Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 16:25

General

  • Target

    3c69381e70a99c1575e457958161d7d07af451ced45b14679fff83f4f3a8a372.exe

  • Size

    256KB

  • MD5

    5adbe713b0281d6a333482b4490e4d53

  • SHA1

    09cc73d070ac23bbd4e3d3330027bd682e97fb40

  • SHA256

    3c69381e70a99c1575e457958161d7d07af451ced45b14679fff83f4f3a8a372

  • SHA512

    a4cf42a1573f24a6e8e34d29358888cdf44ae8e5c965af445be52e0aee524d06855e7ab1dfd142c9ed6d67e16596ddacc7287a38d79b655843db02225e1b5636

  • SSDEEP

    1536:feYav3oi8TLWKsWHbrDFdRhUbZrQBXz9V/haD8j7MktNGoFoCfNRrXe4W4X1yD9P:W4i8T52rQNTIYkJ

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c69381e70a99c1575e457958161d7d07af451ced45b14679fff83f4f3a8a372.exe
    "C:\Users\Admin\AppData\Local\Temp\3c69381e70a99c1575e457958161d7d07af451ced45b14679fff83f4f3a8a372.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Users\Admin\qkciom.exe
      "C:\Users\Admin\qkciom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qkciom.exe

    Filesize

    256KB

    MD5

    f194e651fb132d620bf5f4d4f2aa59c4

    SHA1

    271baedf731da884969aa946d2f63af72026e049

    SHA256

    b6919317e0b053804a3c1f6038215216e42fe797067a6e0b7accd0bb571e7cb8

    SHA512

    06cf4d9f48e2208099c668d51a31330579ba1a3577f4b61851dba2411e851d1f744f20217c1d31b5c248c180338e53b9d011a506fee46974c6bb9bd2c78f22ea

  • C:\Users\Admin\qkciom.exe

    Filesize

    256KB

    MD5

    f194e651fb132d620bf5f4d4f2aa59c4

    SHA1

    271baedf731da884969aa946d2f63af72026e049

    SHA256

    b6919317e0b053804a3c1f6038215216e42fe797067a6e0b7accd0bb571e7cb8

    SHA512

    06cf4d9f48e2208099c668d51a31330579ba1a3577f4b61851dba2411e851d1f744f20217c1d31b5c248c180338e53b9d011a506fee46974c6bb9bd2c78f22ea