Analysis
-
max time kernel
227s -
max time network
248s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:50
Static task
static1
Behavioral task
behavioral1
Sample
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe
Resource
win10v2004-20221111-en
General
-
Target
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe
-
Size
32KB
-
MD5
c4138d5074551d31733cd228a7393c30
-
SHA1
2163551a12a13f03cf659d4162d22fd07a65f480
-
SHA256
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707
-
SHA512
488f0888722d4b7b11e45bbdadc49bdfa7775114f1e9199f2ffa7cade318c2d23facf3317af68c4206da1c8adef121966b8baf790a4aaef671901d9144fd391a
-
SSDEEP
384:p8ld4fp1pUDJVexjgmaJMgUHdpisBUrtd3FDhdrtjWPZP:p8l+fpK74tcMPrB+td3bs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rqgoi.exepid process 3688 rqgoi.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exedescription pid process target process PID 2256 wrote to memory of 3688 2256 5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe rqgoi.exe PID 2256 wrote to memory of 3688 2256 5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe rqgoi.exe PID 2256 wrote to memory of 3688 2256 5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe rqgoi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe"C:\Users\Admin\AppData\Local\Temp\5c6d7df1dde0de156dd24d47c754a0d06aa2bc0d829d77050947e7b1d045d707.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\rqgoi.exe"C:\Users\Admin\AppData\Local\Temp\rqgoi.exe"2⤵
- Executes dropped EXE
PID:3688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5e57d8946e66132b54471e8c9e0a4b264
SHA17229bece577a7c333615e13dc26214563371bc22
SHA2560faea5db7f81b9344320cd1a072d8104142fcd9130532b8618d8cc2bed4ec6bc
SHA512d1f10221fcd2f22a12cced1d9b8bc7b9fa9e2b68931fa2507d29cb5881f75943e7b072e68ef8f10c09346b9d481102e2dd71a45de90b46d508ce302a09e3a728
-
Filesize
32KB
MD5e57d8946e66132b54471e8c9e0a4b264
SHA17229bece577a7c333615e13dc26214563371bc22
SHA2560faea5db7f81b9344320cd1a072d8104142fcd9130532b8618d8cc2bed4ec6bc
SHA512d1f10221fcd2f22a12cced1d9b8bc7b9fa9e2b68931fa2507d29cb5881f75943e7b072e68ef8f10c09346b9d481102e2dd71a45de90b46d508ce302a09e3a728