Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-05-2021 02:52
Static task
static1
Behavioral task
behavioral1
Sample
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe
Resource
win10v20210408
General
-
Target
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe
-
Size
1.0MB
-
MD5
aefe361fe383f84049085089e15dc737
-
SHA1
b918b4c4441c522cd277b644f7881512095cfbe6
-
SHA256
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1
-
SHA512
99439c74c5a05ac67deb7fd78f70b1f041963eba2868eb1465b27185617873a168828a9e42ceb9ac8ef464fedb2da00c3ca9a3b66b34b01c8964fedd44264621
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\vQQAIMIk\\SOAccIAw.exe," 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\vQQAIMIk\\SOAccIAw.exe," 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
AWIIYAAg.exeSOAccIAw.exeQOEoQUEQ.exeSetup.exepid process 1756 AWIIYAAg.exe 3736 SOAccIAw.exe 2716 QOEoQUEQ.exe 1084 Setup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SOAccIAw.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation SOAccIAw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exeAWIIYAAg.exeSOAccIAw.exeQOEoQUEQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AWIIYAAg.exe = "C:\\Users\\Admin\\KssUMgMY\\AWIIYAAg.exe" 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SOAccIAw.exe = "C:\\ProgramData\\vQQAIMIk\\SOAccIAw.exe" 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\AWIIYAAg.exe = "C:\\Users\\Admin\\KssUMgMY\\AWIIYAAg.exe" AWIIYAAg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SOAccIAw.exe = "C:\\ProgramData\\vQQAIMIk\\SOAccIAw.exe" SOAccIAw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SOAccIAw.exe = "C:\\ProgramData\\vQQAIMIk\\SOAccIAw.exe" QOEoQUEQ.exe -
Drops file in System32 directory 8 IoCs
Processes:
QOEoQUEQ.exeSOAccIAw.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\KssUMgMY QOEoQUEQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\KssUMgMY\AWIIYAAg QOEoQUEQ.exe File created C:\Windows\SysWOW64\shell32.dll.exe SOAccIAw.exe File opened for modification C:\Windows\SysWOW64\sheCloseRedo.wma SOAccIAw.exe File opened for modification C:\Windows\SysWOW64\sheCompleteConnect.bmp SOAccIAw.exe File opened for modification C:\Windows\SysWOW64\sheCompressConvert.docx SOAccIAw.exe File opened for modification C:\Windows\SysWOW64\sheConvertToConvertFrom.jpg SOAccIAw.exe File opened for modification C:\Windows\SysWOW64\sheUnlockInvoke.xlsm SOAccIAw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exeSOAccIAw.exepid process 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SOAccIAw.exepid process 3736 SOAccIAw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
SOAccIAw.exepid process 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe 3736 SOAccIAw.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Setup.exepid process 1084 Setup.exe 1084 Setup.exe 1084 Setup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.execmd.exedescription pid process target process PID 856 wrote to memory of 1756 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe AWIIYAAg.exe PID 856 wrote to memory of 1756 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe AWIIYAAg.exe PID 856 wrote to memory of 1756 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe AWIIYAAg.exe PID 856 wrote to memory of 3736 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe SOAccIAw.exe PID 856 wrote to memory of 3736 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe SOAccIAw.exe PID 856 wrote to memory of 3736 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe SOAccIAw.exe PID 856 wrote to memory of 496 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe cmd.exe PID 856 wrote to memory of 496 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe cmd.exe PID 856 wrote to memory of 496 