Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 16:03
Static task
static1
Behavioral task
behavioral1
Sample
9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe
Resource
win10v2004-20220901-en
General
-
Target
9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe
-
Size
156KB
-
MD5
5c8fcc6e788812f08afccc5dd83d5d7e
-
SHA1
d479b0e8b57916b12776771d59fe49e25f3249f0
-
SHA256
9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d
-
SHA512
28e5412cc793b328f78b4ae40751f59bfcf8eae00463ca1f32a5a471b711d302644eb39d0296825794fbc4848be1fc4f77cca9af211fdb41ea675871d32b8a98
-
SSDEEP
3072:lfpKozn0UIhCjG8G3GbGVGBGfGuGxGWYcrf6KadU:lfooz0NAYcD6Kad
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qodef.exe -
Executes dropped EXE 1 IoCs
pid Process 4468 qodef.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qodef.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qodef = "C:\\Users\\Admin\\qodef.exe" qodef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe 4468 qodef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe 4468 qodef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4468 2796 9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe 86 PID 2796 wrote to memory of 4468 2796 9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe 86 PID 2796 wrote to memory of 4468 2796 9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe 86 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81 PID 4468 wrote to memory of 2796 4468 qodef.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe"C:\Users\Admin\AppData\Local\Temp\9d79cf4ece8255c0eee7fdf82838bfe124db5c7568875a65ae1e00c8210c401d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\qodef.exe"C:\Users\Admin\qodef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD549e49ff1055eb2ed3a342537afd43892
SHA1dfbb6e2a864a7a9683f50b172f2b4f30b766586c
SHA256ba891d46d037fbfb3c6851772382cef33bbeca5c12cd5606837521172d3a234e
SHA5125d289d877f923402adab036c62cea3f9c46e91c8bb736c8cd98a2cefd5c1d89808fe64bc620698529cc161d9f08c08b7b6c67a3b8dbd4550d241b811d826ef7d
-
Filesize
156KB
MD549e49ff1055eb2ed3a342537afd43892
SHA1dfbb6e2a864a7a9683f50b172f2b4f30b766586c
SHA256ba891d46d037fbfb3c6851772382cef33bbeca5c12cd5606837521172d3a234e
SHA5125d289d877f923402adab036c62cea3f9c46e91c8bb736c8cd98a2cefd5c1d89808fe64bc620698529cc161d9f08c08b7b6c67a3b8dbd4550d241b811d826ef7d