Analysis

  • max time kernel
    143s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 10:14

General

  • Target

    b4a8fd9b2e065de34bbb2010559218c4e41f851e789e1b81cfed7641ed17fdb5.exe

  • Size

    100KB

  • MD5

    6acb14ae4bf361e208413633dadbc79d

  • SHA1

    d25582848d1ca699c6e2dcf8925ae8effbec9311

  • SHA256

    b4a8fd9b2e065de34bbb2010559218c4e41f851e789e1b81cfed7641ed17fdb5

  • SHA512

    300d7db59f32fab86cf14722b65f4074d58b731110a77990be9e24cdef1a4fc4a686f6939287f8b88e9a553d9435c10dadc82ac282d75a4b059629eaeca6b03c

  • SSDEEP

    1536:hEHUqQWrI0Sc6YDX/c3FnbM7gCPVYzQxpfROiso25DmQ7:qXhsXZYrcFbMMVzQxX3sZDmQ7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 60 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4a8fd9b2e065de34bbb2010559218c4e41f851e789e1b81cfed7641ed17fdb5.exe
    "C:\Users\Admin\AppData\Local\Temp\b4a8fd9b2e065de34bbb2010559218c4e41f851e789e1b81cfed7641ed17fdb5.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3968
    • \??\c:\Program FilesQQX1R8.exe
      "c:\Program FilesQQX1R8.exe"
      2⤵
      • Executes dropped EXE
      PID:4084
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
        PID:5024

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program FilesQQX1R8.exe

            Filesize

            9KB

            MD5

            13f7743dd13dfaf1ed2c0be0f74cd532

            SHA1

            35041e3f69b672a7f48d7fe9988f9b5541b4e920

            SHA256

            52784cd1b17edbb605f91be276fcec739fde1b98d047d2481fec0e304be69ec5

            SHA512

            4cc8c563bace20cb0be485cde6351028df37addd35deebbefce84df0b3763680a8b09dab6f5125fbcf8884da696d0e9ec5bb5f63de7e70ac89031fafb7341b5a

          • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

            Filesize

            486B

            MD5

            dc28b044ddff518159d63ab97b6caeb0

            SHA1

            146fc93f8803ea8d909419b5b1cc9a1e4bddd275

            SHA256

            03cc2a1e298b2c8fad11a9266776706b8e2662cab42af412e77582b9db70fd0c

            SHA512

            079046edc8d5fe87b0a70321492d033039265b3ea23ade8c1e89639a1c304fa5a91380b1b0cea76ba4eb8c37d169a27e529a8cb36f01e622c43ace8690134f55