Analysis
-
max time kernel
174s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
Resource
win10v2004-20220812-en
General
-
Target
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe
-
Size
156KB
-
MD5
b71556d10a83e5cf5465c24f2f6ea227
-
SHA1
a7afd982790a3a83d1810895af1d8e2f5045890b
-
SHA256
a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048
-
SHA512
e01b13410e695dc9b5278513dde8dd61a41156eb584f31e449f745c5d66d32f87b17e0a77a03531d5a58a969e8a6dad0845b188cc4885f7931da6c17c17ca2b3
-
SSDEEP
1536:MGan4ngzp0B8yNuRe305Xrud5N9jRMmBUKH7zD87/u+JcBqVbv1BsbhbEle+RReZ:iogexufubFKVXcBqB1BGSjNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wione.exe -
Executes dropped EXE 1 IoCs
pid Process 588 wione.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /d" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /e" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /i" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /z" wione.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /l" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /c" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /t" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /y" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /u" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /h" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /g" a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /b" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /v" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /m" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /n" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /x" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /p" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /j" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /s" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /w" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /o" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /r" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /a" wione.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /q" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /f" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /g" wione.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\wione = "C:\\Users\\Admin\\wione.exe /k" wione.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe 588 wione.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 588 wione.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 588 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 28 PID 2032 wrote to memory of 588 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 28 PID 2032 wrote to memory of 588 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 28 PID 2032 wrote to memory of 588 2032 a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe"C:\Users\Admin\AppData\Local\Temp\a25b0302ea5ad28f61a2af8d4deb4f9638fe1570052eee191fdd695da7fc0048.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\wione.exe"C:\Users\Admin\wione.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:588
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5335ad93a580a023f3f92af6557f4a240
SHA1e40c86117db7a420ab9085aa845f2b681d96482b
SHA256f0a6139d857d0f8d031296d7e24de97361e3b6ac9fa28361692780548d02a042
SHA512c3d9be31c23ed12a5eae9bb33970809b1a49a8b44aadfc251ca1f637cce53b184e1bd115e2481b80da484e63d486ade4332f4aed7ca8ca38411e9769c29e08ca
-
Filesize
156KB
MD5335ad93a580a023f3f92af6557f4a240
SHA1e40c86117db7a420ab9085aa845f2b681d96482b
SHA256f0a6139d857d0f8d031296d7e24de97361e3b6ac9fa28361692780548d02a042
SHA512c3d9be31c23ed12a5eae9bb33970809b1a49a8b44aadfc251ca1f637cce53b184e1bd115e2481b80da484e63d486ade4332f4aed7ca8ca38411e9769c29e08ca
-
Filesize
156KB
MD5335ad93a580a023f3f92af6557f4a240
SHA1e40c86117db7a420ab9085aa845f2b681d96482b
SHA256f0a6139d857d0f8d031296d7e24de97361e3b6ac9fa28361692780548d02a042
SHA512c3d9be31c23ed12a5eae9bb33970809b1a49a8b44aadfc251ca1f637cce53b184e1bd115e2481b80da484e63d486ade4332f4aed7ca8ca38411e9769c29e08ca
-
Filesize
156KB
MD5335ad93a580a023f3f92af6557f4a240
SHA1e40c86117db7a420ab9085aa845f2b681d96482b
SHA256f0a6139d857d0f8d031296d7e24de97361e3b6ac9fa28361692780548d02a042
SHA512c3d9be31c23ed12a5eae9bb33970809b1a49a8b44aadfc251ca1f637cce53b184e1bd115e2481b80da484e63d486ade4332f4aed7ca8ca38411e9769c29e08ca