Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 11:29

General

  • Target

    40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe

  • Size

    300KB

  • MD5

    0f7db5927bc419bab5564525305e1d86

  • SHA1

    7b34ad50467d2a4b6b4dd6d38d6226cee8527d4a

  • SHA256

    40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9

  • SHA512

    ea08780f4ce0552d349c05f06a69f1d3d097a1c4bd4103f0fc05c3ecb7cab9f8921fd47ca1545d0ff2afac53f2dd3bf3250be2888614b472b576e8a7c409f4ba

  • SSDEEP

    6144:qWT09e4ZEG29fr/wDSBEA5Dk1RxKLeql1gsbXrwAbvUc:qVrZN29fr/KMEvRkLeqrgsbXrwAbvUc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe
    "C:\Users\Admin\AppData\Local\Temp\40489cc9ae6cb958cabcdb953672cece52d6e2aa526d8fa869b4c5053ecad8e9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\qoairah.exe
      "C:\Users\Admin\qoairah.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qoairah.exe

    Filesize

    300KB

    MD5

    2325a3bb5bc5c06ee1d873a821fa3859

    SHA1

    186db2110d04263e5701b51ba0d7b767c4f1c587

    SHA256

    bdf23dc14671593845187afa986baf5ec4c6e6daf3cd49327b8ef6c1fb8bd8a8

    SHA512

    9e57ce5a81bb5fab97d79b4921c59e77e1bcca2d2f74f9a3f42b4ceb006f8660453c451ef5183ef40b2906ad0566ca5d3bd14935e781e1eda1474e91b84d816c

  • C:\Users\Admin\qoairah.exe

    Filesize

    300KB

    MD5

    2325a3bb5bc5c06ee1d873a821fa3859

    SHA1

    186db2110d04263e5701b51ba0d7b767c4f1c587

    SHA256

    bdf23dc14671593845187afa986baf5ec4c6e6daf3cd49327b8ef6c1fb8bd8a8

    SHA512

    9e57ce5a81bb5fab97d79b4921c59e77e1bcca2d2f74f9a3f42b4ceb006f8660453c451ef5183ef40b2906ad0566ca5d3bd14935e781e1eda1474e91b84d816c

  • \Users\Admin\qoairah.exe

    Filesize

    300KB

    MD5

    2325a3bb5bc5c06ee1d873a821fa3859

    SHA1

    186db2110d04263e5701b51ba0d7b767c4f1c587

    SHA256

    bdf23dc14671593845187afa986baf5ec4c6e6daf3cd49327b8ef6c1fb8bd8a8

    SHA512

    9e57ce5a81bb5fab97d79b4921c59e77e1bcca2d2f74f9a3f42b4ceb006f8660453c451ef5183ef40b2906ad0566ca5d3bd14935e781e1eda1474e91b84d816c

  • \Users\Admin\qoairah.exe

    Filesize

    300KB

    MD5

    2325a3bb5bc5c06ee1d873a821fa3859

    SHA1

    186db2110d04263e5701b51ba0d7b767c4f1c587

    SHA256

    bdf23dc14671593845187afa986baf5ec4c6e6daf3cd49327b8ef6c1fb8bd8a8

    SHA512

    9e57ce5a81bb5fab97d79b4921c59e77e1bcca2d2f74f9a3f42b4ceb006f8660453c451ef5183ef40b2906ad0566ca5d3bd14935e781e1eda1474e91b84d816c

  • memory/1264-56-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB