Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe
Resource
win10v2004-20220901-en
General
-
Target
54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe
-
Size
212KB
-
MD5
3e1ddce5de2382ada2af8964a99bd58f
-
SHA1
e528ea8594bcae16325cfbf8897dc009ab2a38d7
-
SHA256
54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625
-
SHA512
18c7ca1337e00c05e137b600db84c527537ee6cae524b66a83ad0fe26dba43039419cfd0d74facb3cfca85a0a73613c74f3a3ede835b8e4725ce80393d63588c
-
SSDEEP
6144:i9AKwwPYiczY09umHh7K5cUXEBwrYVHhAgY65cJ:OAbyYxY09umH45cUXEBwUVHhAgY65u
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roosiah.exe -
Executes dropped EXE 1 IoCs
pid Process 3188 roosiah.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe -
Adds Run key to start application 2 TTPs 58 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /m" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /y" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /s" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /q" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /c" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /z" roosiah.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /b" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /x" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /i" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /s" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /e" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /h" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /r" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /k" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /x" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /g" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /k" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /j" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /o" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /e" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /b" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /p" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /w" roosiah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /h" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /d" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /u" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /l" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /n" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /r" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /y" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /t" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /t" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /q" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /i" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /a" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /n" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /z" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /o" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /a" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /j" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /v" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /c" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /d" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /p" roosiah.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /m" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /v" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /f" roosiah.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /l" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /u" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /z" 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /d" 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /f" roosiah.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /w" roosiah.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roosiah = "C:\\Users\\Admin\\roosiah.exe /g" roosiah.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe 3188 roosiah.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3188 roosiah.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 3188 roosiah.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 644 wrote to memory of 3188 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 80 PID 644 wrote to memory of 3188 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 80 PID 644 wrote to memory of 3188 644 54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe"C:\Users\Admin\AppData\Local\Temp\54378d681d1c4aa4f031a368a2d37eb4d120f21a435100ef6d93dc5fb7c62625.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\roosiah.exe"C:\Users\Admin\roosiah.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3188
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD548700dd2a328aeb33c9ea2317592054f
SHA17389b16aa1473c2313cb40a7b0b1b99df452ca17
SHA2567e22a4ddc716450399ed012bcfe033221ccdb3f4b1f3bcc7dd5cd5cf3a6fec71
SHA51295827f8c606d6fe20e76f42198e52cf73d34e2d470e29e18b0b4a774f983ac93309a9ce2c4f83b4d41608e722fd16ff5e7a724d8b2ef084998e692e79b282b3a
-
Filesize
212KB
MD548700dd2a328aeb33c9ea2317592054f
SHA17389b16aa1473c2313cb40a7b0b1b99df452ca17
SHA2567e22a4ddc716450399ed012bcfe033221ccdb3f4b1f3bcc7dd5cd5cf3a6fec71
SHA51295827f8c606d6fe20e76f42198e52cf73d34e2d470e29e18b0b4a774f983ac93309a9ce2c4f83b4d41608e722fd16ff5e7a724d8b2ef084998e692e79b282b3a