Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe
Resource
win10v2004-20220901-en
General
-
Target
b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe
-
Size
272KB
-
MD5
34741c354941a497a6316ca7cf098600
-
SHA1
f55055655fa335c70c95eccd8e66e10d812c33cf
-
SHA256
b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578
-
SHA512
ef0e72c64d13eb11810f34fd9ac50c69ad7a12988ebf26274b7a529c05e01fc4fc2038de7c898ff56703a16197a753cde2080894c171ff9f3c07cd25f0f130e6
-
SSDEEP
3072:2jsOTNg91R0FvbVJznCRcy/hqF69MSs/PLLK+ammU3YwgTeA3a+:DUS8fznHC39G/PLLKU3YwgT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nuqiz.exe -
Executes dropped EXE 1 IoCs
pid Process 888 nuqiz.exe -
Loads dropped DLL 2 IoCs
pid Process 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /h" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /a" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /j" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /d" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /r" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /l" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /s" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /o" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /i" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /x" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /e" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /y" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /n" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /m" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /t" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /v" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /b" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /p" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /z" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /c" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /q" nuqiz.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /w" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /k" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /t" b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /u" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /g" nuqiz.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\nuqiz = "C:\\Users\\Admin\\nuqiz.exe /f" nuqiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe 888 nuqiz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 888 nuqiz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1128 wrote to memory of 888 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 27 PID 1128 wrote to memory of 888 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 27 PID 1128 wrote to memory of 888 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 27 PID 1128 wrote to memory of 888 1128 b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe"C:\Users\Admin\AppData\Local\Temp\b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\nuqiz.exe"C:\Users\Admin\nuqiz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD534741c354941a497a6316ca7cf098600
SHA1f55055655fa335c70c95eccd8e66e10d812c33cf
SHA256b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578
SHA512ef0e72c64d13eb11810f34fd9ac50c69ad7a12988ebf26274b7a529c05e01fc4fc2038de7c898ff56703a16197a753cde2080894c171ff9f3c07cd25f0f130e6
-
Filesize
272KB
MD534741c354941a497a6316ca7cf098600
SHA1f55055655fa335c70c95eccd8e66e10d812c33cf
SHA256b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578
SHA512ef0e72c64d13eb11810f34fd9ac50c69ad7a12988ebf26274b7a529c05e01fc4fc2038de7c898ff56703a16197a753cde2080894c171ff9f3c07cd25f0f130e6
-
Filesize
272KB
MD534741c354941a497a6316ca7cf098600
SHA1f55055655fa335c70c95eccd8e66e10d812c33cf
SHA256b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578
SHA512ef0e72c64d13eb11810f34fd9ac50c69ad7a12988ebf26274b7a529c05e01fc4fc2038de7c898ff56703a16197a753cde2080894c171ff9f3c07cd25f0f130e6
-
Filesize
272KB
MD534741c354941a497a6316ca7cf098600
SHA1f55055655fa335c70c95eccd8e66e10d812c33cf
SHA256b51501ac19c111d144bd41a22f371de0fd32e25e5eaa2d1ad33da2837c3ad578
SHA512ef0e72c64d13eb11810f34fd9ac50c69ad7a12988ebf26274b7a529c05e01fc4fc2038de7c898ff56703a16197a753cde2080894c171ff9f3c07cd25f0f130e6