Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
Resource
win10v2004-20240426-en
General
-
Target
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
-
Size
53KB
-
MD5
713d26727f5b28b78b189f45667c78bd
-
SHA1
92214eb7a28a865e4991264d2f14ff28ac456e87
-
SHA256
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8
-
SHA512
71dd4165752360591793a125ec1daae74ff4d657a00b00dfa628ac8565ec3b6f0eab9f8481b8ee35b2af5101db656d3b8066ed35ccae72f9c69ac6375878d33d
-
SSDEEP
1536:vN5g8r8QP4mg7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:T4mgJJjmLM3zRJWZsXy4J9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" paiom.exe -
Executes dropped EXE 1 IoCs
pid Process 2136 paiom.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\paiom = "C:\\Users\\Admin\\paiom.exe" paiom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe 2136 paiom.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 2136 paiom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2136 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 28 PID 2844 wrote to memory of 2136 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 28 PID 2844 wrote to memory of 2136 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 28 PID 2844 wrote to memory of 2136 2844 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 28 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27 PID 2136 wrote to memory of 2844 2136 paiom.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe"C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\paiom.exe"C:\Users\Admin\paiom.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5ced49b0b28cefbad04a1775cda5c68b7
SHA16d3718dbe51b6796a36ba5f8e1f125206c8803f7
SHA256d11685b2fe0c7eade6739a395fc661624c28fa1a3b4578336b91b88a2edaaca4
SHA512101ddb2a50aa50b4ae06ece3b5dcd923f9d895bafe8c331aafd3ea9f54c828037384cdae338ef14b79083e667fe31c6352eedae9adcfc3ae8a8440d6b272a626