Analysis
-
max time kernel
186s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
04b8e75a674eae9d79da9d2f3cdde83c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04b8e75a674eae9d79da9d2f3cdde83c.exe
Resource
win10v2004-20231215-en
General
-
Target
04b8e75a674eae9d79da9d2f3cdde83c.exe
-
Size
224KB
-
MD5
04b8e75a674eae9d79da9d2f3cdde83c
-
SHA1
a06098a656d14737d421f0fb2e57ac37e385740c
-
SHA256
98c8b06f919641dbe7c9ebb91b931bfcd06881cf01988d6c9a6e4dcd6d600f83
-
SHA512
46637fa9e1f7fbb9c0335f4bdbe635bd2fcaa94283432ed77db4d28aef81288a118bd630b7ef465007b6c1561f327cd6dd47b213136270406b26fa08511b00da
-
SSDEEP
1536:41EhEeAo5ba8BuRpojAbuAbKmluyUSvQYtbZdENLHVwdcQ1ARatC:IEPb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hefes.exe -
Executes dropped EXE 1 IoCs
pid Process 3008 hefes.exe -
Loads dropped DLL 2 IoCs
pid Process 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /l" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /W" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /z" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /m" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /C" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /d" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /T" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /O" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /k" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /X" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /H" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /s" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /M" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /D" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /J" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /u" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /F" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /g" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /e" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /y" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /S" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /Z" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /A" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /h" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /V" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /N" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /n" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /Y" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /b" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /P" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /L" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /t" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /U" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /f" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /Q" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /r" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /i" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /p" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /o" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /K" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /R" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /G" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /x" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /a" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /E" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /v" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /q" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /w" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /I" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /B" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /j" hefes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\hefes = "C:\\Users\\Admin\\hefes.exe /c" hefes.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe 3008 hefes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 3008 hefes.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3008 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 29 PID 2808 wrote to memory of 3008 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 29 PID 2808 wrote to memory of 3008 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 29 PID 2808 wrote to memory of 3008 2808 04b8e75a674eae9d79da9d2f3cdde83c.exe 29 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13 PID 3008 wrote to memory of 2808 3008 hefes.exe 13
Processes
-
C:\Users\Admin\AppData\Local\Temp\04b8e75a674eae9d79da9d2f3cdde83c.exe"C:\Users\Admin\AppData\Local\Temp\04b8e75a674eae9d79da9d2f3cdde83c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\hefes.exe"C:\Users\Admin\hefes.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD505e7a08b325e4752919c8450836ca007
SHA135ea1d030882699f7a5fec80f979b847ac387101
SHA256d5d3df7f405673a24d301825f07d90d35e555ee29dba61154d91390a4c60323c
SHA51200c7496ee6c9f35d360942ddc3e8263a76ed7a6f5075c425d3a7dee4140f04462ed962063cde7f911bf1152e90761a06ca3cb6aa8441b4df7b01a1ce75cc5f17
-
Filesize
40KB
MD5e425c21e4dc3e298ac57494255b49fd3
SHA138cbec3d5788e3d75f3aae157451aa2177c585be
SHA2566b502842557f81034db98002b2a2251861d53ea28873e35c6d08041b17f4cd2f
SHA512f7c40d26c21280dce61b6495d740e0c033cca28f26f85b217b8bcd2e360eb33abdc45f89dfad8728b136e78fca8a40c74bc7e48b82128ba7e5b461952d697dae
-
Filesize
224KB
MD514cb2da5df58f66806adca1f973fa4b9
SHA1272e4c74339a60fe2f2e96b6499178a54d3e4dd6
SHA2562bc8882f8e0d80e061c9deed721b0436b12a238b03314b989f7305e1f9958e33
SHA5128bda8e2ee8ad83e06886b35fcaefa9c54158253bcadede274b1d09e291d0a01e6b958f4e60e18e08c581ab7bc411176920fab165e19d1784f46a11100b0fb4fb
-
Filesize
82KB
MD5adc89d193584d1ef28696bef7704b08f
SHA1e9564dd1f37c546bffcb53ad9d9d6cb80653beb5
SHA256cf6cd633a2b86f798f63964584378bd42694259f5dbd176f2e44bafedcf886c6
SHA5122bae64e9e9a3108c1ea68eb53e0b759af21487f821ef2148f95fee25080f34f60d959cf586008f137f6c91c31458c3966144f8222ea13d7c215ab6d665488811