Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:37
Static task
static1
Behavioral task
behavioral1
Sample
b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe
Resource
win10v2004-20220812-en
General
-
Target
b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe
-
Size
180KB
-
MD5
51118c55e41910d00c5587d99cbc8317
-
SHA1
3fad84f553119d5595fd341b085c43e9e19f6c48
-
SHA256
b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833
-
SHA512
8656991b53fe16ed0933d23102be0a20fae81588ac0d60efabb39f19a87acf36ac434e01477d2896cf057b81f787e0010aadd442b76e9034d3606154e76f6784
-
SSDEEP
3072:hyHodVAXY71idPAaWELGzMshNXTDFE+7jF6XTrCk:hyHozAY+oXqFshNTDT756XTR
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fiovo.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 fiovo.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /a" b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /c" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /n" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /k" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /b" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /p" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /g" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /w" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /m" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /u" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /f" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /o" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /y" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /j" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /e" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /s" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /h" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /v" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /d" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /i" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /z" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /x" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /t" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /l" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /r" fiovo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /q" fiovo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fiovo = "C:\\Users\\Admin\\fiovo.exe /a" fiovo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe 1668 fiovo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 1668 fiovo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3604 wrote to memory of 1668 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 78 PID 3604 wrote to memory of 1668 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 78 PID 3604 wrote to memory of 1668 3604 b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe"C:\Users\Admin\AppData\Local\Temp\b8f8926ca34c228d4cf228098d20422c8774ba686e2ab23117e6c56784c36833.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\fiovo.exe"C:\Users\Admin\fiovo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD508d9dc2d5c4efecbee2b830edac26ed2
SHA10e0ae5073839382e3a8f341fc1421fca29dfab56
SHA2569c2c9372c4a16e279fb9681ae240670d6c8cd21ca994efaa6ec09e7753a521f6
SHA51206380ca9f41c56251eb5fd286cbcb6c574dad5345ec2ffec405d2a4d69141901faa55b69caf596a9028bb76f718971229071bc698e4019c8ac1f8f3dedf98c7f
-
Filesize
180KB
MD508d9dc2d5c4efecbee2b830edac26ed2
SHA10e0ae5073839382e3a8f341fc1421fca29dfab56
SHA2569c2c9372c4a16e279fb9681ae240670d6c8cd21ca994efaa6ec09e7753a521f6
SHA51206380ca9f41c56251eb5fd286cbcb6c574dad5345ec2ffec405d2a4d69141901faa55b69caf596a9028bb76f718971229071bc698e4019c8ac1f8f3dedf98c7f