Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 04:40
Static task
static1
Behavioral task
behavioral1
Sample
05a88ce8f9315aa7b3a1b1432b69217c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05a88ce8f9315aa7b3a1b1432b69217c.exe
Resource
win10v2004-20231215-en
General
-
Target
05a88ce8f9315aa7b3a1b1432b69217c.exe
-
Size
52KB
-
MD5
05a88ce8f9315aa7b3a1b1432b69217c
-
SHA1
1a9b37d6162fe27a28f2d7104234aa34044300f1
-
SHA256
30a49c6d2c9926d9165785e895befe3ecb6fc4c5f24965cfb379aaf2309a1fe1
-
SHA512
58a0e5626c7cc533274a9e7df264ad85eee6a770489ae2397bbb87c7d9f8273f45d8857bb54629f6d156bb23d28eab199a1f9d0b550773d3dd3bf5433b0cab29
-
SSDEEP
768:ubWnCwYQX6N1nfo1jskr/v/m89S3rkC6R+wibw52Tzp//:uh66NNwNskr3mbkC6R+Xp//
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" keioz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 05a88ce8f9315aa7b3a1b1432b69217c.exe -
Executes dropped EXE 1 IoCs
pid Process 4416 keioz.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\keioz = "C:\\Users\\Admin\\keioz.exe" keioz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe 4416 keioz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 05a88ce8f9315aa7b3a1b1432b69217c.exe 4416 keioz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4416 2024 05a88ce8f9315aa7b3a1b1432b69217c.exe 92 PID 2024 wrote to memory of 4416 2024 05a88ce8f9315aa7b3a1b1432b69217c.exe 92 PID 2024 wrote to memory of 4416 2024 05a88ce8f9315aa7b3a1b1432b69217c.exe 92 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16 PID 4416 wrote to memory of 2024 4416 keioz.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\05a88ce8f9315aa7b3a1b1432b69217c.exe"C:\Users\Admin\AppData\Local\Temp\05a88ce8f9315aa7b3a1b1432b69217c.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\keioz.exe"C:\Users\Admin\keioz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD54dec726b00bb0a4644f1ff300fbcd7cc
SHA1720c6c07fd5c0d9ae2840e511fbacde75c6b3a86
SHA2564584de6d26bf2d3aad83464c62face28fc2fae4ff663e307e81aafe6d33d0f12
SHA5128caaa5db6a2f4af1a152a64cc88219b1c5cc047b79b719f9a58d1f0fa5a7bea16c4de8aa620c910108d2acb3da4e17f4758cea4010940a3f16171d0bbc00d928