Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe
Resource
win10v2004-20220812-en
General
-
Target
0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe
-
Size
180KB
-
MD5
a30504153e7e99722e57e82493c49845
-
SHA1
a5387e8d928b7e7415b0ae5be3bf9a30995c2a2b
-
SHA256
0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e
-
SHA512
b34b4f705c4059021ac3796b5502f89b387bf690dcfb6e4219325061aa837ad63e72e677a173c17c3ebc78dd114c694d5b58613b998d2239709adb6d844d5686
-
SSDEEP
3072:Jy+dVAXY71idPAaRELGzMshNXTDFE+7jF6XTjO1:Jy+zAY+ocqFshNTDT756XTI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" taeqouc.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe -
Executes dropped EXE 1 IoCs
pid Process 4328 taeqouc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /a" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /p" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /l" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /n" taeqouc.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /t" 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /z" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /u" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /i" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /s" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /b" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /w" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /f" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /k" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /h" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /o" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /e" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /q" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /r" taeqouc.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /c" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /j" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /x" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /m" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /g" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /d" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /t" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /v" taeqouc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taeqouc = "C:\\Users\\Admin\\taeqouc.exe /y" taeqouc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe 4328 taeqouc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 4328 taeqouc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2824 wrote to memory of 4328 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 83 PID 2824 wrote to memory of 4328 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 83 PID 2824 wrote to memory of 4328 2824 0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe"C:\Users\Admin\AppData\Local\Temp\0bdbe5a6beefc1a57b6ad628fa74ebbf4e7172f32c2c974260089009a7bee11e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\taeqouc.exe"C:\Users\Admin\taeqouc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD55463248586d3e7ec289ee3b175a7a2c6
SHA1f9ac27e53386d02e52e25be7bede994a0d77db4c
SHA256a5a0d3a9ddc3f3c5652479ff52c98042eee83d029a058d2e9eb5f1e06aa50121
SHA512d64969d0bfb3667e3204ba5ab1d282ca9ec3768e86df6524644586a31536aaadb6b27068c96c00799a291b21c9d82a499da08ab53120cc02ee3db5bda9fcb0ab
-
Filesize
180KB
MD55463248586d3e7ec289ee3b175a7a2c6
SHA1f9ac27e53386d02e52e25be7bede994a0d77db4c
SHA256a5a0d3a9ddc3f3c5652479ff52c98042eee83d029a058d2e9eb5f1e06aa50121
SHA512d64969d0bfb3667e3204ba5ab1d282ca9ec3768e86df6524644586a31536aaadb6b27068c96c00799a291b21c9d82a499da08ab53120cc02ee3db5bda9fcb0ab