Analysis
-
max time kernel
152s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 08:30
Static task
static1
Behavioral task
behavioral1
Sample
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
Resource
win10v2004-20220812-en
General
-
Target
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe
-
Size
256KB
-
MD5
2689ae1d29f424425270ce563b5bc725
-
SHA1
966db0527364b87d94bcc2d6c6b42ec08531e7d0
-
SHA256
a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520
-
SHA512
07403bdf801e3aaede66c56fca816faef249cd7e22fb173660fcda763495ed98c74c3b142d3ec131590f5ea4f0fc8313bf95b0b340f1da811d57fd6f9db79e32
-
SSDEEP
3072:gcnPoBqY+1kIJG/rhwow1wGQWDxy97g86X6dvYjoNWF1Wv0df+0jR57tn7:rPoBdfdKIWy7oENgWqxR57tn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teoof.exe -
Executes dropped EXE 1 IoCs
pid Process 5080 teoof.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /G" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /e" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /d" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /j" teoof.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /z" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /P" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /C" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /v" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /c" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /q" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /L" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /n" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /o" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /b" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /F" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /A" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /S" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /f" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /t" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /K" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /R" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /W" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /Y" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /Z" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /J" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /g" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /Q" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /M" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /k" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /m" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /H" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /h" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /D" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /U" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /s" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /r" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /u" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /x" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /l" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /O" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /N" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /X" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /i" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /B" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /V" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /I" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /w" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /E" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /a" teoof.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teoof = "C:\\Users\\Admin\\teoof.exe /T" teoof.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe 5080 teoof.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3996 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 5080 teoof.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 5080 3996 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 80 PID 3996 wrote to memory of 5080 3996 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 80 PID 3996 wrote to memory of 5080 3996 a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe 80 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79 PID 5080 wrote to memory of 3996 5080 teoof.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe"C:\Users\Admin\AppData\Local\Temp\a4b0296526c8fde8a88fe8659a2971dc0ff862841cb912ad4498c57396a5a520.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\teoof.exe"C:\Users\Admin\teoof.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD52fd7c3b715301d64b5dec8b925b73b74
SHA12d4292972b04b325966141eb5dae4562b173ae86
SHA256dba9e3cc4866b8791c3d964e0fda51e1d3a898d956693fa124aefb14cdc2b92a
SHA512a315ad478e3452ad879a73327d64dfc6c2c40f679ed728efdd6428e78dd39b71085f24e1af66788c3890587eb1bbbe98f1d5845927fc3799ea774a5edc14c394
-
Filesize
256KB
MD52fd7c3b715301d64b5dec8b925b73b74
SHA12d4292972b04b325966141eb5dae4562b173ae86
SHA256dba9e3cc4866b8791c3d964e0fda51e1d3a898d956693fa124aefb14cdc2b92a
SHA512a315ad478e3452ad879a73327d64dfc6c2c40f679ed728efdd6428e78dd39b71085f24e1af66788c3890587eb1bbbe98f1d5845927fc3799ea774a5edc14c394