Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
Resource
win10v2004-20231222-en
General
-
Target
5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
-
Size
228KB
-
MD5
5ad0d2bbbf8af4d39c03ecee0eb3572b
-
SHA1
d4d08194ac46d819149eebd5bd2c4dadf5dc0951
-
SHA256
45447b235f22602853d710d75deba968b9a9e60f565313a742a2ac89bab4d91b
-
SHA512
1c6374fb45a4f6f9f6092a59e16e5deb0cbbe9fec0a75f2952e14429ff1d54d7274958ef4ccf974408814c9f3d6290d82a8a82eced9a3d2e37b0d5e21b7f4f25
-
SSDEEP
6144:DmwO3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/7SE:Dmw8PhAmZIH+7x
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" biafeoj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe -
Executes dropped EXE 1 IoCs
pid Process 4620 biafeoj.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /e" 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /l" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /u" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /h" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /y" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /j" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /v" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /i" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /a" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /w" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /b" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /z" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /s" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /e" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /c" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /f" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /n" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /q" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /x" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /m" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /t" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /g" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /o" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /d" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /r" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /p" biafeoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\biafeoj = "C:\\Users\\Admin\\biafeoj.exe /k" biafeoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe 4620 biafeoj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 4620 biafeoj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4620 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 91 PID 4944 wrote to memory of 4620 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 91 PID 4944 wrote to memory of 4620 4944 5ad0d2bbbf8af4d39c03ecee0eb3572b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe"C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\biafeoj.exe"C:\Users\Admin\biafeoj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD5b2e72f5075805767250e9c0099d463b8
SHA1c65c829a3a98056682b668d2fc2b85ff955cc068
SHA25603dc74ec60585a39a1f02db5e07920732458643a92f412491d0dc1523de4776e
SHA5128bf3af72c0ef054e6bc1dff14c120fc1975b053bd486fa3e024db34dfb818739cf2878e2a41119639c1638de90af11f100c7857b71a3376c408eb848e812e72d