Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 17:54
Static task
static1
Behavioral task
behavioral1
Sample
DCQPKX.bin
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
DCQPKX.bin
Resource
win10-en-20211014
General
-
Target
DCQPKX.bin
-
Size
118KB
-
MD5
10f237e6da56cf46bfd0ea8c22544bee
-
SHA1
d83d7974796fd286f24dd606cf11b444ca55e249
-
SHA256
6f4c49af2816b18488a1f4e2c08380c719df849c7030652e4971332ba3100927
-
SHA512
834b6c9b3cfe740c3c0560f974e399d9efd2ca4586580bf148a43285b2cc4c0ad21ed05869587143be448f6fb42fa4b8dea9f2a2c585c4bfb77ba8056130c1ab
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Argos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "empty" Argos.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Argos.exepid process 4632 Argos.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
Argos.exedescription ioc process File created C:\Users\Admin\Downloads\desktop.ini Argos.exe -
Drops file in Program Files directory 3 IoCs
Processes:
DCQPKX.bindescription ioc process File created C:\Program Files\System32\README.txt DCQPKX.bin File created C:\Program Files\System32\Argos.exe DCQPKX.bin File created C:\Program Files\System32\Bunifu_UI_v1.52.dll DCQPKX.bin -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
DCQPKX.binArgos.exepid process 3848 DCQPKX.bin 3848 DCQPKX.bin 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DCQPKX.binArgos.exedescription pid process Token: SeDebugPrivilege 3848 DCQPKX.bin Token: SeDebugPrivilege 4632 Argos.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Argos.exepid process 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe 4632 Argos.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exeDCQPKX.bindescription pid process target process PID 796 wrote to memory of 3848 796 cmd.exe DCQPKX.bin PID 796 wrote to memory of 3848 796 cmd.exe DCQPKX.bin PID 3848 wrote to memory of 4632 3848 DCQPKX.bin Argos.exe PID 3848 wrote to memory of 4632 3848 DCQPKX.bin Argos.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DCQPKX.bin1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DCQPKX.binC:\Users\Admin\AppData\Local\Temp\DCQPKX.bin2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\System32\Argos.exe"C:\Program Files\System32\Argos.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\System32\Argos.exeMD5
85149ce849c4468a1cd6179c88814de2
SHA144099a40b7af2da7e7435d62de84589813580178
SHA2567bb72f6d4ea8c4008bf51cc0817db28cbf18bdaa3862509d6aa0f842d7822daf
SHA512d3b1d7a0bded732c51f838116a66d7ae361f1a9c785a1b4ae774b512199182588e12c2489ee75785b291455f87e2dc3a3d1cb92b00c8cb0ce0e60db86cd74272
-
C:\Program Files\System32\Argos.exeMD5
85149ce849c4468a1cd6179c88814de2
SHA144099a40b7af2da7e7435d62de84589813580178
SHA2567bb72f6d4ea8c4008bf51cc0817db28cbf18bdaa3862509d6aa0f842d7822daf
SHA512d3b1d7a0bded732c51f838116a66d7ae361f1a9c785a1b4ae774b512199182588e12c2489ee75785b291455f87e2dc3a3d1cb92b00c8cb0ce0e60db86cd74272
-
C:\Users\Admin\Desktop\._cache_ARGOS.exeMD5
8ed6556cd7f9533c8c2657eb0250219b
SHA1a2e40c11b14efe1d8c1b4e602e6257b4545fd95e
SHA2560067207bcaeba1d05b5a6d985f93fecd33c4d091825a30a60e6757e56c07f2b0
SHA5126d9186ea6674ba1c9a1ea9fa036196fd764e9c41e149fd884529dd6bc21ba9bcd132689050a0a229af1055d35617e23fad3c11feac8f5f51e8531c195f9191bc
-
C:\Users\Admin\Desktop\README.txtMD5
8b3e49acf59c25c4bc99e11fe8e06f21
SHA120f1b205454871df2862cda882bd6150a97823ec
SHA2563f618be70b390efbbffc37ebda76d8ae1e48155be72ff796d187c7891754875b
SHA512a0026bacecd0b6f8b7efc5d87c1f10ced199d76b3cd4c29dc31f330d9582db350b052551ad7c215483147b89435c521cabbc2fc663433c72725c792ba9ce1c6f
-
memory/3848-116-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/3848-118-0x000000001AD20000-0x000000001AD22000-memory.dmpFilesize
8KB
-
memory/3848-115-0x0000000000000000-mapping.dmp
-
memory/4632-122-0x0000000000630000-0x0000000000631000-memory.dmpFilesize
4KB
-
memory/4632-126-0x000000001B264000-0x000000001B265000-memory.dmpFilesize
4KB
-
memory/4632-125-0x000000001B262000-0x000000001B264000-memory.dmpFilesize
8KB
-
memory/4632-124-0x000000001B260000-0x000000001B262000-memory.dmpFilesize
8KB
-
memory/4632-119-0x0000000000000000-mapping.dmp
-
memory/4632-129-0x000000001B265000-0x000000001B267000-memory.dmpFilesize
8KB