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe cmd.exe PID 856 wrote to memory of 652 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 652 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 652 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 3596 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 3596 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 3596 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 2284 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 2284 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 856 wrote to memory of 2284 856 94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe reg.exe PID 496 wrote to memory of 1084 496 cmd.exe Setup.exe PID 496 wrote to memory of 1084 496 cmd.exe Setup.exe PID 496 wrote to memory of 1084 496 cmd.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe"C:\Users\Admin\AppData\Local\Temp\94cbc3c99cf5fe566336268bce3d686f379fbdda333942fdcd4237d9976014d1.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\KssUMgMY\AWIIYAAg.exe"C:\Users\Admin\KssUMgMY\AWIIYAAg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\vQQAIMIk\SOAccIAw.exe"C:\ProgramData\vQQAIMIk\SOAccIAw.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\ProgramData\QegAAkck\QOEoQUEQ.exeC:\ProgramData\QegAAkck\QOEoQUEQ.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\QegAAkck\QOEoQUEQ.exeMD5
bf30dd467ea8dfa7f39b4d8dcc5bdfe8
SHA194d2eff5b0bfd5e111b164bc203b3a27bd9050a9
SHA2562bf8dbc5d66e8dbf66b739851c65788fd458fd562cd9f4829e9cacc296a9dbc7
SHA5122278a3413e417bef119957cd27690ad4fa53b72c83c87486380b3ffd914eb40b4705c4e91d3e9f014fcae1c151cb2a69a69291414f61ad252473b8a39f4b4545
-
C:\ProgramData\QegAAkck\QOEoQUEQ.exeMD5
bf30dd467ea8dfa7f39b4d8dcc5bdfe8
SHA194d2eff5b0bfd5e111b164bc203b3a27bd9050a9
SHA2562bf8dbc5d66e8dbf66b739851c65788fd458fd562cd9f4829e9cacc296a9dbc7
SHA5122278a3413e417bef119957cd27690ad4fa53b72c83c87486380b3ffd914eb40b4705c4e91d3e9f014fcae1c151cb2a69a69291414f61ad252473b8a39f4b4545
-
C:\ProgramData\vQQAIMIk\SOAccIAw.exeMD5
19ba4fccc651ee035f5d781f6f1cdad5
SHA1e1cd819ed20f4333b241733e025b49b7c88ceb4a
SHA2566b97d293b69cd4d74aaa1adf470aeeab4bd69d5710d6655138aa91748831a2be
SHA5125de20346ff6d2bde2c0fbb89def10ee525318faa683208e276225e9c552fc75e1b236123c0c6f6f659389087239f1f2e28b06770923d346e1fff336a00251242
-
C:\ProgramData\vQQAIMIk\SOAccIAw.exeMD5
19ba4fccc651ee035f5d781f6f1cdad5
SHA1e1cd819ed20f4333b241733e025b49b7c88ceb4a
SHA2566b97d293b69cd4d74aaa1adf470aeeab4bd69d5710d6655138aa91748831a2be
SHA5125de20346ff6d2bde2c0fbb89def10ee525318faa683208e276225e9c552fc75e1b236123c0c6f6f659389087239f1f2e28b06770923d346e1fff336a00251242
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeMD5
96f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeMD5
96f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
C:\Users\Admin\KssUMgMY\AWIIYAAg.exeMD5
e1a9d1ef722bbf09efe62110cbb3602b
SHA13f4d224c1df87da9dee874d39132641ffcc8d3d9
SHA256c641804ac0e743ef25dbd83f92cae81f41ea00fa13985e780608fc32e2821b70
SHA5126aeeeb25276a9c364e79ddaf69932dbc7d857e3bf89fff1248df6a34764852cec00c4437bf190a8a6254a0524dbe73f4074fb7a915b68e95018a66d1932b918b
-
C:\Users\Admin\KssUMgMY\AWIIYAAg.exeMD5
e1a9d1ef722bbf09efe62110cbb3602b
SHA13f4d224c1df87da9dee874d39132641ffcc8d3d9
SHA256c641804ac0e743ef25dbd83f92cae81f41ea00fa13985e780608fc32e2821b70
SHA5126aeeeb25276a9c364e79ddaf69932dbc7d857e3bf89fff1248df6a34764852cec00c4437bf190a8a6254a0524dbe73f4074fb7a915b68e95018a66d1932b918b
-
memory/496-122-0x0000000000000000-mapping.dmp
-
memory/652-123-0x0000000000000000-mapping.dmp
-
memory/1084-126-0x0000000000000000-mapping.dmp
-
memory/1756-114-0x0000000000000000-mapping.dmp
-
memory/2284-125-0x0000000000000000-mapping.dmp
-
memory/3596-124-0x0000000000000000-mapping.dmp
-
memory/3736-117-0x0000000000000000-mapping.dmp