb2e0b7f2f9a44be657ec
SHA51288ce6f99208c2147dee9b05884a26aba0d4de921f5badec426d8daac9960ed03b2e9773cf9ebb19c28dae4258341f403493f632c5f6ffbadeb0df3b750cd62ad
-
Filesize
156KB
MD5473763c96723cda2a305fe47d8f1dbcf
SHA13f9c212486a32500002f2dbf48a6784cc302ae4e
SHA256fe244a443437b72ae5468a9f57dc32ee988ac6db8c8bb2e0b7f2f9a44be657ec
SHA51288ce6f99208c2147dee9b05884a26aba0d4de921f5badec426d8daac9960ed03b2e9773cf9ebb19c28dae4258341f403493f632c5f6ffbadeb0df3b750cd62ad
-
Filesize
156KB
MD5473763c96723cda2a305fe47d8f1dbcf
SHA13f9c212486a32500002f2dbf48a6784cc302ae4e
SHA256fe244a443437b72ae5468a9f57dc32ee988ac6db8c8bb2e0b7f2f9a44be657ec
SHA51288ce6f99208c2147dee9b05884a26aba0d4de921f5badec426d8daac9960ed03b2e9773cf9ebb19c28dae4258341f403493f632c5f6ffbadeb0df3b750cd62ad
-
Filesize
156KB
MD5473763c96723cda2a305fe47d8f1dbcf
SHA13f9c212486a32500002f2dbf48a6784cc302ae4e
SHA256fe244a443437b72ae5468a9f57dc32ee988ac6db8c8bb2e0b7f2f9a44be657ec
SHA51288ce6f99208c2147dee9b05884a26aba0d4de921f5badec426d8daac9960ed03b2e9773cf9ebb19c28dae4258341f403493f632c5f6ffbadeb0df3b750cd62ad