Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe
Resource
win10v2004-20220812-en
General
-
Target
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe
-
Size
1.1MB
-
MD5
e4bf08a6daac8b4c0289fbdfb8c0d504
-
SHA1
92c821766f301228fbd59495587b76747a60fad7
-
SHA256
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e
-
SHA512
4a0d647f3868d727fea9699d4d645bcbca14b848e2eaecb292b1ef9b855be1d9c7e5d7993a1a5e726ecef9c2069a5880dc85f0f5130a1d3047964dcaad27c588
-
SSDEEP
24576:LRmJkcoQricOIQxiZY1WNyUdPizldLFvusj24sDVdzvTud:IJZoQrbTFZY1WNyGiz1C45
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
uxof.exeuxof.exepid process 1068 uxof.exe 1704 uxof.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 592 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exepid process 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
uxof.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run uxof.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9D8CD809-1D23-BF82-9EF1-69282C7FEEA2} = "C:\\Users\\Admin\\AppData\\Roaming\\Qepaf\\uxof.exe" uxof.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1640-55-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe \Users\Admin\AppData\Roaming\Qepaf\uxof.exe autoit_exe C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe autoit_exe behavioral1/memory/1068-72-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe autoit_exe C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exeuxof.exedescription pid process target process PID 1640 set thread context of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1068 set thread context of 1704 1068 uxof.exe uxof.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
uxof.exepid process 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe 1704 uxof.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exedescription pid process Token: SeSecurityPrivilege 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exeuxof.exepid process 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1068 uxof.exe 1068 uxof.exe 1068 uxof.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exeuxof.exepid process 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe 1068 uxof.exe 1068 uxof.exe 1068 uxof.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exeb4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exeuxof.exeuxof.exedescription pid process target process PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 1640 wrote to memory of 804 1640 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe PID 804 wrote to memory of 1068 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe uxof.exe PID 804 wrote to memory of 1068 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe uxof.exe PID 804 wrote to memory of 1068 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe uxof.exe PID 804 wrote to memory of 1068 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 1068 wrote to memory of 1704 1068 uxof.exe uxof.exe PID 804 wrote to memory of 592 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe cmd.exe PID 804 wrote to memory of 592 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe cmd.exe PID 804 wrote to memory of 592 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe cmd.exe PID 804 wrote to memory of 592 804 b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe cmd.exe PID 1704 wrote to memory of 1248 1704 uxof.exe taskhost.exe PID 1704 wrote to memory of 1248 1704 uxof.exe taskhost.exe PID 1704 wrote to memory of 1248 1704 uxof.exe taskhost.exe PID 1704 wrote to memory of 1248 1704 uxof.exe taskhost.exe PID 1704 wrote to memory of 1248 1704 uxof.exe taskhost.exe PID 1704 wrote to memory of 1316 1704 uxof.exe Dwm.exe PID 1704 wrote to memory of 1316 1704 uxof.exe Dwm.exe PID 1704 wrote to memory of 1316 1704 uxof.exe Dwm.exe PID 1704 wrote to memory of 1316 1704 uxof.exe Dwm.exe PID 1704 wrote to memory of 1316 1704 uxof.exe Dwm.exe PID 1704 wrote to memory of 1372 1704 uxof.exe Explorer.EXE PID 1704 wrote to memory of 1372 1704 uxof.exe Explorer.EXE PID 1704 wrote to memory of 1372 1704 uxof.exe Explorer.EXE PID 1704 wrote to memory of 1372 1704 uxof.exe Explorer.EXE PID 1704 wrote to memory of 1372 1704 uxof.exe Explorer.EXE PID 1704 wrote to memory of 1276 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1276 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1276 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1276 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1276 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1528 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1528 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1528 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1528 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1528 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2004 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2004 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2004 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2004 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2004 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1948 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1948 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1948 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1948 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 1948 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2016 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2016 1704 uxof.exe DllHost.exe PID 1704 wrote to memory of 2016 1704 uxof.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"C:\Users\Admin\AppData\Local\Temp\b4aec75dae1752e35ce12f125821681324a35d8e87e985c2f66e07d66b4f127e.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"C:\Users\Admin\AppData\Roaming\Qepaf\uxof.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp82aa665f.bat"4⤵
- Deletes itself
PID:592
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1316
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1528
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1948
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD581bcf41f7530ad359fd82dbd88aed166
SHA1da6b699b9bde997f677349260abff731be159d7f
SHA256c987a752c3eec2376d818d47a2588eeb9ffc7e37c52014b64c1f2b285d7bef4e
SHA5120ab85966cf9af12bd05a367baef1bcbdc1c2b63c883eab6345619b9be4ae8b355d583fe27337ac7c34a67649407ec8362cd8a6202e785db75d21b882bb5eaafb
-
Filesize
1.1MB
MD540cfb8b6b43d08522464af502d92befd
SHA197737dc19d285a1782e6b935619f40492eff4ac6
SHA2567900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63
SHA512b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b
-
Filesize
1.1MB
MD540cfb8b6b43d08522464af502d92befd
SHA197737dc19d285a1782e6b935619f40492eff4ac6
SHA2567900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63
SHA512b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b
-
Filesize
1.1MB
MD540cfb8b6b43d08522464af502d92befd
SHA197737dc19d285a1782e6b935619f40492eff4ac6
SHA2567900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63
SHA512b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b
-
Filesize
1.1MB
MD540cfb8b6b43d08522464af502d92befd
SHA197737dc19d285a1782e6b935619f40492eff4ac6
SHA2567900da16c8dd4b6bd6200d2462a848b7a0d4139954828303ffb9f7e2ebabda63
SHA512b5ba161b14b251b03c2585666e5e34ad6b5c65ae8db68e6ef7301e480f94919920808e4a52af0264cf307864743e6d38c2929425c6fcbcbadcef3f8a00fba09b