Analysis
-
max time kernel
202s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe
Resource
win10v2004-20220901-en
General
-
Target
91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe
-
Size
228KB
-
MD5
5021ef0c9c65af0491a00a3130961ffc
-
SHA1
af030c3889becff129f5d53535d8d18fe67a8954
-
SHA256
91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda
-
SHA512
fd7d2c4067f066cdf7a3c5ec0cab578de5411971c1f9345a2ec907a72cd86202f132316f9ab474089c6112436e9647e00e520598c93bb12170a8034755d04fae
-
SSDEEP
6144:ecb5aqoJvgP0+s/wWr8foO4bAdP0EAlXmbD3l6w:ecNPodgP0+s/wWr8foO4bAdP0EAG6w
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sailu.exe -
Executes dropped EXE 1 IoCs
pid Process 960 sailu.exe -
Loads dropped DLL 2 IoCs
pid Process 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /U" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /e" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /P" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /S" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /J" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /M" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /G" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /A" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /L" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /D" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /d" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /d" 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /I" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /r" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /Z" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /Q" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /v" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /u" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /b" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /F" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /q" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /o" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /a" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /i" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /R" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /c" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /x" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /N" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /C" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /X" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /W" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /l" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /z" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /j" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /E" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /p" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /h" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /H" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /y" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /f" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /n" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /m" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /s" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /T" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /V" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /t" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /Y" sailu.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /k" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /w" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /g" sailu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\sailu = "C:\\Users\\Admin\\sailu.exe /B" sailu.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe 960 sailu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 960 sailu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 960 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 27 PID 1776 wrote to memory of 960 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 27 PID 1776 wrote to memory of 960 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 27 PID 1776 wrote to memory of 960 1776 91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe"C:\Users\Admin\AppData\Local\Temp\91104fd28b55b4f8b0acf93b35be077b6d57a464ba039701dac487814f727fda.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\sailu.exe"C:\Users\Admin\sailu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD590543571b6cdd6298c723cd1e8508a96
SHA1b6de31115c81bce2f710e6106ddebfb517b442ed
SHA256392cfff9fe9abfb075ad6cd080d25dbc4dad12dcad85dd10fffc573da61498e1
SHA5125a669d3696ffed7adafac77b69ea7ad75e28dd293392232baa919839d9b3ec5c66aa3f1071adb22d3212fac21b5d15d05a80a04fed0014f69ac7c7e25818d345
-
Filesize
228KB
MD590543571b6cdd6298c723cd1e8508a96
SHA1b6de31115c81bce2f710e6106ddebfb517b442ed
SHA256392cfff9fe9abfb075ad6cd080d25dbc4dad12dcad85dd10fffc573da61498e1
SHA5125a669d3696ffed7adafac77b69ea7ad75e28dd293392232baa919839d9b3ec5c66aa3f1071adb22d3212fac21b5d15d05a80a04fed0014f69ac7c7e25818d345
-
Filesize
228KB
MD590543571b6cdd6298c723cd1e8508a96
SHA1b6de31115c81bce2f710e6106ddebfb517b442ed
SHA256392cfff9fe9abfb075ad6cd080d25dbc4dad12dcad85dd10fffc573da61498e1
SHA5125a669d3696ffed7adafac77b69ea7ad75e28dd293392232baa919839d9b3ec5c66aa3f1071adb22d3212fac21b5d15d05a80a04fed0014f69ac7c7e25818d345
-
Filesize
228KB
MD590543571b6cdd6298c723cd1e8508a96
SHA1b6de31115c81bce2f710e6106ddebfb517b442ed
SHA256392cfff9fe9abfb075ad6cd080d25dbc4dad12dcad85dd10fffc573da61498e1
SHA5125a669d3696ffed7adafac77b69ea7ad75e28dd293392232baa919839d9b3ec5c66aa3f1071adb22d3212fac21b5d15d05a80a04fed0014f69ac7c7e25818d345