Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 03:24

General

  • Target

    3ea0778d93937fd64b2b6dbf71bdf155a5ed51b82af039b6510dc751c8353fb0.exe

  • Size

    135KB

  • MD5

    6dd0e6bac4a35e242db0b121bdeba4c0

  • SHA1

    25e5f7dd6dba9c0d89bfb65ba9793a36a9795c51

  • SHA256

    3ea0778d93937fd64b2b6dbf71bdf155a5ed51b82af039b6510dc751c8353fb0

  • SHA512

    759d748062663509b76b91277a5a4c7cd3b7f0f4e03f35f01678d33d1040513a6f7c11ac57ae47172319969e7398e41b028de2f2ef61582124e0ec860062b052

  • SSDEEP

    3072:D0FZn5ygMUPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTtVS:4FZn5ySoIDbByGPMsMP

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea0778d93937fd64b2b6dbf71bdf155a5ed51b82af039b6510dc751c8353fb0.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea0778d93937fd64b2b6dbf71bdf155a5ed51b82af039b6510dc751c8353fb0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\qaoozu.exe
      "C:\Users\Admin\qaoozu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qaoozu.exe

    Filesize

    135KB

    MD5

    d84b0be90f3f5bca365daa809d525a02

    SHA1

    bb4853e0e7abaa8bdda3cc74dfabad9e739fc10b

    SHA256

    794ae2320bc61b2b65b2de3865e0d0015681e8389f6b2b380611dc48d4b8e3b2

    SHA512

    bb07362a8ea2a31f9baa317bed181593b7b31887c3db8f0d39b70d4b12c53f067f0f72c15c6802570130e3740c1da22cf51dd7f505c53d86ce33af4d24c2fb20

  • C:\Users\Admin\qaoozu.exe

    Filesize

    135KB

    MD5

    d84b0be90f3f5bca365daa809d525a02

    SHA1

    bb4853e0e7abaa8bdda3cc74dfabad9e739fc10b

    SHA256

    794ae2320bc61b2b65b2de3865e0d0015681e8389f6b2b380611dc48d4b8e3b2

    SHA512

    bb07362a8ea2a31f9baa317bed181593b7b31887c3db8f0d39b70d4b12c53f067f0f72c15c6802570130e3740c1da22cf51dd7f505c53d86ce33af4d24c2fb20

  • memory/2244-140-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2244-142-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/4948-134-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/4948-141-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB