Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:44
Behavioral task
behavioral1
Sample
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe
Resource
win10v2004-20221111-en
General
-
Target
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe
-
Size
832KB
-
MD5
1fdb8732b0bbc5fd328f9624cd6bb637
-
SHA1
42a62647664a1834d81e40fb3ad2b758c2f4565f
-
SHA256
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156
-
SHA512
096765fb4b0d3c6b87b5ab91d4f6e5219fa9a4a2575ba2ab34f4eeee6fe54832e42189376c1b962276aeeb5e5fc2e68dbaee28b9906be0490ff16a820a07800d
-
SSDEEP
24576:othEVaPqL0dPizldLFvusj24sDVdzvTud:MEVUcmiz1C45
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
wauqf.exewauqf.exepid process 1532 wauqf.exe 596 wauqf.exe -
Processes:
resource yara_rule behavioral1/memory/1636-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx \Users\Admin\AppData\Roaming\Rolae\wauqf.exe upx C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe upx C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe upx C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe upx behavioral1/memory/1532-84-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1164 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exepid process 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wauqf.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run wauqf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{9D8CD809-1D23-BF82-9EF1-69282C7FEEA2} = "C:\\Users\\Admin\\AppData\\Roaming\\Rolae\\wauqf.exe" wauqf.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1636-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1532-84-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exewauqf.exedescription pid process target process PID 1636 set thread context of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1532 set thread context of 596 1532 wauqf.exe wauqf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
wauqf.exepid process 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe 596 wauqf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exedescription pid process Token: SeSecurityPrivilege 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exewauqf.exepid process 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1532 wauqf.exe 1532 wauqf.exe 1532 wauqf.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exewauqf.exepid process 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 1532 wauqf.exe 1532 wauqf.exe 1532 wauqf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exewauqf.exewauqf.exedescription pid process target process PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 1636 wrote to memory of 860 1636 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe PID 860 wrote to memory of 1532 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe wauqf.exe PID 860 wrote to memory of 1532 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe wauqf.exe PID 860 wrote to memory of 1532 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe wauqf.exe PID 860 wrote to memory of 1532 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 1532 wrote to memory of 596 1532 wauqf.exe wauqf.exe PID 860 wrote to memory of 1164 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe cmd.exe PID 860 wrote to memory of 1164 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe cmd.exe PID 860 wrote to memory of 1164 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe cmd.exe PID 860 wrote to memory of 1164 860 8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe cmd.exe PID 596 wrote to memory of 1116 596 wauqf.exe taskhost.exe PID 596 wrote to memory of 1116 596 wauqf.exe taskhost.exe PID 596 wrote to memory of 1116 596 wauqf.exe taskhost.exe PID 596 wrote to memory of 1116 596 wauqf.exe taskhost.exe PID 596 wrote to memory of 1116 596 wauqf.exe taskhost.exe PID 596 wrote to memory of 1180 596 wauqf.exe Dwm.exe PID 596 wrote to memory of 1180 596 wauqf.exe Dwm.exe PID 596 wrote to memory of 1180 596 wauqf.exe Dwm.exe PID 596 wrote to memory of 1180 596 wauqf.exe Dwm.exe PID 596 wrote to memory of 1180 596 wauqf.exe Dwm.exe PID 596 wrote to memory of 1268 596 wauqf.exe Explorer.EXE PID 596 wrote to memory of 1268 596 wauqf.exe Explorer.EXE PID 596 wrote to memory of 1268 596 wauqf.exe Explorer.EXE PID 596 wrote to memory of 1268 596 wauqf.exe Explorer.EXE PID 596 wrote to memory of 1268 596 wauqf.exe Explorer.EXE PID 596 wrote to memory of 1852 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1852 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1852 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1852 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1852 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1728 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1728 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1728 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1728 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1728 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1304 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1304 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1304 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1304 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1304 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1032 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1032 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1032 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1032 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 1032 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 876 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 876 596 wauqf.exe DllHost.exe PID 596 wrote to memory of 876 596 wauqf.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe"C:\Users\Admin\AppData\Local\Temp\8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe"C:\Users\Admin\AppData\Local\Temp\8e627841bafe77ec4c91df1c8930aa6edc5ed1599e1e49373ce70dcce37f2156.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe"C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe"C:\Users\Admin\AppData\Roaming\Rolae\wauqf.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa149600a.bat"4⤵
- Deletes itself
PID:1164
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1852
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1728
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD597f03034ca7c1df2b2fb8f0cbd5bbab8
SHA16d0d3011f766ea350655765b37d2ee210223f8c9
SHA256bcefb69a15c06f6c640b0846743eed53267f6b5c5bf77c00011652b8c323cf9d
SHA51258062e8770b0deaccf2f71a884d4ccdcc5a83edd6e53b6a71e72050e6fedfd584f5757ba726afa2b0d6ac7bf1a2e9c4af7265a0df6c9f033059df2b4186da5b8
-
Filesize
832KB
MD50a5da366e313063518b1b3593450b468
SHA14a826c0c105454af7451e657af3367f97265cfb4
SHA2569508ec1c46831e3a6a37d178e730fcc008b9c8ea4ca74d934b28726508f3f0f6
SHA5121379317bf3137e3394c60f1c2bcabd331d2130e9bfc018ebab5581e2f61cf47af2b18ac2e576f3564ba14c08016ac207ef1cffe2b69e0f18c1d76e1420554059
-
Filesize
832KB
MD50a5da366e313063518b1b3593450b468
SHA14a826c0c105454af7451e657af3367f97265cfb4
SHA2569508ec1c46831e3a6a37d178e730fcc008b9c8ea4ca74d934b28726508f3f0f6
SHA5121379317bf3137e3394c60f1c2bcabd331d2130e9bfc018ebab5581e2f61cf47af2b18ac2e576f3564ba14c08016ac207ef1cffe2b69e0f18c1d76e1420554059
-
Filesize
832KB
MD50a5da366e313063518b1b3593450b468
SHA14a826c0c105454af7451e657af3367f97265cfb4
SHA2569508ec1c46831e3a6a37d178e730fcc008b9c8ea4ca74d934b28726508f3f0f6
SHA5121379317bf3137e3394c60f1c2bcabd331d2130e9bfc018ebab5581e2f61cf47af2b18ac2e576f3564ba14c08016ac207ef1cffe2b69e0f18c1d76e1420554059
-
Filesize
832KB
MD50a5da366e313063518b1b3593450b468
SHA14a826c0c105454af7451e657af3367f97265cfb4
SHA2569508ec1c46831e3a6a37d178e730fcc008b9c8ea4ca74d934b28726508f3f0f6
SHA5121379317bf3137e3394c60f1c2bcabd331d2130e9bfc018ebab5581e2f61cf47af2b18ac2e576f3564ba14c08016ac207ef1cffe2b69e0f18c1d76e1420554059