Analysis
-
max time kernel
152s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 03:09
Static task
static1
Behavioral task
behavioral1
Sample
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
Resource
win10v2004-20220812-en
General
-
Target
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe
-
Size
252KB
-
MD5
687e67eda70f1f0792ed620dde8d3c75
-
SHA1
0ce413439a05778d8a160f905b2f6f88952cfe56
-
SHA256
3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8
-
SHA512
f70397eb2ff1e0b87d01e68af4b1e2695bf5a52e6b3fb118d5552ed4341db1b1931324327bc70c23f766e2a312961765fc30677e0ef70cb9c708a09f67bf290e
-
SSDEEP
3072:xl0QmgYg9bVtgfzFHfzb51QRPr8GDi/7:xlWg59joFJyr8Gu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kiquk.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 kiquk.exe -
Loads dropped DLL 2 IoCs
pid Process 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe -
Adds Run key to start application 2 TTPs 49 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /B" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /D" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /l" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /z" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /o" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /a" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /g" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /t" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /N" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /L" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /O" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /i" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /m" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /I" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /T" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /F" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /c" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /u" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /V" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /G" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /H" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /s" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /K" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /Z" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /h" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /b" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /y" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /e" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /f" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /j" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /C" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /Y" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /k" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /E" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /w" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /p" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /q" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /P" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /n" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /R" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /Q" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /x" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /v" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /d" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /r" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /U" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /J" kiquk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\kiquk = "C:\\Users\\Admin\\kiquk.exe /S" kiquk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe 1760 kiquk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 1760 kiquk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 1760 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 27 PID 1220 wrote to memory of 1760 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 27 PID 1220 wrote to memory of 1760 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 27 PID 1220 wrote to memory of 1760 1220 3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe 27 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16 PID 1760 wrote to memory of 1220 1760 kiquk.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe"C:\Users\Admin\AppData\Local\Temp\3bd726beda054e03901263aa2bebdd00d3f9b7d0e41ddc01bf4d64d00bbde9d8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\kiquk.exe"C:\Users\Admin\kiquk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5d23c2af662f36cd174d1a5ece6937242
SHA16e0d934690934dfeaa2933c992862a026e69c13e
SHA256f0d127312cbfeb1fa290b6df262fdf82dc356c1340ea0c09ea4f65cf38829691
SHA5122c9c895d5d7cb58b6f7bfdd52d44c66245990591e715c78382aeb13479db88aa6dca93357b6a75fc285cf44b59540091445ef9834c429174fa4ec27aa11bcaf8
-
Filesize
252KB
MD5d23c2af662f36cd174d1a5ece6937242
SHA16e0d934690934dfeaa2933c992862a026e69c13e
SHA256f0d127312cbfeb1fa290b6df262fdf82dc356c1340ea0c09ea4f65cf38829691
SHA5122c9c895d5d7cb58b6f7bfdd52d44c66245990591e715c78382aeb13479db88aa6dca93357b6a75fc285cf44b59540091445ef9834c429174fa4ec27aa11bcaf8
-
Filesize
252KB
MD5d23c2af662f36cd174d1a5ece6937242
SHA16e0d934690934dfeaa2933c992862a026e69c13e
SHA256f0d127312cbfeb1fa290b6df262fdf82dc356c1340ea0c09ea4f65cf38829691
SHA5122c9c895d5d7cb58b6f7bfdd52d44c66245990591e715c78382aeb13479db88aa6dca93357b6a75fc285cf44b59540091445ef9834c429174fa4ec27aa11bcaf8
-
Filesize
252KB
MD5d23c2af662f36cd174d1a5ece6937242
SHA16e0d934690934dfeaa2933c992862a026e69c13e
SHA256f0d127312cbfeb1fa290b6df262fdf82dc356c1340ea0c09ea4f65cf38829691
SHA5122c9c895d5d7cb58b6f7bfdd52d44c66245990591e715c78382aeb13479db88aa6dca93357b6a75fc285cf44b59540091445ef9834c429174fa4ec27aa11bcaf8