Analysis
-
max time kernel
207s -
max time network
214s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe
Resource
win10v2004-20221111-en
General
-
Target
b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe
-
Size
232KB
-
MD5
78d104714b78cca381f3927964cf938a
-
SHA1
ce149aa1486815a1215fd6592cb9e4f9da221094
-
SHA256
b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216
-
SHA512
aa4c0d33509c393869f61db90f4a2cd2e566e747f9babfe651ed2b176d6b6e561d32a45bdb4111dce28a3d3bb1e03682b86542582db9e537732baf9f70b3b2f5
-
SSDEEP
3072:MpMeBchnYwN1Smm727IJCkvIwXX4Ph0ApMX3KKl+Hv/91I/2XOlDaE:MpPBcdYwN1S327Y54Ph0TX1kd18COP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaiko.exe -
Executes dropped EXE 1 IoCs
pid Process 3084 jaiko.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /w" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /l" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /T" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /A" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /P" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /F" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /p" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /q" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /W" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /i" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /B" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /k" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /z" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /S" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /D" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /y" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /t" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /m" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /u" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /a" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /L" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /J" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /V" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /C" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /U" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /I" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /g" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /X" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /j" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /f" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /h" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /Q" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /R" jaiko.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /H" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /Y" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /r" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /G" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /v" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /d" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /E" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /n" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /O" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /e" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /c" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /M" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /K" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /o" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /N" jaiko.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jaiko = "C:\\Users\\Admin\\jaiko.exe /k" b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jaiko.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe 3084 jaiko.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 3084 jaiko.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 3084 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 85 PID 956 wrote to memory of 3084 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 85 PID 956 wrote to memory of 3084 956 b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe"C:\Users\Admin\AppData\Local\Temp\b3e0309a3f7238b44a3af4407fa710c0892726af19084c22688d7f2b9c958216.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\jaiko.exe"C:\Users\Admin\jaiko.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD55af2862824d03b52bd3d08119f0d6c74
SHA1c53a465633f98602a42d59ad1d1ad51fd632c440
SHA25689926c2214c5f8d077c466bc1bf6738c69c134239c0f24a3224e46d2b47cbe41
SHA5123bba92069ea71e111ae67fc3f821d21d89b6992eaa0e6039cf5e0867102a383c88340559a9d736719baec7ebf26a11bc0d46d8b6f4046f5481cba45a453a79f3
-
Filesize
232KB
MD55af2862824d03b52bd3d08119f0d6c74
SHA1c53a465633f98602a42d59ad1d1ad51fd632c440
SHA25689926c2214c5f8d077c466bc1bf6738c69c134239c0f24a3224e46d2b47cbe41
SHA5123bba92069ea71e111ae67fc3f821d21d89b6992eaa0e6039cf5e0867102a383c88340559a9d736719baec7ebf26a11bc0d46d8b6f4046f5481cba45a453a79f3