Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 04:05
Static task
static1
Behavioral task
behavioral1
Sample
e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe
Resource
win10v2004-20240412-en
General
-
Target
e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe
-
Size
256KB
-
MD5
b73405d01e47b1ced4fc0d09f39bebbf
-
SHA1
712def88b1949b9b8a40faec73d65f644ac6af5c
-
SHA256
e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b
-
SHA512
240067e012664da458bd0e042ffa8ed7c572433d2e5937078137cb54294538a76b120b8ec5294620ca73329ebc5aa7e34f0d776862376079c4ab0b22b2aef3b8
-
SSDEEP
3072:40bfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MC5OQ39cOaRr5ZGPVB:4Wepp3PJXCOGY3eQOQ39cC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" miikoe.exe -
Executes dropped EXE 1 IoCs
pid Process 1972 miikoe.exe -
Loads dropped DLL 2 IoCs
pid Process 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /c" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /l" e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /g" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /v" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /i" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /y" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /l" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /s" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /e" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /t" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /k" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /m" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /a" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /u" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /r" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /o" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /p" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /b" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /w" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /z" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /f" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /q" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /n" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /h" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /j" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /d" miikoe.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\miikoe = "C:\\Users\\Admin\\miikoe.exe /x" miikoe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe 1972 miikoe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 1972 miikoe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1972 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 28 PID 2076 wrote to memory of 1972 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 28 PID 2076 wrote to memory of 1972 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 28 PID 2076 wrote to memory of 1972 2076 e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe"C:\Users\Admin\AppData\Local\Temp\e4ecfdcf7f20619b24ac5d06db56e638572e87e8c022ef6180657575217ba84b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\miikoe.exe"C:\Users\Admin\miikoe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5386ac083039c3d12f77b7cf8e3b9a0fc
SHA1f3fb2880a4de2af5d865c75da45d020fd8c96363
SHA256d1125ca7ad89070cbfc02ec418ecc6415b2c71383d7fcdd305acca706a14ab3e
SHA5124c81f9869a33ce80607a73a9fb1e936ea2bc33ea5621c76082f06d6c5676b4127f25aa48f14c39b9733de1f68409a28b1a0a1b92930e0919bd587019d3d7fae6