Analysis
-
max time kernel
189s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe
Resource
win10v2004-20221111-en
General
-
Target
add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe
-
Size
176KB
-
MD5
ea40043142bfbc040cde98431ad3d734
-
SHA1
72d2bd8514becb6453389341c2df4f90323942ed
-
SHA256
add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34
-
SHA512
d3343fd4392012caca97add925a398853b09d5a77f96ff687c487d821aa198505c03de50e0f74af4a7fa942668db4fa733c2a4f24a038b8552fb65d6cca5239d
-
SSDEEP
3072:GaD+WuMBspr8+k77/pswWR/x0+dv4TLxyK4c4oQZiEYkQLc:pSWuMBsFvS04+dv4TV9WiL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tooen.exe -
Executes dropped EXE 1 IoCs
pid Process 772 tooen.exe -
Loads dropped DLL 2 IoCs
pid Process 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe -
Adds Run key to start application 2 TTPs 50 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /B" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /q" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /l" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /E" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /o" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /O" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /T" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /f" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /H" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /R" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /Q" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /M" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /z" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /Z" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /g" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /C" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /W" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /u" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /G" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /v" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /d" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /m" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /S" tooen.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /I" add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /P" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /h" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /x" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /p" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /b" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /j" tooen.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /s" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /K" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /I" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /F" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /t" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /y" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /V" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /i" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /J" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /a" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /w" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /c" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /U" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /D" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /e" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /L" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /n" tooen.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tooen = "C:\\Users\\Admin\\tooen.exe /Y" tooen.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe 772 tooen.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 772 tooen.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 772 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 28 PID 1064 wrote to memory of 772 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 28 PID 1064 wrote to memory of 772 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 28 PID 1064 wrote to memory of 772 1064 add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe"C:\Users\Admin\AppData\Local\Temp\add0fc52486baca17a2b515b41c5c8b59344a4c1683634ea9cc5482a3e5e8c34.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\tooen.exe"C:\Users\Admin\tooen.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD58a1fc7b076210440bc14aeba0c03bbac
SHA12ef610b22ae0677d9c2d35045050f4066cbb5c50
SHA25670ece64c6d3472f64a97b9b6738090bece8e540d5312fcc163282870e11d07ec
SHA5128484e3e9551370ea19fa7998d6b9ae442702545fdaa20d1acfe519fb48b428fb27a49d3afbd2fc112353efec7f4d1fc71f115c2ca2b7178deadb2ef827a294fc
-
Filesize
176KB
MD58a1fc7b076210440bc14aeba0c03bbac
SHA12ef610b22ae0677d9c2d35045050f4066cbb5c50
SHA25670ece64c6d3472f64a97b9b6738090bece8e540d5312fcc163282870e11d07ec
SHA5128484e3e9551370ea19fa7998d6b9ae442702545fdaa20d1acfe519fb48b428fb27a49d3afbd2fc112353efec7f4d1fc71f115c2ca2b7178deadb2ef827a294fc
-
Filesize
176KB
MD58a1fc7b076210440bc14aeba0c03bbac
SHA12ef610b22ae0677d9c2d35045050f4066cbb5c50
SHA25670ece64c6d3472f64a97b9b6738090bece8e540d5312fcc163282870e11d07ec
SHA5128484e3e9551370ea19fa7998d6b9ae442702545fdaa20d1acfe519fb48b428fb27a49d3afbd2fc112353efec7f4d1fc71f115c2ca2b7178deadb2ef827a294fc
-
Filesize
176KB
MD58a1fc7b076210440bc14aeba0c03bbac
SHA12ef610b22ae0677d9c2d35045050f4066cbb5c50
SHA25670ece64c6d3472f64a97b9b6738090bece8e540d5312fcc163282870e11d07ec
SHA5128484e3e9551370ea19fa7998d6b9ae442702545fdaa20d1acfe519fb48b428fb27a49d3afbd2fc112353efec7f4d1fc71f115c2ca2b7178deadb2ef827a294fc