Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe
Resource
win10v2004-20240226-en
General
-
Target
ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe
-
Size
256KB
-
MD5
afdd4138cb4467fe560df27e84191cd5
-
SHA1
efe7fc89599c2194e8a38b36f939507ab9792848
-
SHA256
ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18
-
SHA512
bcbcab1c2646b7c64f54d5de747c32e314ff833219dd545f755184fca65cf27926a3214cfef5db4d5fe48d74ddf775daa3218ab564b09a4f01820c7a54de04fc
-
SSDEEP
6144:pvg18eNTb/UoKHU8iN2iYty5Y+tG91K09YEuOFcU0b:pvg1JxVSU8iN2iYty6+tG91yEuOdq
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roolic.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe -
Executes dropped EXE 1 IoCs
pid Process 4492 roolic.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /u" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /g" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /c" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /y" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /i" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /l" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /f" ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /a" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /d" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /g" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /q" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /r" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /m" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /e" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /z" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /x" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /o" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /k" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /s" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /r" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /j" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /v" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /m" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /b" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /t" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /z" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /f" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /v" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /x" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /j" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /t" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /f" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /h" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /i" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /w" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /u" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /w" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /k" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /p" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /b" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /l" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /m" ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /s" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /o" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /p" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /n" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /y" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /q" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /c" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /e" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /a" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /h" roolic.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /n" roolic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\roolic = "C:\\Users\\Admin\\roolic.exe /d" roolic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3672 svchost.exe 3904 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe 4492 roolic.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4492 roolic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 4492 roolic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4492 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 107 PID 4612 wrote to memory of 4492 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 107 PID 4612 wrote to memory of 4492 4612 ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe"C:\Users\Admin\AppData\Local\Temp\ec83e3eecaf4499f826c23bf6db957c5eab48a4f4f2cc6a7c3919722e0514b18.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\roolic.exe"C:\Users\Admin\roolic.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4492
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Suspicious behavior: AddClipboardFormatListener
PID:3672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
- Suspicious behavior: AddClipboardFormatListener
PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD543d82d982dcf6e80f039dc6545313706
SHA1edb5d6a6840aea4fae95ad9289e5dddaaa52aa9d
SHA25671117ae7bb462652d956c10313bae3f210c26a7d82302a9014d4006704eaeef3
SHA512a33f7c152f420090e39ac0a7da1fd2f38eb2739f0a8adcc31f3aececbdc97627c6c92e42edb7ba47ca452f3e26d98e24a84a6534511619b7cce8b2b7b47b898b