Analysis
-
max time kernel
151s -
max time network
108s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-05-2021 12:46
Static task
static1
Behavioral task
behavioral1
Sample
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe
Resource
win10v20210408
General
-
Target
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe
-
Size
1.0MB
-
MD5
55ac736a7fd1e0a00afb7a1bf889acf5
-
SHA1
dbd3f2f7553d5f3059a7144e2f4ae4f7d9e2e01c
-
SHA256
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e
-
SHA512
3f0d00e4567295501b421e3e749fec215c9a119413b90fde56ac0eefcfd3727eb42bb9456196a818c5990bfb57de1649409dc9d159c2713a294c114160eb05d2
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\XyUYgMgw\\oeckQIEM.exe," 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\XyUYgMgw\\oeckQIEM.exe," 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe -
Modifies visibility of file extensions in Explorer 2 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
IywUYIUY.exeoeckQIEM.exelMgQcYYs.exeSetup.exepid process 2892 IywUYIUY.exe 3780 oeckQIEM.exe 192 lMgQcYYs.exe 1196 Setup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
oeckQIEM.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation oeckQIEM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
oeckQIEM.exelMgQcYYs.exe158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exeIywUYIUY.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oeckQIEM.exe = "C:\\ProgramData\\XyUYgMgw\\oeckQIEM.exe" oeckQIEM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oeckQIEM.exe = "C:\\ProgramData\\XyUYgMgw\\oeckQIEM.exe" lMgQcYYs.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\IywUYIUY.exe = "C:\\Users\\Admin\\fyMgEkUY\\IywUYIUY.exe" 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\IywUYIUY.exe = "C:\\Users\\Admin\\fyMgEkUY\\IywUYIUY.exe" IywUYIUY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oeckQIEM.exe = "C:\\ProgramData\\XyUYgMgw\\oeckQIEM.exe" 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe -
Drops file in System32 directory 4 IoCs
Processes:
lMgQcYYs.exeoeckQIEM.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\fyMgEkUY lMgQcYYs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\fyMgEkUY\IywUYIUY lMgQcYYs.exe File created C:\Windows\SysWOW64\shell32.dll.exe oeckQIEM.exe File opened for modification C:\Windows\SysWOW64\sheProtectStep.jpg oeckQIEM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 3 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exeoeckQIEM.exepid process 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
oeckQIEM.exepid process 3780 oeckQIEM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
oeckQIEM.exepid process 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe 3780 oeckQIEM.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Setup.exepid process 1196 Setup.exe 1196 Setup.exe 1196 Setup.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.execmd.exedescription pid process target process PID 660 wrote to memory of 2892 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe IywUYIUY.exe PID 660 wrote to memory of 2892 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe IywUYIUY.exe PID 660 wrote to memory of 2892 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe IywUYIUY.exe PID 660 wrote to memory of 3780 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe oeckQIEM.exe PID 660 wrote to memory of 3780 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe oeckQIEM.exe PID 660 wrote to memory of 3780 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe oeckQIEM.exe PID 660 wrote to memory of 3744 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe cmd.exe PID 660 wrote to memory of 3744 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe cmd.exe PID 660 wrote to memory of 3744 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe cmd.exe PID 660 wrote to memory of 2216 