Analysis
-
max time kernel
156s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe
Resource
win10v2004-20220901-en
General
-
Target
fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe
-
Size
232KB
-
MD5
04cb165bc67f5892b2384fe3ec4efba9
-
SHA1
b3b00b43fe68e4b2c79a35aa7c4d06d84d64ed94
-
SHA256
fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5
-
SHA512
73ee3a1d50302ae889599671b57e2b6ea8ae12a0d89260072cd911d61837ec19b106d36f8b913f2da6ace5d84c87bbd39a8c1c21448595a7f320508e00cc74c8
-
SSDEEP
6144:+3PFKs7diixRSFBfWEqxF6snji81RUinK51jbkxkuXSx:sPhJuBXVbkxJXc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" loaodu.exe -
Executes dropped EXE 1 IoCs
pid Process 1168 loaodu.exe -
Loads dropped DLL 2 IoCs
pid Process 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe -
Adds Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /c" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /w" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /l" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /m" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /z" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /a" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /p" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /u" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /x" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /b" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /q" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /h" loaodu.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /i" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /f" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /y" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /v" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /g" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /e" fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /r" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /e" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /o" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /j" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /t" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /s" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /d" loaodu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\loaodu = "C:\\Users\\Admin\\loaodu.exe /k" loaodu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe 1168 loaodu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 1168 loaodu.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1168 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 28 PID 1104 wrote to memory of 1168 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 28 PID 1104 wrote to memory of 1168 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 28 PID 1104 wrote to memory of 1168 1104 fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe"C:\Users\Admin\AppData\Local\Temp\fde494f073ab5233a49a00f341a8aeca59d50d8b9fa24c76bb8148e6a1963ed5.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\loaodu.exe"C:\Users\Admin\loaodu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD57e101d3dc2f73f2381f64fabe7871431
SHA1fc8e828264d4ee445222582fa67cb7b906f9695e
SHA256e8f37974484732774eb3c2a0ede8bcbf621b41576b2adab103945c93bc2bbf0a
SHA512b3d98e664c4e63f1269b7d175f0c19c3059934636a5ea0fed1dcb64bef1f7e4db9a61653d0245cd0b628836ced40241d44bfff217abb5acc223a742028b336ad
-
Filesize
232KB
MD57e101d3dc2f73f2381f64fabe7871431
SHA1fc8e828264d4ee445222582fa67cb7b906f9695e
SHA256e8f37974484732774eb3c2a0ede8bcbf621b41576b2adab103945c93bc2bbf0a
SHA512b3d98e664c4e63f1269b7d175f0c19c3059934636a5ea0fed1dcb64bef1f7e4db9a61653d0245cd0b628836ced40241d44bfff217abb5acc223a742028b336ad
-
Filesize
232KB
MD57e101d3dc2f73f2381f64fabe7871431
SHA1fc8e828264d4ee445222582fa67cb7b906f9695e
SHA256e8f37974484732774eb3c2a0ede8bcbf621b41576b2adab103945c93bc2bbf0a
SHA512b3d98e664c4e63f1269b7d175f0c19c3059934636a5ea0fed1dcb64bef1f7e4db9a61653d0245cd0b628836ced40241d44bfff217abb5acc223a742028b336ad
-
Filesize
232KB
MD57e101d3dc2f73f2381f64fabe7871431
SHA1fc8e828264d4ee445222582fa67cb7b906f9695e
SHA256e8f37974484732774eb3c2a0ede8bcbf621b41576b2adab103945c93bc2bbf0a
SHA512b3d98e664c4e63f1269b7d175f0c19c3059934636a5ea0fed1dcb64bef1f7e4db9a61653d0245cd0b628836ced40241d44bfff217abb5acc223a742028b336ad