Analysis
-
max time kernel
154s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe
Resource
win10v2004-20220812-en
General
-
Target
e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe
-
Size
88KB
-
MD5
9798ed23628b86dbf1eccb8f4cd96c8f
-
SHA1
afba089cde1ecf6b2f1df164a976418d67b7fb94
-
SHA256
e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32
-
SHA512
c304ba9829f5b6af0cbe146d77b2f7c4c2c6d346db538de8dd33702d8aa8e77aa3806194d7eea7daa0eed15a0c98bcb5e8c07be7093d504acc1e002bec59c336
-
SSDEEP
768:v26jxOJETcmioIHpFeh6RM1rA8dOsk7jbqqRkA5okK1Dfsvu+Yh9o1XjLftmz:v2cx/AmiHLFUnzJA5o9BfIu+I+XjLlm
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haaiw.exe -
Executes dropped EXE 1 IoCs
pid Process 1112 haaiw.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /n" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /e" haaiw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /i" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /q" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /p" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /z" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /m" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /y" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /t" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /w" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /r" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /k" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /h" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /b" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /o" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /x" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /g" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /c" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /a" e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /u" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /s" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /d" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /j" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /f" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /v" haaiw.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /a" haaiw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\haaiw = "C:\\Users\\Admin\\haaiw.exe /l" haaiw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe 1112 haaiw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 1112 haaiw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1112 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 28 PID 1848 wrote to memory of 1112 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 28 PID 1848 wrote to memory of 1112 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 28 PID 1848 wrote to memory of 1112 1848 e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe"C:\Users\Admin\AppData\Local\Temp\e323259fc4f23928bcc4a97c05eea4267ca8261fd1ccce44dd8c0989039fdf32.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\haaiw.exe"C:\Users\Admin\haaiw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD55aa75587712a23c1d820b66a07f35fb8
SHA1ebeac094314867b1b7c0eb9a388beafc3c7b016a
SHA2563b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd
SHA51246ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3
-
Filesize
88KB
MD55aa75587712a23c1d820b66a07f35fb8
SHA1ebeac094314867b1b7c0eb9a388beafc3c7b016a
SHA2563b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd
SHA51246ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3
-
Filesize
88KB
MD55aa75587712a23c1d820b66a07f35fb8
SHA1ebeac094314867b1b7c0eb9a388beafc3c7b016a
SHA2563b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd
SHA51246ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3
-
Filesize
88KB
MD55aa75587712a23c1d820b66a07f35fb8
SHA1ebeac094314867b1b7c0eb9a388beafc3c7b016a
SHA2563b11b6e816ba33080572f1698596185c46f6b13ef1aa6b4a81057921ca3648fd
SHA51246ce817455d281b9b202b2a82ddbfb3c1cbcd03e36b58173a38895c0866979fe78d78edf81caedd2011f94f03844d9635f87e5dc341c9969e676e611d7ed94f3