Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
393e70e101d66920905a8213c9eeb218.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
393e70e101d66920905a8213c9eeb218.exe
Resource
win10v2004-20231215-en
General
-
Target
393e70e101d66920905a8213c9eeb218.exe
-
Size
264KB
-
MD5
393e70e101d66920905a8213c9eeb218
-
SHA1
c2f276a563d06a7a563ee880aaa990be6cfd2bae
-
SHA256
2d4c9caf643d938554c5fba3ca06aa252034c10089f4449ee3254ab22aaba556
-
SHA512
e82f8b77d66b501fa808f59d9d9833ed3f5ebabbff6f188e9bb6a7074cbe92c0443d71a39980c8011b3764c092194b9e7f54f2a0eb1b132a31a2aab84551406c
-
SSDEEP
6144:0r+XI/3JJYHyxyIVEA4aZM9DRruwcu3zChvQ:O+XcvHmzKu3zChvQ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 393e70e101d66920905a8213c9eeb218.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" prweej.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 prweej.exe -
Loads dropped DLL 2 IoCs
pid Process 2200 393e70e101d66920905a8213c9eeb218.exe 2200 393e70e101d66920905a8213c9eeb218.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /h" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /x" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /F" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /O" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /R" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /W" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /N" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /X" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /o" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /M" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /r" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /s" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /k" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /g" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /t" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /c" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /d" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /I" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /i" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /m" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /C" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /U" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /J" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /q" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /H" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /v" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /p" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /n" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /e" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /S" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /u" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /D" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /w" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /K" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /C" 393e70e101d66920905a8213c9eeb218.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /b" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /f" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /Q" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /z" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /B" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /P" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /l" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /T" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /Y" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /Z" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /a" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /y" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /j" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /L" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /E" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /G" prweej.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\prweej = "C:\\Users\\Admin\\prweej.exe /V" prweej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2200 393e70e101d66920905a8213c9eeb218.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe 2296 prweej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2200 393e70e101d66920905a8213c9eeb218.exe 2296 prweej.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2296 2200 393e70e101d66920905a8213c9eeb218.exe 28 PID 2200 wrote to memory of 2296 2200 393e70e101d66920905a8213c9eeb218.exe 28 PID 2200 wrote to memory of 2296 2200 393e70e101d66920905a8213c9eeb218.exe 28 PID 2200 wrote to memory of 2296 2200 393e70e101d66920905a8213c9eeb218.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\393e70e101d66920905a8213c9eeb218.exe"C:\Users\Admin\AppData\Local\Temp\393e70e101d66920905a8213c9eeb218.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\prweej.exe"C:\Users\Admin\prweej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5dd58c2668b68cafa1a39a507100b8e56
SHA16099b45bc0fd541e1922286e3bee488668dde648
SHA25692ed42df24e7a28e25eebbf108f21677533bc1edc58f8ecc0dad56bc30b7a751
SHA51216217d5a967946c44effced0a0fb94aae12b635372e6cd983867a0505cbe586061a93092ead45a8cee476914074fe6ff6715496c9e5d6fd9c38f7edfecb30e73