Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe
Resource
win10v2004-20240226-en
General
-
Target
f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe
-
Size
212KB
-
MD5
587583720f7e6a74626df9b5d0b2a206
-
SHA1
758a4b806fda32b0399d6913b787baeebbab8b16
-
SHA256
f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f
-
SHA512
57f917f6f9d2ebd4ef2c95be0b41e4c3418047b6c73e5004fe39b2ec4d805ebba47c457fd40e313cad09fefa79adda5cd1332b1054f7f76d4141569a698fa14f
-
SSDEEP
3072:TCATo/0Yxk0tQ9nLHbB9WPliBs2HWWEakGJm9:TCFi4QxL7B9WPli+yWWEaz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" riehak.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe -
Executes dropped EXE 1 IoCs
pid Process 1336 riehak.exe -
Loads dropped DLL 2 IoCs
pid Process 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /l" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /v" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /w" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /k" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /t" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /r" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /q" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /f" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /m" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /y" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /u" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /i" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /x" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /p" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /j" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /c" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /h" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /e" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /s" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /g" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /n" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /e" f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /a" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /d" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /o" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /b" riehak.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\riehak = "C:\\Users\\Admin\\riehak.exe /z" riehak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe 1336 riehak.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 1336 riehak.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1336 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 28 PID 1996 wrote to memory of 1336 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 28 PID 1996 wrote to memory of 1336 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 28 PID 1996 wrote to memory of 1336 1996 f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe"C:\Users\Admin\AppData\Local\Temp\f4b85ada9e867c7a235a51b258e835ae7a9b34a884e348d2dd36f0a5cd0bff8f.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\riehak.exe"C:\Users\Admin\riehak.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5a2ba272f0a76739372da60d129d2c7d3
SHA19cc1ccd20f1a67614b7b07b0ce71290f2c10a727
SHA256c8a404f2d68673961b964182fe2cce7703e38bbfb604c7c94e309257f06e4705
SHA512bd70f78c6f9c012feb4692ac9493eb200737ef53c421ffdf9f6e14e33adfadc277b17dfe1639eb73d81d00809bd735902bac4715e068733954b50a2ea18100a0