Analysis
-
max time kernel
151s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe
Resource
win10v2004-20220901-en
General
-
Target
b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe
-
Size
288KB
-
MD5
7a49a64c1c434ebfa762642316279550
-
SHA1
4d12200651b3e28c3a0932c6073d2ff66d25a3c6
-
SHA256
b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8
-
SHA512
05e9f595a48c0a4c246bf063eed00030486638a706f615eea7bc5d2c58a51d4f3667adeb93ae5d3491573879f5e82d5312452373dbecb3598a489b77cd59e132
-
SSDEEP
6144:W4ibe9Cs07I0OjUEHg02cCh3FKphbYbYUG2yzOP+btEU:W4ii9CI0OoEHg02cCh3FKphbYbYUG2yV
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teziq.exe -
Executes dropped EXE 1 IoCs
pid Process 840 teziq.exe -
Loads dropped DLL 2 IoCs
pid Process 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /P" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /z" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /H" teziq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /i" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /E" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /I" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /V" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /X" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /n" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /x" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /N" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /T" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /G" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /L" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /A" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /F" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /h" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /l" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /g" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /p" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /Q" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /f" teziq.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /U" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /D" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /e" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /k" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /y" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /J" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /b" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /B" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /W" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /j" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /o" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /w" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /y" b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /S" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /u" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /d" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /t" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /O" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /M" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /R" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /K" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /s" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /m" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /Z" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /Y" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /q" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /v" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /c" teziq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\teziq = "C:\\Users\\Admin\\teziq.exe /r" teziq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe 840 teziq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 840 teziq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1552 wrote to memory of 840 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 26 PID 1552 wrote to memory of 840 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 26 PID 1552 wrote to memory of 840 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 26 PID 1552 wrote to memory of 840 1552 b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe"C:\Users\Admin\AppData\Local\Temp\b8147bbc8253fe18941f04d355885c9d5663f2125150a7ec1bc938998c7c70d8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\teziq.exe"C:\Users\Admin\teziq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD550659acf68fe36e547fedccabcf2916f
SHA111a387a11d1061baa827ea8dccd74c65136d5bfc
SHA25678a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0
SHA5125e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb
-
Filesize
288KB
MD550659acf68fe36e547fedccabcf2916f
SHA111a387a11d1061baa827ea8dccd74c65136d5bfc
SHA25678a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0
SHA5125e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb
-
Filesize
288KB
MD550659acf68fe36e547fedccabcf2916f
SHA111a387a11d1061baa827ea8dccd74c65136d5bfc
SHA25678a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0
SHA5125e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb
-
Filesize
288KB
MD550659acf68fe36e547fedccabcf2916f
SHA111a387a11d1061baa827ea8dccd74c65136d5bfc
SHA25678a918bb5a38329573b0755ff6ec1e510ac52d72bf691c72214f14190ded95d0
SHA5125e8ebbc5a5d220a600def7caedfa94231dbd05b9f2e376c24580599181145048cc4bc9329459cf2d7b29b18ae4d3dccc35e08a1651f80b1234324287fea216bb