Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 03:49
Static task
static1
Behavioral task
behavioral1
Sample
79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe
Resource
win10v2004-20220812-en
General
-
Target
79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe
-
Size
240KB
-
MD5
5c4d975444a7061e72aa88c8119d50a3
-
SHA1
a6252fa5128709e8ba36bd627ee6eb191e7dcab5
-
SHA256
79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638
-
SHA512
2a26697d51dbcf4072b8c9dbaab32d45e62c0621825d00fd466bec0d77528e4b50039bac6b5a684545d52e19b63e17b9b9444704a45f3c3aa795311abfce4d19
-
SSDEEP
6144:eUA53dwqsNwemAB0EqxF6snji81RUinKchhytS3+:udQQJsUu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" koaqo.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 koaqo.exe -
Loads dropped DLL 2 IoCs
pid Process 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /k" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /e" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /u" koaqo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /p" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /b" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /r" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /n" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /x" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /f" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /v" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /t" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /o" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /s" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /i" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /q" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /z" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /d" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /j" 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /c" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /w" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /a" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /y" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /l" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /m" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /h" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /g" koaqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\koaqo = "C:\\Users\\Admin\\koaqo.exe /j" koaqo.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ koaqo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe 1956 koaqo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 1956 koaqo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 288 wrote to memory of 1956 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 28 PID 288 wrote to memory of 1956 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 28 PID 288 wrote to memory of 1956 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 28 PID 288 wrote to memory of 1956 288 79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe"C:\Users\Admin\AppData\Local\Temp\79b8d1478cb641cd8e21a015e350c7be63d66715b72662ce535cec46ba3d9638.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\koaqo.exe"C:\Users\Admin\koaqo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD536dc7ff3748253ecb03967004c95df36
SHA183a7ef8de81788cea47b81fe9e294a3eda341fe4
SHA256bd3bf3c70f852ba2658ce612bec4ee49e1a5284c83dc85b07f17b1d2a4c0113b
SHA5125c864838db18c56f9771c08bdd5fde2b84bae72569842799d48e30d94b625e43819c840441ef63f9e3a85b0ed7c487e2a4a37c222d583234d54887b1ec265afa
-
Filesize
240KB
MD536dc7ff3748253ecb03967004c95df36
SHA183a7ef8de81788cea47b81fe9e294a3eda341fe4
SHA256bd3bf3c70f852ba2658ce612bec4ee49e1a5284c83dc85b07f17b1d2a4c0113b
SHA5125c864838db18c56f9771c08bdd5fde2b84bae72569842799d48e30d94b625e43819c840441ef63f9e3a85b0ed7c487e2a4a37c222d583234d54887b1ec265afa
-
Filesize
240KB
MD536dc7ff3748253ecb03967004c95df36
SHA183a7ef8de81788cea47b81fe9e294a3eda341fe4
SHA256bd3bf3c70f852ba2658ce612bec4ee49e1a5284c83dc85b07f17b1d2a4c0113b
SHA5125c864838db18c56f9771c08bdd5fde2b84bae72569842799d48e30d94b625e43819c840441ef63f9e3a85b0ed7c487e2a4a37c222d583234d54887b1ec265afa
-
Filesize
240KB
MD536dc7ff3748253ecb03967004c95df36
SHA183a7ef8de81788cea47b81fe9e294a3eda341fe4
SHA256bd3bf3c70f852ba2658ce612bec4ee49e1a5284c83dc85b07f17b1d2a4c0113b
SHA5125c864838db18c56f9771c08bdd5fde2b84bae72569842799d48e30d94b625e43819c840441ef63f9e3a85b0ed7c487e2a4a37c222d583234d54887b1ec265afa