Analysis
-
max time kernel
151s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe
Resource
win10v2004-20220812-en
General
-
Target
b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe
-
Size
180KB
-
MD5
33f5c8ead5d1333a8607118220ae8675
-
SHA1
d933d31dae47848634366d35c7bbddb6f77638bc
-
SHA256
b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9
-
SHA512
06f986e3b433fada42f9df8477209f4959aa134bdf8f74775a7b1cc1a0592f96bd102521cd360cb584861c5d9387dc743b86450c594b1fcb2294ae7d047249cf
-
SSDEEP
3072:9WqSC+y50cm1tnRd5GK/fObT/bGinhssp9nPVmvEfL2co3ZwURmkPiR/+5JS3a:gqSC+Lcm1Dd0K/fObT/bGihssp1VmvEs
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" joeye.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 joeye.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /n" joeye.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /G" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /k" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /B" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /r" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /u" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /P" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /w" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /q" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /F" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /j" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /K" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /W" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /p" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /Z" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /O" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /D" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /R" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /E" b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /y" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /f" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /J" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /d" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /c" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /U" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /i" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /l" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /o" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /Y" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /e" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /N" joeye.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /E" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /A" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /t" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /I" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /b" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /x" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /m" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /s" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /M" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /g" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /z" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /X" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /v" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /Q" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /a" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /T" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /H" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /L" joeye.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\joeye = "C:\\Users\\Admin\\joeye.exe /C" joeye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe 2020 joeye.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 2020 joeye.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2020 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 26 PID 2016 wrote to memory of 2020 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 26 PID 2016 wrote to memory of 2020 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 26 PID 2016 wrote to memory of 2020 2016 b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe"C:\Users\Admin\AppData\Local\Temp\b936fcc82bb92ab0bc463f6f220f8cf9a5b0e0b617ecd78452e61b892186add9.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\joeye.exe"C:\Users\Admin\joeye.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2020
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD57b229958d87ecd22b3df0e87cf02b18b
SHA1711d4a8c44921a287df79870eeefcf01ab433f76
SHA256756a26596f89d3575287058c10dc30b49f6957b86bd8d7c344432509900914c9
SHA5129347e9808fce9c1abeb4631c6447d7d0229ca3850eb475d19a790db58b3a2c9a09fdc0818b873c9edb49f2c033d6fe721f4e692c049e565b4d4dfa4c901c4afc
-
Filesize
180KB
MD57b229958d87ecd22b3df0e87cf02b18b
SHA1711d4a8c44921a287df79870eeefcf01ab433f76
SHA256756a26596f89d3575287058c10dc30b49f6957b86bd8d7c344432509900914c9
SHA5129347e9808fce9c1abeb4631c6447d7d0229ca3850eb475d19a790db58b3a2c9a09fdc0818b873c9edb49f2c033d6fe721f4e692c049e565b4d4dfa4c901c4afc
-
Filesize
180KB
MD57b229958d87ecd22b3df0e87cf02b18b
SHA1711d4a8c44921a287df79870eeefcf01ab433f76
SHA256756a26596f89d3575287058c10dc30b49f6957b86bd8d7c344432509900914c9
SHA5129347e9808fce9c1abeb4631c6447d7d0229ca3850eb475d19a790db58b3a2c9a09fdc0818b873c9edb49f2c033d6fe721f4e692c049e565b4d4dfa4c901c4afc
-
Filesize
180KB
MD57b229958d87ecd22b3df0e87cf02b18b
SHA1711d4a8c44921a287df79870eeefcf01ab433f76
SHA256756a26596f89d3575287058c10dc30b49f6957b86bd8d7c344432509900914c9
SHA5129347e9808fce9c1abeb4631c6447d7d0229ca3850eb475d19a790db58b3a2c9a09fdc0818b873c9edb49f2c033d6fe721f4e692c049e565b4d4dfa4c901c4afc