Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
06eba72841ac172379cd2d2c137ec5e8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06eba72841ac172379cd2d2c137ec5e8.exe
Resource
win10v2004-20231215-en
General
-
Target
06eba72841ac172379cd2d2c137ec5e8.exe
-
Size
152KB
-
MD5
06eba72841ac172379cd2d2c137ec5e8
-
SHA1
027de096f10c982d7db4f26dc20375623f1f61c3
-
SHA256
61d97c95c3bdc62dc5f4bcc43306576b709b526b93b71958e53f9d8fa06824f4
-
SHA512
f9078b519571cfc7690c5ebd07f59f1ee9b750c4f2b0c1faa92c7b9916dc19a6f16a1ac59c28f78d9b01b2405564153d21d62e8738f0e576ae5b9b8447cbf4c6
-
SSDEEP
3072:V5EG3HCzwrCaHHvhtbz0wXtV2eZDEUXni7fo7KSif8xWM33r3k1jTCZU4oQZiEgv:sGXCzwrCW/0AHa8nuo7KSif8xWM33r3Q
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 06eba72841ac172379cd2d2c137ec5e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" doemer.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 doemer.exe -
Loads dropped DLL 2 IoCs
pid Process 2208 06eba72841ac172379cd2d2c137ec5e8.exe 2208 06eba72841ac172379cd2d2c137ec5e8.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /b" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /m" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /e" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /l" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /y" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /h" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /k" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /Y" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /i" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /V" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /I" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /W" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /a" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /G" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /T" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /M" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /f" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /F" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /K" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /E" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /Z" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /L" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /s" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /N" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /R" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /S" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /z" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /r" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /C" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /n" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /j" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /c" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /x" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /u" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /d" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /o" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /U" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /P" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /X" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /q" 06eba72841ac172379cd2d2c137ec5e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /q" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /D" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /t" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /H" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /v" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /Q" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /A" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /J" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /w" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /O" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /p" doemer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\doemer = "C:\\Users\\Admin\\doemer.exe /g" doemer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2208 06eba72841ac172379cd2d2c137ec5e8.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe 2316 doemer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 06eba72841ac172379cd2d2c137ec5e8.exe 2316 doemer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2316 2208 06eba72841ac172379cd2d2c137ec5e8.exe 28 PID 2208 wrote to memory of 2316 2208 06eba72841ac172379cd2d2c137ec5e8.exe 28 PID 2208 wrote to memory of 2316 2208 06eba72841ac172379cd2d2c137ec5e8.exe 28 PID 2208 wrote to memory of 2316 2208 06eba72841ac172379cd2d2c137ec5e8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06eba72841ac172379cd2d2c137ec5e8.exe"C:\Users\Admin\AppData\Local\Temp\06eba72841ac172379cd2d2c137ec5e8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\doemer.exe"C:\Users\Admin\doemer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51375eeb0b46bb4c4ee1a256f992e7488
SHA1099981d365ee454b7d71291c341ae3bdd07cbf9a
SHA25687de24106814b9779e68f4f47aefc2d86a0664747560ce589be9cfd8f176d455
SHA512da3a86f6e5a8b59ef7a0a051d83f3f5a06c7c592018563ea1f2c2efd8ee9966a40a0851d860ffb42c71f52ac6dea2fe615b583438313ed98ededb81508bd7885
-
Filesize
47KB
MD53ac90b97db5fba6fd9ebc0a3256c6927
SHA117cfe21f23a1a594888449cdd7876fe666c3a294
SHA256180ca635343aecb05ec73d60e85c6f1ad2e7e723010f508f3365f536d948256f
SHA512e6269bc5039925665b8de9e2bd340639ad0424f2546b33a64231ffc7afc28c6a3afcc08599aa55b67443b23e4ecf31ba2ef710255caad29147bfbbc6596037e0
-
Filesize
1KB
MD5280568ece8fc0424b1f8e0773046eda2
SHA1d2deedcf4dfe40d7f50a0864afe6ecce2dc836a1
SHA2566cb0fb92db8d20835aa5b9c14afcced9c53d5e9bf445c4592580a611270b853e
SHA512d94b93f7929559baedfbd7c26d95f35aaad283dd8449220b92a8b226faf87f079acfc5e5c65616ab654c50b16c32defa6b7b27c2fdb47ae89ce491e60a9e5b8c
-
Filesize
7KB
MD5be1bec994203ee4fa7e8545ffe4442b8
SHA18f1cb55f21f25e3dcc5daa61f838609f6c570e44
SHA256a40e46d461fa75438dcf9bef2e8030553dafd83fd9611b03bb4496c718efd460
SHA512d9d941109bbf557a348e2138ce68949a976320ad8fc5e1fc66f8f91e44081466808d644e1033e5f3e39774834d07cea9be83c5a263f5306f40ccd732e4d927e3