Analysis
-
max time kernel
152s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe
Resource
win10v2004-20220812-en
General
-
Target
9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe
-
Size
216KB
-
MD5
4917f1c841e108c719bb2adcb0e2aff0
-
SHA1
4015fc97d30750693dc0b3d1c17905ae9c85f3a5
-
SHA256
9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4
-
SHA512
32c76446b92d09c93088506dc66de87ec6d01d2e062def89421bde80a007c5b1eddc7e88384fc38c73b38e87d55b548a94924c0c5d699e60c178787ac4fc150c
-
SSDEEP
6144:GdJZZP5XA+eMIRQwSQ4YH34AAoo070vYN0DQPwkqfS2Qh20K/BG0t7/lG1G8FGr5:1/wVp
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiihiov.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 qiihiov.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /v" qiihiov.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /n" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /t" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /u" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /i" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /e" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /p" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /m" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /o" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /c" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /l" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /s" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /q" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /a" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /a" 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /r" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /z" qiihiov.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /h" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /g" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /y" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /f" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /b" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /k" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /w" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /j" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /d" qiihiov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qiihiov = "C:\\Users\\Admin\\qiihiov.exe /x" qiihiov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe 1752 qiihiov.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 1752 qiihiov.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1752 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 27 PID 1732 wrote to memory of 1752 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 27 PID 1732 wrote to memory of 1752 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 27 PID 1732 wrote to memory of 1752 1732 9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe"C:\Users\Admin\AppData\Local\Temp\9f03856b5e16da94fca540642c39baba0ac3ccdf20dd0d67b4bab5d79fda0af4.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\qiihiov.exe"C:\Users\Admin\qiihiov.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5ed8c44d328640052d2c302ce84d1a105
SHA12937b7acc346f360feb7ba5d1a62743471449557
SHA25680dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed
SHA512c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c
-
Filesize
216KB
MD5ed8c44d328640052d2c302ce84d1a105
SHA12937b7acc346f360feb7ba5d1a62743471449557
SHA25680dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed
SHA512c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c
-
Filesize
216KB
MD5ed8c44d328640052d2c302ce84d1a105
SHA12937b7acc346f360feb7ba5d1a62743471449557
SHA25680dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed
SHA512c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c
-
Filesize
216KB
MD5ed8c44d328640052d2c302ce84d1a105
SHA12937b7acc346f360feb7ba5d1a62743471449557
SHA25680dd5187c2d7d3b1ef10d40ce661f62e801bfe3f6f1eeb282ea569089376dfed
SHA512c50644343596681168ab3a948bed7c20ef48e5f13522a94c5feee9b38a2fa4bda6a8922b5d836b5ac95bc93c2cbde5ad0b6131cf26c7fb019d284a3d10a7705c