Analysis
-
max time kernel
151s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe
Resource
win10v2004-20221111-en
General
-
Target
a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe
-
Size
156KB
-
MD5
83ed53032add85071018f55ec6b626a6
-
SHA1
78be8df33ab8c52416a36edce045163176f3cf30
-
SHA256
a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7
-
SHA512
34ab4f5c5ea8610e9f3d401b71e1e4427f32523e95cdb2d840d20746ac4d0ad71ae7c20f6e715014eedc3a1be0074c0a9fcef7b352db86ebdc6ead5c82823a33
-
SSDEEP
3072:A0O2Paj5h3QKWXXWXG8FF7K+AmsgE5kEZZZy6x86dE5j4oQE:3ajX3QKKXWFFF7KlgaSJd1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" leuleol.exe -
Executes dropped EXE 1 IoCs
pid Process 632 leuleol.exe -
Loads dropped DLL 2 IoCs
pid Process 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /o" a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /s" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /h" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /j" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /i" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /U" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /R" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /w" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /D" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /K" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /d" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /Z" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /f" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /m" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /C" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /E" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /X" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /L" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /g" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /J" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /S" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /v" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /e" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /k" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /p" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /A" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /c" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /T" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /W" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /B" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /Q" leuleol.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /o" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /I" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /G" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /y" leuleol.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /t" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /a" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /P" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /V" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /H" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /x" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /b" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /r" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /n" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /q" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /O" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /Y" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /M" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /N" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /F" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /l" leuleol.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\leuleol = "C:\\Users\\Admin\\leuleol.exe /z" leuleol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe 632 leuleol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 632 leuleol.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 632 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 26 PID 1544 wrote to memory of 632 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 26 PID 1544 wrote to memory of 632 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 26 PID 1544 wrote to memory of 632 1544 a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe"C:\Users\Admin\AppData\Local\Temp\a1cd9010e85de20293dad619223da5e154b17648540a27eaa3019622fe19afb7.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\leuleol.exe"C:\Users\Admin\leuleol.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD58b4e73e46686bce7382329f4fbebede3
SHA1eba3be96ab07dbb6eb1b0f18f6588acd404acb95
SHA256a6d9ee92575a6934b41cf71c6dfbfb88fb4e2e6915ba3e01998965f3cea4642c
SHA51214b9990b97300081d43014597540b5379a033bf602c1b87fcaa15db9485cedb8870b08f8ae2540cf3181c107d10455e268a2a4f8cc3e5c980d73d18ee6bb017b
-
Filesize
156KB
MD58b4e73e46686bce7382329f4fbebede3
SHA1eba3be96ab07dbb6eb1b0f18f6588acd404acb95
SHA256a6d9ee92575a6934b41cf71c6dfbfb88fb4e2e6915ba3e01998965f3cea4642c
SHA51214b9990b97300081d43014597540b5379a033bf602c1b87fcaa15db9485cedb8870b08f8ae2540cf3181c107d10455e268a2a4f8cc3e5c980d73d18ee6bb017b
-
Filesize
156KB
MD58b4e73e46686bce7382329f4fbebede3
SHA1eba3be96ab07dbb6eb1b0f18f6588acd404acb95
SHA256a6d9ee92575a6934b41cf71c6dfbfb88fb4e2e6915ba3e01998965f3cea4642c
SHA51214b9990b97300081d43014597540b5379a033bf602c1b87fcaa15db9485cedb8870b08f8ae2540cf3181c107d10455e268a2a4f8cc3e5c980d73d18ee6bb017b
-
Filesize
156KB
MD58b4e73e46686bce7382329f4fbebede3
SHA1eba3be96ab07dbb6eb1b0f18f6588acd404acb95
SHA256a6d9ee92575a6934b41cf71c6dfbfb88fb4e2e6915ba3e01998965f3cea4642c
SHA51214b9990b97300081d43014597540b5379a033bf602c1b87fcaa15db9485cedb8870b08f8ae2540cf3181c107d10455e268a2a4f8cc3e5c980d73d18ee6bb017b