Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe
Resource
win10v2004-20220812-en
General
-
Target
ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe
-
Size
180KB
-
MD5
580084454658f7559f3ad64eb73314c4
-
SHA1
15831f495c9172ab607c8d53afa21a4b5d6ab266
-
SHA256
ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e
-
SHA512
029489fb4982410c6ab01e603cf596ebec9df288d0b5566416d7cacf65f81b9df0b8e0674d3f71b7e29c92268f80bfc216d99f33e15e223c963533990e2f4432
-
SSDEEP
1536:Or0zzktutKMUG2cFksJY6LQBkRr7lvoqzv4cJ5J31:RvxzS6LQyte+xJ31
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wqxaej.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 wqxaej.exe -
Loads dropped DLL 2 IoCs
pid Process 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /d" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /g" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /y" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /j" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /k" wqxaej.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /a" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /c" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /f" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /i" ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /v" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /u" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /b" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /w" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /o" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /i" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /h" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /q" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /z" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /r" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /x" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /n" wqxaej.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /m" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /l" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /t" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /p" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /s" wqxaej.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqxaej = "C:\\Users\\Admin\\wqxaej.exe /e" wqxaej.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe 2028 wqxaej.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 2028 wqxaej.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2028 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 27 PID 1768 wrote to memory of 2028 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 27 PID 1768 wrote to memory of 2028 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 27 PID 1768 wrote to memory of 2028 1768 ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe"C:\Users\Admin\AppData\Local\Temp\ecf3f4187aaa4e3044486af627b69cc6534c1fc4737ab42c264f50bc1e4dfc4e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\wqxaej.exe"C:\Users\Admin\wqxaej.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5e11260e3c3590e7c75f0f79e83b44ddb
SHA138fc0b764c9863a1fdf30cc4476202e9e245e5a5
SHA256c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3
SHA51223346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d
-
Filesize
180KB
MD5e11260e3c3590e7c75f0f79e83b44ddb
SHA138fc0b764c9863a1fdf30cc4476202e9e245e5a5
SHA256c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3
SHA51223346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d
-
Filesize
180KB
MD5e11260e3c3590e7c75f0f79e83b44ddb
SHA138fc0b764c9863a1fdf30cc4476202e9e245e5a5
SHA256c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3
SHA51223346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d
-
Filesize
180KB
MD5e11260e3c3590e7c75f0f79e83b44ddb
SHA138fc0b764c9863a1fdf30cc4476202e9e245e5a5
SHA256c5d5f9b13bee4f510568065d3ce5053bf2205e244fc3326a9591b2ca55551ce3
SHA51223346fbbe1d5089e6a279a1d11f9d0c083da9b805efeab77cc8c0d6fde2a2c9867204aaae97c3051e889f2189026efacfe72da2b77fdf27986fa732aa40bc53d