Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 16:03

General

  • Target

    9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe

  • Size

    156KB

  • MD5

    5c8fcc6e788812f08afccc5dd83d5d7e

  • SHA1

    d479b0e8b57916b12776771d59fe49e25f3249f0

  • SHA256

    9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d

  • SHA512

    28e5412cc793b328f78b4ae40751f59bfcf8eae00463ca1f32a5a471b711d302644eb39d0296825794fbc4848be1fc4f77cca9af211fdb41ea675871d32b8a98

  • SSDEEP

    3072:lfpKozn0UIhCjG8G3GbGVGBGfGuGxGWYcrf6KadU:lfooz0NAYcD6Kad

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe
    "C:\Users\Admin\AppData\Local\Temp\9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\qodef.exe
      "C:\Users\Admin\qodef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qodef.exe

    Filesize

    156KB

    MD5

    49e49ff1055eb2ed3a342537afd43892

    SHA1

    dfbb6e2a864a7a9683f50b172f2b4f30b766586c

    SHA256

    ba891d46d037fbfb3c6851772382cef33bbeca5c12cd5606837521172d3a234e

    SHA512

    5d289d877f923402adab036c62cea3f9c46e91c8bb736c8cd98a2cefd5c1d89808fe64bc620698529cc161d9f08c08b7b6c67a3b8dbd4550d241b811d826ef7d

  • C:\Users\Admin\qodef.exe

    Filesize

    156KB

    MD5

    49e49ff1055eb2ed3a342537afd43892

    SHA1

    dfbb6e2a864a7a9683f50b172f2b4f30b766586c

    SHA256

    ba891d46d037fbfb3c6851772382cef33bbeca5c12cd5606837521172d3a234e

    SHA512

    5d289d877f923402adab036c62cea3f9c46e91c8bb736c8cd98a2cefd5c1d89808fe64bc620698529cc161d9f08c08b7b6c67a3b8dbd4550d241b811d826ef7d

  • memory/4468-134-0x0000000000000000-mapping.dmp