Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe
Resource
win10v2004-20220812-en
General
-
Target
725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe
-
Size
120KB
-
MD5
6119d2aecdbaba4f022353985002eeb0
-
SHA1
910f0de891eab9f048f3694a6f408aad5451175d
-
SHA256
725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75
-
SHA512
f84abea5fbe3a2ddf89609e26fbadaec48fab62c7f04e955ad187fb34b4256572445726db86373128144125fbb6a28c6f37dada34ff765a6163b706e7bd7a407
-
SSDEEP
3072:9aFXyjOfXcOQqQXXU6CMvAD3jM8LozPOKr:oXQVnfCMvy3jM8LozL
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qieaduk.exe -
Executes dropped EXE 1 IoCs
pid Process 1808 qieaduk.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /w" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /p" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /y" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /m" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /k" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /o" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /a" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /i" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /z" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /g" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /c" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /s" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /e" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /v" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /n" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /l" qieaduk.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /x" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /q" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /u" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /d" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /f" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /b" 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /b" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /h" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /t" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /r" qieaduk.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\qieaduk = "C:\\Users\\Admin\\qieaduk.exe /j" qieaduk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe 1808 qieaduk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 1808 qieaduk.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1808 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 27 PID 1720 wrote to memory of 1808 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 27 PID 1720 wrote to memory of 1808 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 27 PID 1720 wrote to memory of 1808 1720 725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe"C:\Users\Admin\AppData\Local\Temp\725d56525c20e601672bb070c2b52eb19d602d199d2c3680e0d7d350e49dec75.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\qieaduk.exe"C:\Users\Admin\qieaduk.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c0c4caa936a25ac56b910ed14eda5208
SHA1b2b56426393cb560cd25af5ca7d878415352db40
SHA2563f4a2a00b949b87e3455d9ae7ab92e00338ed38041bab03b6ce18c93810ed928
SHA512775d22f280d70d65e94e9c39aa39ac0e1c2abda38b4e2c1594f2aae2109a8bfa46175dc79bc8c80fe6da73d22bb40e27c3104de9e3693d9df43820e0c2b9368b
-
Filesize
120KB
MD5c0c4caa936a25ac56b910ed14eda5208
SHA1b2b56426393cb560cd25af5ca7d878415352db40
SHA2563f4a2a00b949b87e3455d9ae7ab92e00338ed38041bab03b6ce18c93810ed928
SHA512775d22f280d70d65e94e9c39aa39ac0e1c2abda38b4e2c1594f2aae2109a8bfa46175dc79bc8c80fe6da73d22bb40e27c3104de9e3693d9df43820e0c2b9368b
-
Filesize
120KB
MD5c0c4caa936a25ac56b910ed14eda5208
SHA1b2b56426393cb560cd25af5ca7d878415352db40
SHA2563f4a2a00b949b87e3455d9ae7ab92e00338ed38041bab03b6ce18c93810ed928
SHA512775d22f280d70d65e94e9c39aa39ac0e1c2abda38b4e2c1594f2aae2109a8bfa46175dc79bc8c80fe6da73d22bb40e27c3104de9e3693d9df43820e0c2b9368b
-
Filesize
120KB
MD5c0c4caa936a25ac56b910ed14eda5208
SHA1b2b56426393cb560cd25af5ca7d878415352db40
SHA2563f4a2a00b949b87e3455d9ae7ab92e00338ed38041bab03b6ce18c93810ed928
SHA512775d22f280d70d65e94e9c39aa39ac0e1c2abda38b4e2c1594f2aae2109a8bfa46175dc79bc8c80fe6da73d22bb40e27c3104de9e3693d9df43820e0c2b9368b