Analysis
-
max time kernel
42s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
58778d3ebe0ca1ce1ad46e92bddb7178.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58778d3ebe0ca1ce1ad46e92bddb7178.exe
Resource
win10v2004-20231222-en
General
-
Target
58778d3ebe0ca1ce1ad46e92bddb7178.exe
-
Size
252KB
-
MD5
58778d3ebe0ca1ce1ad46e92bddb7178
-
SHA1
9e48da115edf0a4a0c0fdf39c417f29d91d63f4c
-
SHA256
0509a733af4977382669821b83eefa38c8d6558c0d370d233b506dda487a8de2
-
SHA512
f802220e8d37e2da353543b491b5d0d35248748a5c8a534e062ef8069f82f10af53e97b8a3b32c508754f26244ffb67406db9cbb40e5dc86d4a5a1660bb924bf
-
SSDEEP
6144:wTlFiVGBngFg4S628gA/igGuncMkcH/AeKnvmb7/D26ppSgCbvfXG:cHigBnga4S628dFncMkcHIeKnvmb7/Dp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 58778d3ebe0ca1ce1ad46e92bddb7178.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" daonae.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 daonae.exe -
Loads dropped DLL 2 IoCs
pid Process 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe -
Adds Run key to start application 2 TTPs 35 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /Y" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /L" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /t" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /R" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /q" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /Q" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /A" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /v" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /W" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /G" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /E" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /c" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /C" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /b" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /X" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /B" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /r" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /p" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /d" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /j" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /V" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /Z" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /K" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /k" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /F" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /w" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /H" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /I" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /g" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /P" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /U" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /D" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /i" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /J" daonae.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\daonae = "C:\\Users\\Admin\\daonae.exe /G" 58778d3ebe0ca1ce1ad46e92bddb7178.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe 2464 daonae.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 2464 daonae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2464 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 28 PID 1780 wrote to memory of 2464 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 28 PID 1780 wrote to memory of 2464 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 28 PID 1780 wrote to memory of 2464 1780 58778d3ebe0ca1ce1ad46e92bddb7178.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58778d3ebe0ca1ce1ad46e92bddb7178.exe"C:\Users\Admin\AppData\Local\Temp\58778d3ebe0ca1ce1ad46e92bddb7178.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\daonae.exe"C:\Users\Admin\daonae.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD510e9a79c994c99e13950d7973c65af15
SHA11f8a77a14473dbd0563fd3e9a1f6f37ba4903e39
SHA2560ec9df551efbe9e2b3713d77cdf0f18da6cd43e449ceb1d19618ca5606c584d8
SHA512861908b3270ea0e5a29570e163f09ef2590150b377e88d2320e0e69fff5e2ddef30b75289d4bee79c5f2049a96739988baac0a4064173137ab8ad58ec78fdbaa