Analysis
-
max time kernel
151s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 20:09
Static task
static1
Behavioral task
behavioral1
Sample
b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe
Resource
win10v2004-20220812-en
General
-
Target
b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe
-
Size
224KB
-
MD5
90faf2d62a7740492c6746fe589d9276
-
SHA1
d5de249920fe536983297f68795dc93e782cbac6
-
SHA256
b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8
-
SHA512
6b472b4323fb055d4d89726a49dd7c44b70c87869b78f7923338c7b10cfbcfb071ebd6db55647b624b678773a1c1aa5d37396c35c894806579cf0322b3ae6a36
-
SSDEEP
3072:sXyqNsMoBubZVpl2mclbj4Uvx+8ysNOu+2eRcKksU61JkkX39RLrw4ySKUbax2+l:zqN57p4LnbmlrZW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quabe.exe -
Executes dropped EXE 1 IoCs
pid Process 4732 quabe.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /g" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /m" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /g" b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /h" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /l" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /n" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /c" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /r" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /a" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /e" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /w" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /t" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /o" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /i" quabe.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /u" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /b" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /v" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /y" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /f" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /d" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /k" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /p" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /s" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /x" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /z" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /j" quabe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quabe = "C:\\Users\\Admin\\quabe.exe /q" quabe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe 4732 quabe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 4732 quabe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 4732 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 82 PID 2060 wrote to memory of 4732 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 82 PID 2060 wrote to memory of 4732 2060 b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe"C:\Users\Admin\AppData\Local\Temp\b6993aacd25c145afd050e23f29775f52652534dfad2015969d4b7a8c505b5e8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\quabe.exe"C:\Users\Admin\quabe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5a046be6fbe06bee7614ac565314e0121
SHA194a21688b4ddc74b83c3bdb4fbb786038ad763d0
SHA256a8810c5358b21161a03ad8ad4141b49a11b6b13344a0677760f0c4872e589a31
SHA512734b9b8eb57dfeff6de0e24f6ac1a7a265fd7a4d99fab40c945bcff0b112f10be23c84c602220bb1d8d826730087f1627606761cd5c3f4900bae51edbe7426aa
-
Filesize
224KB
MD5a046be6fbe06bee7614ac565314e0121
SHA194a21688b4ddc74b83c3bdb4fbb786038ad763d0
SHA256a8810c5358b21161a03ad8ad4141b49a11b6b13344a0677760f0c4872e589a31
SHA512734b9b8eb57dfeff6de0e24f6ac1a7a265fd7a4d99fab40c945bcff0b112f10be23c84c602220bb1d8d826730087f1627606761cd5c3f4900bae51edbe7426aa