Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
7fa79f1f7b32a9506f97ddb08c6312bc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7fa79f1f7b32a9506f97ddb08c6312bc.exe
Resource
win10v2004-20231222-en
General
-
Target
7fa79f1f7b32a9506f97ddb08c6312bc.exe
-
Size
170KB
-
MD5
7fa79f1f7b32a9506f97ddb08c6312bc
-
SHA1
b716c4dfeffc2764c96250bf008f0a2ef17eaa48
-
SHA256
2ff71d5e3d74fc557082bec0aafc203aace6af69a5851862a3bc31a4e06b7beb
-
SHA512
8f36f6719a2f5edc7ce462c83a35f9f88aea339c92d8c346f7e55e8d75eddb8ccc1a8d070208e282ac50848d94e16b7707f27a446139f9fab99b4df831626817
-
SSDEEP
768:utkGowTLoYVLWi2PokaTotztbotnwfzvHEEXS/Dc1PxaNKXcOsJOpEg5NCNdsega:utzfXoYVii24yD4/DcDNxEuR+
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" geazi.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 geazi.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /e" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /O" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /i" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /b" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /q" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /D" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /o" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /h" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /U" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /J" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /G" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /S" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /t" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /x" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /a" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /M" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /W" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /n" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /p" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /s" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /g" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /k" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /r" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /H" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /f" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /A" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /E" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /V" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /c" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /w" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /Y" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /j" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /R" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /Q" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /P" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /T" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /K" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /d" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /B" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /Z" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /u" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /L" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /l" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /z" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /X" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /v" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /C" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /F" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /m" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /I" geazi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\geazi = "C:\\Users\\Admin\\geazi.exe /y" geazi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe 2980 geazi.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 2980 geazi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2980 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 28 PID 2372 wrote to memory of 2980 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 28 PID 2372 wrote to memory of 2980 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 28 PID 2372 wrote to memory of 2980 2372 7fa79f1f7b32a9506f97ddb08c6312bc.exe 28 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11 PID 2980 wrote to memory of 2372 2980 geazi.exe 11
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fa79f1f7b32a9506f97ddb08c6312bc.exe"C:\Users\Admin\AppData\Local\Temp\7fa79f1f7b32a9506f97ddb08c6312bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\geazi.exe"C:\Users\Admin\geazi.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD503d05aa6e7e971796c85f0afbedd224e
SHA1b9edfa6b73640f009960dd08288f101e79a2a99d
SHA2569072a2364816ba6fe344c7088b8cc182bb70f882a96f8effedd9831b06a967d5
SHA512bef61bd38f25e074d4a2a364f39a54a6c9654545afa0f1f992a5cc8959ce0ca8ae4fd2eb8bfa4f8f2642394478b9273bc15f9c557975e6dbaeb15fd27a77fe46