Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
Resource
win10v2004-20231222-en
General
-
Target
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
-
Size
228KB
-
MD5
5ad0d2bbbf8af4d39c03ecee0eb3572b
-
SHA1
d4d08194ac46d819149eebd5bd2c4dadf5dc0951
-
SHA256
45447b235f22602853d710d75deba968b9a9e60f565313a742a2ac89bab4d91b
-
SHA512
1c6374fb45a4f6f9f6092a59e16e5deb0cbbe9fec0a75f2952e14429ff1d54d7274958ef4ccf974408814c9f3d6290d82a8a82eced9a3d2e37b0d5e21b7f4f25
-
SSDEEP
6144:DmwO3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/7SE:Dmw8PhAmZIH+7x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biiakal.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 biiakal.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /z" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /x" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /c" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /r" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /m" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /l" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /h" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /g" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /i" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /w" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /e" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /s" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /p" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /f" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /k" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /o" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /n" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /j" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /a" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /u" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /y" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /v" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /t" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /i" 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /d" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /q" biiakal.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\biiakal = "C:\\Users\\Admin\\biiakal.exe /b" biiakal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe 2168 biiakal.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 2168 biiakal.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2168 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 28 PID 2164 wrote to memory of 2168 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 28 PID 2164 wrote to memory of 2168 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 28 PID 2164 wrote to memory of 2168 2164 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe"C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\biiakal.exe"C:\Users\Admin\biiakal.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5f17c20090360f317119fec588df03d6a
SHA1b341d3a1ce60d7d332680e71091c9f10e7c6964b
SHA2568fd623e2570674590942e0abf773231b9edc37ed7c2c5dfa52e87910a6c39124
SHA5125990aff2c79a919d3cc6b1e5c6b53ae19417051de143acdce11ba203375706e70cd01bc4e26173ef0bbcc514a4f9b77e79c67979fea142f358eecf94b3e11ebc