Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe
Resource
win10v2004-20220812-en
General
-
Target
5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe
-
Size
268KB
-
MD5
6f130f9c3eb29e87b84d9d7979ef9e8c
-
SHA1
d1c66f06ca5d51c47611427df7b0295bcbb1cd99
-
SHA256
5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1
-
SHA512
08e9b8149131d84021055450d29ea056246f8d4c97251ed91da5a6e46152619b83b4b01641bec0fc3b4dd1f780300799a941bb25395bfdde51b9bbcc064e2410
-
SSDEEP
6144:i/PpbZRZl8z94sYxeTfXys6zlbG95POPHQ7TlSqSeiD4/uhHCA4ydSZb0ng:i/PpbZRn8z94da64RyHQ7TlUJ4/uLng
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jsqer.exe -
Executes dropped EXE 1 IoCs
pid Process 4264 jsqer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /U" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /p" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /C" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /v" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /q" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /x" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /D" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /n" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /F" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /j" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /J" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /O" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /I" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /k" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /f" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /P" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /b" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /M" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /A" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /m" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /N" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /a" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /L" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /l" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /K" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /e" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /R" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /V" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /Z" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /X" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /S" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /h" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /s" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /d" jsqer.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /E" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /o" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /Y" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /u" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /t" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /T" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /W" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /w" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /z" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /r" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /y" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /B" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /G" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /Q" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /c" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /g" jsqer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jsqer = "C:\\Users\\Admin\\jsqer.exe /i" jsqer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe 4264 jsqer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2252 5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe 4264 jsqer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4264 2252 5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe 84 PID 2252 wrote to memory of 4264 2252 5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe 84 PID 2252 wrote to memory of 4264 2252 5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe"C:\Users\Admin\AppData\Local\Temp\5f73432218ea7ab103baa2bca7c1501a62e4b2c0e594af19ec2ac31608e7e6c1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\jsqer.exe"C:\Users\Admin\jsqer.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5ffb6943085ef147dd48e8d96fae771ce
SHA1a035ce783b90fc0b864aab171d7538e77f892f62
SHA25619d52f44e422f8dd6314b3e683266ddd71b4be6aa68ae44bf85bb09a566c69fd
SHA512a7e7746687b376697affd490b2ba3e612c0ade3bbb309755afbb5ff5c1b96c0eede3a00c27c8fc2e9ea127bb011fccaa9a0b42142b1b504da21fd2385a9ad6ed
-
Filesize
268KB
MD5ffb6943085ef147dd48e8d96fae771ce
SHA1a035ce783b90fc0b864aab171d7538e77f892f62
SHA25619d52f44e422f8dd6314b3e683266ddd71b4be6aa68ae44bf85bb09a566c69fd
SHA512a7e7746687b376697affd490b2ba3e612c0ade3bbb309755afbb5ff5c1b96c0eede3a00c27c8fc2e9ea127bb011fccaa9a0b42142b1b504da21fd2385a9ad6ed