Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe
Resource
win10v2004-20220812-en
General
-
Target
22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe
-
Size
472KB
-
MD5
a28fac63b40402f384df72998515b32b
-
SHA1
46ed5c990af1be22f9abef32e89cf6319ba0656c
-
SHA256
22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
-
SHA512
a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c
-
SSDEEP
12288:6IUd7LoXzrEoVZ/h4cXfPUkFCRoOp2gxxIX:Kd7sEAGgfVaoK2gxSX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 cqkovaf.exe -
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1296 cmd.exe 1296 cmd.exe 1692 cqkovaf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1472 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 964 PING.EXE -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1472 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe 1692 cqkovaf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1296 2020 22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe 28 PID 2020 wrote to memory of 1296 2020 22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe 28 PID 2020 wrote to memory of 1296 2020 22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe 28 PID 2020 wrote to memory of 1296 2020 22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe 28 PID 1296 wrote to memory of 1472 1296 cmd.exe 30 PID 1296 wrote to memory of 1472 1296 cmd.exe 30 PID 1296 wrote to memory of 1472 1296 cmd.exe 30 PID 1296 wrote to memory of 1472 1296 cmd.exe 30 PID 1296 wrote to memory of 964 1296 cmd.exe 32 PID 1296 wrote to memory of 964 1296 cmd.exe 32 PID 1296 wrote to memory of 964 1296 cmd.exe 32 PID 1296 wrote to memory of 964 1296 cmd.exe 32 PID 1296 wrote to memory of 1692 1296 cmd.exe 33 PID 1296 wrote to memory of 1692 1296 cmd.exe 33 PID 1296 wrote to memory of 1692 1296 cmd.exe 33 PID 1296 wrote to memory of 1692 1296 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe"C:\Users\Admin\AppData\Local\Temp\22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2020 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\22b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237.exe" & start C:\Users\Admin\AppData\Local\cqkovaf.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 20203⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:964
-
-
C:\Users\Admin\AppData\Local\cqkovaf.exeC:\Users\Admin\AppData\Local\cqkovaf.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD5a28fac63b40402f384df72998515b32b
SHA146ed5c990af1be22f9abef32e89cf6319ba0656c
SHA25622b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
SHA512a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c
-
Filesize
472KB
MD5a28fac63b40402f384df72998515b32b
SHA146ed5c990af1be22f9abef32e89cf6319ba0656c
SHA25622b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
SHA512a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c
-
Filesize
472KB
MD5a28fac63b40402f384df72998515b32b
SHA146ed5c990af1be22f9abef32e89cf6319ba0656c
SHA25622b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
SHA512a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c
-
Filesize
472KB
MD5a28fac63b40402f384df72998515b32b
SHA146ed5c990af1be22f9abef32e89cf6319ba0656c
SHA25622b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
SHA512a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c
-
Filesize
472KB
MD5a28fac63b40402f384df72998515b32b
SHA146ed5c990af1be22f9abef32e89cf6319ba0656c
SHA25622b560d68f6c83225344d8b9cf72ee4d87301744c2a0b205293fc2397b2e7237
SHA512a2e9e37559bf6e758401b8d0aa0239d6395328f776971a60cf2151c10095869f5cef42fa8f5722f7fd001987c16a33cc1720562fbadb3176c104fd939593b88c