Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe
Resource
win10v2004-20220901-en
General
-
Target
f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe
-
Size
201KB
-
MD5
7157891f2ee185ed69df5ed62d4b8607
-
SHA1
1916e94ebda1e5241548dc8d530b22039ca3cd1c
-
SHA256
f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a
-
SHA512
8c55a1723724828beecc87cc8a6d56e04fddc4323502443c61c64e6ec1093ac01899b9f47371ce1db059d68d403741fa17142376b7ffc37ba1c52fcd8bc1a634
-
SSDEEP
6144:ht1K/fObT/bGiELOSnkZQxlrUax8NX1v0U9C0IBx5Q3b7aHpI7RVSH5Lv:xK/fObT/bGicnkZQxlrUaKz8pBA3b7aD
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qaaleuf.exe -
Executes dropped EXE 1 IoCs
pid Process 1432 qaaleuf.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /D" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /u" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /z" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /R" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /e" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /y" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /V" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /Q" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /l" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /K" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /j" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /M" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /s" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /p" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /a" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /f" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /Z" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /U" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /b" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /x" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /q" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /Y" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /W" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /d" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /m" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /c" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /o" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /S" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /k" qaaleuf.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /L" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /T" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /I" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /H" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /g" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /B" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /t" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /w" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /E" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /h" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /J" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /r" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /n" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /F" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /X" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /v" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /A" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /C" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /j" f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /G" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /N" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /i" qaaleuf.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\qaaleuf = "C:\\Users\\Admin\\qaaleuf.exe /O" qaaleuf.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe 1432 qaaleuf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 1432 qaaleuf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1432 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 26 PID 2044 wrote to memory of 1432 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 26 PID 2044 wrote to memory of 1432 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 26 PID 2044 wrote to memory of 1432 2044 f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe"C:\Users\Admin\AppData\Local\Temp\f363898791efb1a3cf72da4647a4c049d7ffa20b7f6ad20c8250d0dc8036044a.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\qaaleuf.exe"C:\Users\Admin\qaaleuf.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD537362b80a14e50a64f14ab1fba8e5548
SHA183e33e6f478e70ce3f7c9ab7539f90e2b9bd8dbf
SHA2568100e25d54853fa0f8d962f8712219e754d9de682c313caa0e530535042df7f2
SHA512d94c2db293aaa8bf2ac02e3378f0ffc5d73d9717e7d2ee87adae44709829b8c915aaf84c1fba2a78c34066eb40ce04ecbd956af9c2094e0715cf83845e2839e2
-
Filesize
201KB
MD537362b80a14e50a64f14ab1fba8e5548
SHA183e33e6f478e70ce3f7c9ab7539f90e2b9bd8dbf
SHA2568100e25d54853fa0f8d962f8712219e754d9de682c313caa0e530535042df7f2
SHA512d94c2db293aaa8bf2ac02e3378f0ffc5d73d9717e7d2ee87adae44709829b8c915aaf84c1fba2a78c34066eb40ce04ecbd956af9c2094e0715cf83845e2839e2
-
Filesize
201KB
MD537362b80a14e50a64f14ab1fba8e5548
SHA183e33e6f478e70ce3f7c9ab7539f90e2b9bd8dbf
SHA2568100e25d54853fa0f8d962f8712219e754d9de682c313caa0e530535042df7f2
SHA512d94c2db293aaa8bf2ac02e3378f0ffc5d73d9717e7d2ee87adae44709829b8c915aaf84c1fba2a78c34066eb40ce04ecbd956af9c2094e0715cf83845e2839e2
-
Filesize
201KB
MD537362b80a14e50a64f14ab1fba8e5548
SHA183e33e6f478e70ce3f7c9ab7539f90e2b9bd8dbf
SHA2568100e25d54853fa0f8d962f8712219e754d9de682c313caa0e530535042df7f2
SHA512d94c2db293aaa8bf2ac02e3378f0ffc5d73d9717e7d2ee87adae44709829b8c915aaf84c1fba2a78c34066eb40ce04ecbd956af9c2094e0715cf83845e2839e2