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 2216 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 2216 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 956 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 956 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 956 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 1284 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 1284 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 660 wrote to memory of 1284 660 158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe reg.exe PID 3744 wrote to memory of 1196 3744 cmd.exe Setup.exe PID 3744 wrote to memory of 1196 3744 cmd.exe Setup.exe PID 3744 wrote to memory of 1196 3744 cmd.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe"C:\Users\Admin\AppData\Local\Temp\158a1982fe4817594301200a8cbadf44d0b893bdd9060f9e7790fae0b556ef9e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\fyMgEkUY\IywUYIUY.exe"C:\Users\Admin\fyMgEkUY\IywUYIUY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\XyUYgMgw\oeckQIEM.exe"C:\ProgramData\XyUYgMgw\oeckQIEM.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Setup.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeC:\Users\Admin\AppData\Local\Temp\Setup.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
-
C:\ProgramData\AmMwEkMQ\lMgQcYYs.exeC:\ProgramData\AmMwEkMQ\lMgQcYYs.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\AmMwEkMQ\lMgQcYYs.exeMD5
99b2f2905f7f0690ce591c606b8c55a3
SHA1ce14bdae8f87322e536ac0cf8ce4620fe04fdc6d
SHA25674ecae225809e3c1fe0d1b795d76dfdd41f6a6f66d238e71bca510c6d27c2a1f
SHA512f940c952aaae0dd922dbbc08d5ee1fd9e4618cf9b1d1c83fe21fc65f86eced13ad0b96cab9d1ed7554106f7531808753f5e87b890884c042250237c68ca079c6
-
C:\ProgramData\AmMwEkMQ\lMgQcYYs.exeMD5
99b2f2905f7f0690ce591c606b8c55a3
SHA1ce14bdae8f87322e536ac0cf8ce4620fe04fdc6d
SHA25674ecae225809e3c1fe0d1b795d76dfdd41f6a6f66d238e71bca510c6d27c2a1f
SHA512f940c952aaae0dd922dbbc08d5ee1fd9e4618cf9b1d1c83fe21fc65f86eced13ad0b96cab9d1ed7554106f7531808753f5e87b890884c042250237c68ca079c6
-
C:\ProgramData\XyUYgMgw\oeckQIEM.exeMD5
9d3123c39b6ec74d7f04b150adb480eb
SHA1f49010252e02a0695b689faa5432ed0eda57973f
SHA256544dbc13df63cdd0723b46f9fdfb55f0e55bb3f5da8f21b956cddac5fe9d193b
SHA512c69a9e9cb5b0e435bbc5763f48a405f4688101287123eeca5ec5d2370539af91d4bfd3736c87471bd3dba9259e06108fd914dcfd4afaa8e3a3a65270bf991323
-
C:\ProgramData\XyUYgMgw\oeckQIEM.exeMD5
9d3123c39b6ec74d7f04b150adb480eb
SHA1f49010252e02a0695b689faa5432ed0eda57973f
SHA256544dbc13df63cdd0723b46f9fdfb55f0e55bb3f5da8f21b956cddac5fe9d193b
SHA512c69a9e9cb5b0e435bbc5763f48a405f4688101287123eeca5ec5d2370539af91d4bfd3736c87471bd3dba9259e06108fd914dcfd4afaa8e3a3a65270bf991323
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeMD5
96f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeMD5
96f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149
-
C:\Users\Admin\fyMgEkUY\IywUYIUY.exeMD5
286bb1450e6afda450968f742231fbba
SHA115887807dda4d7c320e6204677e1758d81a0565d
SHA256e90dca3a771d43e438cd0d799ae66f79b0c6a8b89d8a2ad0665c2d695a0c6e0d
SHA5121a17df021ecef07f06b1125422dd31736e1c0a6fe0ed0fdab70ca1f92c4c66b0c62eb5542f826975fbfa15c5a451328b780751cf42a433148dba7577306542ce
-
C:\Users\Admin\fyMgEkUY\IywUYIUY.exeMD5
286bb1450e6afda450968f742231fbba
SHA115887807dda4d7c320e6204677e1758d81a0565d
SHA256e90dca3a771d43e438cd0d799ae66f79b0c6a8b89d8a2ad0665c2d695a0c6e0d
SHA5121a17df021ecef07f06b1125422dd31736e1c0a6fe0ed0fdab70ca1f92c4c66b0c62eb5542f826975fbfa15c5a451328b780751cf42a433148dba7577306542ce
-
memory/956-124-0x0000000000000000-mapping.dmp
-
memory/1196-126-0x0000000000000000-mapping.dmp
-
memory/1284-125-0x0000000000000000-mapping.dmp
-
memory/2216-123-0x0000000000000000-mapping.dmp
-
memory/2892-114-0x0000000000000000-mapping.dmp
-
memory/3744-122-0x0000000000000000-mapping.dmp
-
memory/3780-117-0x0000000000000000-mapping.dmp