Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:23

General

  • Target

    82fe1cb654ed198cb26d1f731dc419185c0e02af3047033a7639c30d20be09ea.exe

  • Size

    148KB

  • MD5

    6bf3fe85aeab583ab924dd8ac8521d3c

  • SHA1

    341859322d40463240fe4dd34b7e688da5c88fbc

  • SHA256

    82fe1cb654ed198cb26d1f731dc419185c0e02af3047033a7639c30d20be09ea

  • SHA512

    eaf8bb5e8faba8648801bcd7d0753c5fbdd173e4be73b77d1727353c6d32cb62b4034713f49c4350cc724acc12b51e7bc921d1a81ef084ed23b83c909729b2a2

  • SSDEEP

    1536:vo9L2Of4BlqPAKTxnX+PBcRlouQvSPouXZ6D6Jj5wl+dwCMZUbP7K2YhxYAZxZC6:AoKalqPpd+Pco6ouZ68Kl+dnMZUbpi

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82fe1cb654ed198cb26d1f731dc419185c0e02af3047033a7639c30d20be09ea.exe
    "C:\Users\Admin\AppData\Local\Temp\82fe1cb654ed198cb26d1f731dc419185c0e02af3047033a7639c30d20be09ea.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\qpdiid.exe
      "C:\Users\Admin\qpdiid.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1076

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qpdiid.exe

          Filesize

          148KB

          MD5

          2d7818ef8c6a832459453315addec0f2

          SHA1

          85cd2ff9adb2ed62a6a37362a4b406bb9669fa17

          SHA256

          ce4fa9486ec894f05c5b8d90e50e84ef373882ead759d622f49ea03777d7ce94

          SHA512

          a8e1b3a126d45dae3f497fca28007e4d45a42758d7ab8b14ad9dc931c22b63e41ab6893c1afc5e4f35a56761a17dd187716b384904493f39d4e4131350bf7594

        • C:\Users\Admin\qpdiid.exe

          Filesize

          148KB

          MD5

          2d7818ef8c6a832459453315addec0f2

          SHA1

          85cd2ff9adb2ed62a6a37362a4b406bb9669fa17

          SHA256

          ce4fa9486ec894f05c5b8d90e50e84ef373882ead759d622f49ea03777d7ce94

          SHA512

          a8e1b3a126d45dae3f497fca28007e4d45a42758d7ab8b14ad9dc931c22b63e41ab6893c1afc5e4f35a56761a17dd187716b384904493f39d4e4131350bf7594

        • memory/1076-140-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1076-142-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1196-132-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB

        • memory/1196-141-0x0000000000400000-0x0000000000427000-memory.dmp

          Filesize

          156KB