Analysis
-
max time kernel
189s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:20
Static task
static1
Behavioral task
behavioral1
Sample
8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe
Resource
win10v2004-20221111-en
General
-
Target
8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe
-
Size
156KB
-
MD5
a0e5b578302af6a7327564ce57930b00
-
SHA1
bb9e9fb3009da59b716993b0e4529d4ad1c89a00
-
SHA256
8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3
-
SHA512
fd69d997d5740c5100054256a09f9787baaf799a3ffe38e2cedb0f875651ff32c0435a9cca1f787d8352e0630f767a5691e6dedee34400e7f63145e8015b10ff
-
SSDEEP
3072:xANPhL3osZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiE66:+PhksZ5b1OGbU0NByhWp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" detez.exe -
Executes dropped EXE 1 IoCs
pid Process 1768 detez.exe -
Loads dropped DLL 2 IoCs
pid Process 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /B" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /U" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /A" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /w" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /p" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /H" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /l" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /P" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /v" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /m" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /N" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /V" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /G" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /d" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /j" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /s" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /J" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /e" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /C" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /X" detez.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /k" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /I" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /Y" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /n" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /a" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /c" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /Q" detez.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /E" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /r" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /o" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /M" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /G" 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /y" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /L" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /O" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /K" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /W" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /g" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /D" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /x" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /i" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /f" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /Z" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /b" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /T" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /F" detez.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\detez = "C:\\Users\\Admin\\detez.exe /R" detez.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe 1768 detez.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 1768 detez.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1768 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 28 PID 1256 wrote to memory of 1768 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 28 PID 1256 wrote to memory of 1768 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 28 PID 1256 wrote to memory of 1768 1256 8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe"C:\Users\Admin\AppData\Local\Temp\8fff05501d32dba16330608d17014bfd63874e426e5d29362d508b58ca6b22e3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\detez.exe"C:\Users\Admin\detez.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5a6686e23e630fb99dba548fdaeb87ae8
SHA1b4c5bdd463b801854d1853ff7ff1d1bbc388ca8d
SHA256d71508930a809bbee0eafea20c726a32352a9eece0477cb5920fd30ac590776c
SHA51272ef4293ce90f6e6e206254ac96249a50ed1c8d065469c9bf93d0ff3c4efb46d57bb89eda231a368935e8ca9612ca4a9e9bd8eed04288c8b93ff697ca9c6552d
-
Filesize
156KB
MD5a6686e23e630fb99dba548fdaeb87ae8
SHA1b4c5bdd463b801854d1853ff7ff1d1bbc388ca8d
SHA256d71508930a809bbee0eafea20c726a32352a9eece0477cb5920fd30ac590776c
SHA51272ef4293ce90f6e6e206254ac96249a50ed1c8d065469c9bf93d0ff3c4efb46d57bb89eda231a368935e8ca9612ca4a9e9bd8eed04288c8b93ff697ca9c6552d
-
Filesize
156KB
MD5a6686e23e630fb99dba548fdaeb87ae8
SHA1b4c5bdd463b801854d1853ff7ff1d1bbc388ca8d
SHA256d71508930a809bbee0eafea20c726a32352a9eece0477cb5920fd30ac590776c
SHA51272ef4293ce90f6e6e206254ac96249a50ed1c8d065469c9bf93d0ff3c4efb46d57bb89eda231a368935e8ca9612ca4a9e9bd8eed04288c8b93ff697ca9c6552d
-
Filesize
156KB
MD5a6686e23e630fb99dba548fdaeb87ae8
SHA1b4c5bdd463b801854d1853ff7ff1d1bbc388ca8d
SHA256d71508930a809bbee0eafea20c726a32352a9eece0477cb5920fd30ac590776c
SHA51272ef4293ce90f6e6e206254ac96249a50ed1c8d065469c9bf93d0ff3c4efb46d57bb89eda231a368935e8ca9612ca4a9e9bd8eed04288c8b93ff697ca9c6552d