Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe
Resource
win10v2004-20221111-en
General
-
Target
d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe
-
Size
244KB
-
MD5
05158b2e7d342401c0621acf5dfb5a50
-
SHA1
565771de5ea39891ab8d9f5a45409fcfed0b949e
-
SHA256
d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02
-
SHA512
21c86a3c380541f3409d841e937f90a41789581d08428d0d154bc6edcd7262b265900849c8d28629c2def210982917c6baa6ff56de7babe1c67e9c1137f66f51
-
SSDEEP
6144:QxA6HaxXtLsgh1dbPOT3zJ1dYFwmPFmPQNCCTC7cX9qr27dOFFPqkdv:QTG1dbPOT3dGwmjqrwdWic
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" feeaw.exe -
Executes dropped EXE 1 IoCs
pid Process 868 feeaw.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /r" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /O" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /a" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /j" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /B" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /b" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /l" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /S" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /A" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /Y" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /E" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /u" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /s" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /d" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /x" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /i" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /V" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /G" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /N" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /w" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /L" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /n" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /H" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /p" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /e" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /o" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /v" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /P" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /W" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /k" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /z" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /h" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /F" feeaw.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /U" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /M" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /K" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /R" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /f" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /X" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /Z" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /I" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /y" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /m" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /t" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /J" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /Q" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /c" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /D" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /g" feeaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\feeaw = "C:\\Users\\Admin\\feeaw.exe /q" feeaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe 868 feeaw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 868 feeaw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 868 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 28 PID 1708 wrote to memory of 868 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 28 PID 1708 wrote to memory of 868 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 28 PID 1708 wrote to memory of 868 1708 d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe"C:\Users\Admin\AppData\Local\Temp\d2bfd324dc371bc9eb05b139d2316ef4783f442dbc5cfa8f46254ddae2fe8c02.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\feeaw.exe"C:\Users\Admin\feeaw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD59583b5523d242acff5b97f34cfcdb2c4
SHA1fb30481768fb6991a01505a4fc253647983872db
SHA256a92ad68c14b25e17dce925e0ea81ef70a1614b6c906243ba793ea7affd644a43
SHA5124c9f2bdc4a44a8e65cbfd9b8070e17a77edc0a918353280ea8eab2980e2d7f4d19bf95e471bba11a90cecdc17e2eaccaf031ae9438f525ac858eedd2a4897071
-
Filesize
244KB
MD59583b5523d242acff5b97f34cfcdb2c4
SHA1fb30481768fb6991a01505a4fc253647983872db
SHA256a92ad68c14b25e17dce925e0ea81ef70a1614b6c906243ba793ea7affd644a43
SHA5124c9f2bdc4a44a8e65cbfd9b8070e17a77edc0a918353280ea8eab2980e2d7f4d19bf95e471bba11a90cecdc17e2eaccaf031ae9438f525ac858eedd2a4897071
-
Filesize
244KB
MD59583b5523d242acff5b97f34cfcdb2c4
SHA1fb30481768fb6991a01505a4fc253647983872db
SHA256a92ad68c14b25e17dce925e0ea81ef70a1614b6c906243ba793ea7affd644a43
SHA5124c9f2bdc4a44a8e65cbfd9b8070e17a77edc0a918353280ea8eab2980e2d7f4d19bf95e471bba11a90cecdc17e2eaccaf031ae9438f525ac858eedd2a4897071
-
Filesize
244KB
MD59583b5523d242acff5b97f34cfcdb2c4
SHA1fb30481768fb6991a01505a4fc253647983872db
SHA256a92ad68c14b25e17dce925e0ea81ef70a1614b6c906243ba793ea7affd644a43
SHA5124c9f2bdc4a44a8e65cbfd9b8070e17a77edc0a918353280ea8eab2980e2d7f4d19bf95e471bba11a90cecdc17e2eaccaf031ae9438f525ac858eedd2a4897071