Analysis
-
max time kernel
7s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
aaa8ae0f89bde2fc6451b82db2141362.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
aaa8ae0f89bde2fc6451b82db2141362.exe
Resource
win10v2004-20231222-en
General
-
Target
aaa8ae0f89bde2fc6451b82db2141362.exe
-
Size
248KB
-
MD5
aaa8ae0f89bde2fc6451b82db2141362
-
SHA1
2e42d25788f065e9416fdeb7e33c3dbfa21bbd44
-
SHA256
42d498fc9985f478cc9045a7e6f72062d4c7d30ede5c4d6b1c2ce2ad58aeeded
-
SHA512
ef7371607ca9a1c79c89e8ffafe2fc71ad3d6fb0fd273fd206f2d45ec932663ef3bfffbfe913871d2b6f07f38ffbeb71128951830ffa21f430aa8171f3a47172
-
SSDEEP
3072:9JwSW42t0z43JOFQfOTbjaoL7mZW0h/tlVu/T8cLBZ:9JjW42t0z43JOFQfOO
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rienoel.exe -
Executes dropped EXE 1 IoCs
pid Process 1928 rienoel.exe -
Loads dropped DLL 2 IoCs
pid Process 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 2940 aaa8ae0f89bde2fc6451b82db2141362.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /h" rienoel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /D" rienoel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /V" rienoel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1928 rienoel.exe 1928 rienoel.exe 1928 rienoel.exe 1928 rienoel.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 1928 rienoel.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1928 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 28 PID 2940 wrote to memory of 1928 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 28 PID 2940 wrote to memory of 1928 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 28 PID 2940 wrote to memory of 1928 2940 aaa8ae0f89bde2fc6451b82db2141362.exe 28 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16 PID 1928 wrote to memory of 2940 1928 rienoel.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe"C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\rienoel.exe"C:\Users\Admin\rienoel.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5d1bd92be4fccdcf47f6a9f5f2f9e0ffa
SHA149520487acbe087f4c641749697e5e5dfce81e99
SHA2566a38c06866e7c7f96d439971484292708a8494c80d82f29802f2ca99ba0511f1
SHA512fc5d63bb714d6f1ff735361d7a97cd5fb60fae42d59df47fbc55c7f62e87bd236c1c9293ef3acdc8fcf55a3521a1e5789a5c1df26a192dfacea18aea35318af2
-
Filesize
41KB
MD5210403750ee958248ba3d2feea8442af
SHA1411bbb9f16f1fad0aba870396e75cab55c6c2a59
SHA256f8613e936a4ffe1f58e2e8a1d32872702ed8c1ec525e5dfc91462f71087286b3
SHA5124d34ff230aaf91f85122d8343b28dcaa653573eeade03842011f48c6d649c1a98220cf72cade92bc233bb79feb31792cc51b078d4f09b641be51c31a3e9ad1fc