Analysis
-
max time kernel
154s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
Resource
win10v2004-20220901-en
General
-
Target
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe
-
Size
92KB
-
MD5
eeaffff303205e86b039462110b6c098
-
SHA1
5834f33e06ed72a26230ae70554308c18b1c0e46
-
SHA256
227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37
-
SHA512
9688ca795cdc99a387f9d48f5b61f47ab038cd1ce3c53784b730e31accda6b461fa3c4234a75d048ead125172971c427362f88ea92eecd160fc7c219219ef00b
-
SSDEEP
1536:QEtX4EVT8JNenyIGmvcTlfbfwFocTzFJ0T72VpXw:zXxYhTxiBTzFJ0T72zw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" haehar.exe -
Executes dropped EXE 1 IoCs
pid Process 748 haehar.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /v" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /h" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /x" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /t" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /k" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /a" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /w" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /n" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /o" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /g" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /q" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /c" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /m" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /p" haehar.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /z" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /j" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /r" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /j" 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /b" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /e" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /u" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /i" haehar.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /l" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /s" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /d" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /f" haehar.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\haehar = "C:\\Users\\Admin\\haehar.exe /y" haehar.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe 748 haehar.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 748 haehar.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4788 wrote to memory of 748 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 81 PID 4788 wrote to memory of 748 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 81 PID 4788 wrote to memory of 748 4788 227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe"C:\Users\Admin\AppData\Local\Temp\227e17f1eeee8cec46b4aab7bc07e036ccbebe9b18955d936e02400eee88ed37.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\haehar.exe"C:\Users\Admin\haehar.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD590154924f16996daacdc478fd28639eb
SHA139f16996745bdbfc5e846e5f66a95c28ac8978fe
SHA256f3631ecfbac6016922797351da333b1fc635ae2d410fa3daf32a41820d88fc8b
SHA512841dd038592d054ca7c7dbfc0299816123e0029650d3f0ae73b940b0c46044e312a0ecdc97b49630befa0c6e5182642e348c96d328ab79596586c8d774f7ed99
-
Filesize
92KB
MD590154924f16996daacdc478fd28639eb
SHA139f16996745bdbfc5e846e5f66a95c28ac8978fe
SHA256f3631ecfbac6016922797351da333b1fc635ae2d410fa3daf32a41820d88fc8b
SHA512841dd038592d054ca7c7dbfc0299816123e0029650d3f0ae73b940b0c46044e312a0ecdc97b49630befa0c6e5182642e348c96d328ab79596586c8d774f7ed99