Analysis
-
max time kernel
176s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe
Resource
win10v2004-20220812-en
General
-
Target
4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe
-
Size
212KB
-
MD5
8a756f206825eeaa98f519187b4c8cdd
-
SHA1
c70be9384c266ff20be998c3727d07e870a42556
-
SHA256
4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2
-
SHA512
5e0501f208783df0b1dcc3db02ef45ea9cd39b6d69b170670ee0dc3cfffd5ec3911d71d93f56d849ac63d4871e13a2d226d6f7b6d0e3b4fe9408f7eae631b1a9
-
SSDEEP
3072:hVbPD2g8h7kvqEbncAXp4wiY3fXfLqus2RrMh9VsgV2Ksb+ET8/3TYhPR+fA4eQU:x87kvTtdysb+dumMn
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hocak.exe -
Executes dropped EXE 1 IoCs
pid Process 4224 hocak.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /u" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /f" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /r" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /h" hocak.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /o" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /e" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /c" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /t" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /w" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /q" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /v" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /g" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /l" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /m" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /j" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /a" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /n" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /i" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /n" 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /k" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /x" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /s" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /b" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /p" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /z" hocak.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /y" hocak.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hocak = "C:\\Users\\Admin\\hocak.exe /d" hocak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe 4224 hocak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 4224 hocak.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4224 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 80 PID 4824 wrote to memory of 4224 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 80 PID 4824 wrote to memory of 4224 4824 4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe"C:\Users\Admin\AppData\Local\Temp\4978755cb3fb269966cb26735cb7ea2d76f49968addd9ca77fdfdb8da9893eb2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\hocak.exe"C:\Users\Admin\hocak.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD574a973d1ff2f3fabd13d15e7d895edd6
SHA1daae4deeac6f21365c1f7cfee4379ae450b82dce
SHA256b0e7dacfff5fd370f295cc1fd6b1234e68694941ca82bc26fb9dc2cee0bda9ac
SHA5123e20dcc1e216d28b1e9f309a57e644231ab3ec167b57d4507613bd187342ebbdf94d3aaf296b65cca5ebbee9da613fc91d2b0d129ac9debca2e8839b6f89adab
-
Filesize
212KB
MD574a973d1ff2f3fabd13d15e7d895edd6
SHA1daae4deeac6f21365c1f7cfee4379ae450b82dce
SHA256b0e7dacfff5fd370f295cc1fd6b1234e68694941ca82bc26fb9dc2cee0bda9ac
SHA5123e20dcc1e216d28b1e9f309a57e644231ab3ec167b57d4507613bd187342ebbdf94d3aaf296b65cca5ebbee9da613fc91d2b0d129ac9debca2e8839b6f89adab