Analysis
-
max time kernel
190s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 19:19
Static task
static1
Behavioral task
behavioral1
Sample
f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe
Resource
win10v2004-20221111-en
General
-
Target
f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe
-
Size
212KB
-
MD5
28b4e4e0d4b0bb110207c6ec4cdc83dc
-
SHA1
e1e75d8f23f0503734bcffc5107883833343cce5
-
SHA256
f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83
-
SHA512
14f9f48644b1b5108bf06095bb524c290c390f075bdd36eeba4bf438ec987448907b6af72fc48546fb2130c8c4370f371316481fb4c6ac4c0fcf9cceaafbc3cc
-
SSDEEP
6144:i9AKwwPyiczY09umHh7K5cUXEBwrYVHhAgY65cJ:uAbyyxY09umH45cUXEBwUVHhAgY65u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rklir.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe -
Executes dropped EXE 1 IoCs
pid Process 116 rklir.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /f" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /g" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /b" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /p" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /t" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /t" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /x" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /i" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /g" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /a" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /k" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /j" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /d" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /r" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /q" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /c" rklir.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /b" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /v" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /f" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /e" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /q" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /n" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /u" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /p" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /z" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /l" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /o" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /z" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /r" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /q" f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /y" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /x" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /d" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /o" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /s" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /i" rklir.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /h" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /v" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /n" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /m" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /e" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /u" f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /h" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /y" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /c" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /w" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /u" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /w" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /j" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /l" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /m" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /s" rklir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /k" rklir.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rklir = "C:\\Users\\Admin\\rklir.exe /a" rklir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe 116 rklir.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 116 rklir.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 116 rklir.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1228 wrote to memory of 116 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 83 PID 1228 wrote to memory of 116 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 83 PID 1228 wrote to memory of 116 1228 f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe"C:\Users\Admin\AppData\Local\Temp\f3f4838af694c2b7f10f39a36636566b4a7d82e7f887bffa9bd146739a1baf83.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\rklir.exe"C:\Users\Admin\rklir.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:116
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5e89f3957593363f462048a43b870db1b
SHA1e923d20893bdc4c51b68251f630aa9b4cb3a00f8
SHA256cc355adb09339e47f00ec064fbcd7e40fd105010fbad5c67905a5130a96065ca
SHA5120e40486c3909fdb7617ef8dc8aba3856e5109d587cc561aa9b2c2cb83b7444663c8f3e3a79502f52331cac5c071fa8c73a04b5a37b49f6340c2b1292077ca6d8
-
Filesize
212KB
MD5e89f3957593363f462048a43b870db1b
SHA1e923d20893bdc4c51b68251f630aa9b4cb3a00f8
SHA256cc355adb09339e47f00ec064fbcd7e40fd105010fbad5c67905a5130a96065ca
SHA5120e40486c3909fdb7617ef8dc8aba3856e5109d587cc561aa9b2c2cb83b7444663c8f3e3a79502f52331cac5c071fa8c73a04b5a37b49f6340c2b1292077ca6d8