Analysis
-
max time kernel
157s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe
Resource
win10v2004-20221111-en
General
-
Target
f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe
-
Size
228KB
-
MD5
f6c420a320965df5f7e766a73ede8934
-
SHA1
fae37b05788130bf67c7914e6c6626d9f0171385
-
SHA256
f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710
-
SHA512
afff016368be5e1d6e969c031eeb4a9faaa6876c909212e9cd5ee61370f30a10839ad917dc48773611342490f2060f3ea248366b2b63d0dcc4a0864b4a34d24c
-
SSDEEP
3072:eD64wfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MCa3FqTcWEyxeL2mDHLz/5L5DEr0:46zepp3PJXCOGY3eJ3FRFyMdL5DEr6Uq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" diyam.exe -
Executes dropped EXE 1 IoCs
pid Process 552 diyam.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /o" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /w" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /k" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /u" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /i" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /h" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /q" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /a" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /c" f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /v" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /z" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /b" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /l" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /m" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /d" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /r" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /j" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /f" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /s" diyam.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /x" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /c" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /g" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /y" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /e" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /p" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /n" diyam.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\diyam = "C:\\Users\\Admin\\diyam.exe /t" diyam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe 552 diyam.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 552 diyam.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 552 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 27 PID 2024 wrote to memory of 552 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 27 PID 2024 wrote to memory of 552 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 27 PID 2024 wrote to memory of 552 2024 f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe"C:\Users\Admin\AppData\Local\Temp\f95f65b4c42878fafc814f5eb1e62af3fe32cafbad6454b6d25743514b00c710.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\diyam.exe"C:\Users\Admin\diyam.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:552
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5e0b8f62ccd80ed4c0ab06b05d04cb90b
SHA13e40b345e5eb26abc0ab679b1ef940c6c8445b08
SHA2562666b00570feaec2e26f4aadb2e8cc32fa7b1157b3896337f131446048248bed
SHA5129aed959ec439c6d236cafa098f2c7c64e690b99d26f0902c0a78defe6bf712f0b8e257e78691065cbff14365a959cd1ab32f1a9c582ddf9bd908b6736eb6acd5
-
Filesize
228KB
MD5e0b8f62ccd80ed4c0ab06b05d04cb90b
SHA13e40b345e5eb26abc0ab679b1ef940c6c8445b08
SHA2562666b00570feaec2e26f4aadb2e8cc32fa7b1157b3896337f131446048248bed
SHA5129aed959ec439c6d236cafa098f2c7c64e690b99d26f0902c0a78defe6bf712f0b8e257e78691065cbff14365a959cd1ab32f1a9c582ddf9bd908b6736eb6acd5
-
Filesize
228KB
MD5e0b8f62ccd80ed4c0ab06b05d04cb90b
SHA13e40b345e5eb26abc0ab679b1ef940c6c8445b08
SHA2562666b00570feaec2e26f4aadb2e8cc32fa7b1157b3896337f131446048248bed
SHA5129aed959ec439c6d236cafa098f2c7c64e690b99d26f0902c0a78defe6bf712f0b8e257e78691065cbff14365a959cd1ab32f1a9c582ddf9bd908b6736eb6acd5
-
Filesize
228KB
MD5e0b8f62ccd80ed4c0ab06b05d04cb90b
SHA13e40b345e5eb26abc0ab679b1ef940c6c8445b08
SHA2562666b00570feaec2e26f4aadb2e8cc32fa7b1157b3896337f131446048248bed
SHA5129aed959ec439c6d236cafa098f2c7c64e690b99d26f0902c0a78defe6bf712f0b8e257e78691065cbff14365a959cd1ab32f1a9c582ddf9bd908b6736eb6acd5