Analysis

  • max time kernel
    154s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 14:14

General

  • Target

    e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26.exe

  • Size

    352KB

  • MD5

    a2228091ecdfcb07d02749c258f946d0

  • SHA1

    fa113645931c6092a26759a7844722b173005cd9

  • SHA256

    e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26

  • SHA512

    ca7643729093073507eb890d652f2fe7958ae51cbe95cd71f1e5faefead126cea22a1ab28acb5e934c179781bcdf6e70f939ff111d611313bd78fb301eeb5bfc

  • SSDEEP

    6144:rYgYeegfpizCxzrgOcgoi6bBgbFlKnh3Vxdleowg4UFjlimRU:rZeAhgPg4ba5lKhFxmoVRHU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26.exe
    "C:\Users\Admin\AppData\Local\Temp\e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1840 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26.exe" & start C:\Users\Admin\AppData\Local\qvmqtv.exe -f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4952
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /pid 1840
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3124
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.1
        3⤵
        • Runs ping.exe
        PID:1448
      • C:\Users\Admin\AppData\Local\qvmqtv.exe
        C:\Users\Admin\AppData\Local\qvmqtv.exe -f
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4252
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 1080
          4⤵
          • Program crash
          PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 1116
          4⤵
          • Program crash
          PID:4348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 1136
          4⤵
          • Program crash
          PID:2316
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4252 -ip 4252
    1⤵
      PID:716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4252 -ip 4252
      1⤵
        PID:4656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4252 -ip 4252
        1⤵
          PID:3436

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\qvmqtv.exe

          Filesize

          352KB

          MD5

          a2228091ecdfcb07d02749c258f946d0

          SHA1

          fa113645931c6092a26759a7844722b173005cd9

          SHA256

          e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26

          SHA512

          ca7643729093073507eb890d652f2fe7958ae51cbe95cd71f1e5faefead126cea22a1ab28acb5e934c179781bcdf6e70f939ff111d611313bd78fb301eeb5bfc

        • C:\Users\Admin\AppData\Local\qvmqtv.exe

          Filesize

          352KB

          MD5

          a2228091ecdfcb07d02749c258f946d0

          SHA1

          fa113645931c6092a26759a7844722b173005cd9

          SHA256

          e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26

          SHA512

          ca7643729093073507eb890d652f2fe7958ae51cbe95cd71f1e5faefead126cea22a1ab28acb5e934c179781bcdf6e70f939ff111d611313bd78fb301eeb5bfc

        • C:\Users\Admin\AppData\Local\qvmqtv.exe

          Filesize

          352KB

          MD5

          a2228091ecdfcb07d02749c258f946d0

          SHA1

          fa113645931c6092a26759a7844722b173005cd9

          SHA256

          e26314975cf63807db7c186f096e2c80518ab54c2a319a48209e943272b72d26

          SHA512

          ca7643729093073507eb890d652f2fe7958ae51cbe95cd71f1e5faefead126cea22a1ab28acb5e934c179781bcdf6e70f939ff111d611313bd78fb301eeb5bfc

        • memory/1840-136-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/1840-132-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/1840-134-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/1840-133-0x00000000009B0000-0x0000000000A03000-memory.dmp

          Filesize

          332KB

        • memory/4252-143-0x0000000000500000-0x0000000000553000-memory.dmp

          Filesize

          332KB

        • memory/4252-144-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/4252-145-0x0000000000DB0000-0x0000000000E5B000-memory.dmp

          Filesize

          684KB

        • memory/4252-146-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/4252-147-0x0000000001000000-0x00000000010AB000-memory.dmp

          Filesize

          684KB

        • memory/4252-148-0x0000000000DB0000-0x0000000000E5B000-memory.dmp

          Filesize

          684KB