Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
Resource
win10v2004-20240426-en
General
-
Target
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
-
Size
53KB
-
MD5
713d26727f5b28b78b189f45667c78bd
-
SHA1
92214eb7a28a865e4991264d2f14ff28ac456e87
-
SHA256
b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8
-
SHA512
71dd4165752360591793a125ec1daae74ff4d657a00b00dfa628ac8565ec3b6f0eab9f8481b8ee35b2af5101db656d3b8066ed35ccae72f9c69ac6375878d33d
-
SSDEEP
1536:vN5g8r8QP4mg7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:T4mgJJjmLM3zRJWZsXy4J9
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rioul.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 rioul.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rioul = "C:\\Users\\Admin\\rioul.exe" rioul.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe 1548 rioul.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3128 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 1548 rioul.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1548 3128 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 89 PID 3128 wrote to memory of 1548 3128 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 89 PID 3128 wrote to memory of 1548 3128 b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe 89 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83 PID 1548 wrote to memory of 3128 1548 rioul.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe"C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\rioul.exe"C:\Users\Admin\rioul.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD58da56e728471a261208f154d33bb00ac
SHA1a047b071054496238bf22abe33f5e7eae43dc0a7
SHA2561917012927035ddc1fbcdc538c2c012a76e0e0e10c8818b6dd4c3d72763fcf39
SHA5120c3f3b572056be591779b52fda09c25ad8fa3ca277284fe36452da875c2210258e5961afed13d95e4afb11d977b27dfd5df3e36b3030d157e89f7b2862de1b1a