Analysis
-
max time kernel
175s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:47
Static task
static1
Behavioral task
behavioral1
Sample
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
Resource
win10v2004-20221111-en
General
-
Target
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe
-
Size
148KB
-
MD5
a7e4a15c238c5f1731329da0ce9535ca
-
SHA1
b1694a2db44eb9c147607581f2d233ef6f97c304
-
SHA256
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57
-
SHA512
0fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc
-
SSDEEP
3072:5NYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:sYueIrndei82nh18wsi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Equqea.exepid process 936 Equqea.exe -
Drops file in Windows directory 6 IoCs
Processes:
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exeEquqea.exedescription ioc process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File created C:\Windows\Equqea.exe 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File opened for modification C:\Windows\Equqea.exe 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Equqea.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Equqea.exe -
Processes:
Equqea.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main Equqea.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\International Equqea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Equqea.exepid process 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe 936 Equqea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exedescription pid process target process PID 3484 wrote to memory of 936 3484 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Equqea.exe PID 3484 wrote to memory of 936 3484 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Equqea.exe PID 3484 wrote to memory of 936 3484 0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe Equqea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe"C:\Users\Admin\AppData\Local\Temp\0ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\Equqea.exeC:\Windows\Equqea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5a7e4a15c238c5f1731329da0ce9535ca
SHA1b1694a2db44eb9c147607581f2d233ef6f97c304
SHA2560ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57
SHA5120fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc
-
Filesize
148KB
MD5a7e4a15c238c5f1731329da0ce9535ca
SHA1b1694a2db44eb9c147607581f2d233ef6f97c304
SHA2560ac7f4575c7cc9ed4a5258ac095ee04ee24aa595adc3356dd10207a7c7487a57
SHA5120fbee04ac22a928e62ddef17e46b268c9ea2d732e55cc491c1e2a9397cd55618850fbf7fc8317493de17044a96727108b9df26cc1b4851687c5e89b852a202fc
-
Filesize
426B
MD5b50c7b126eeef98f33164c65dc818fac
SHA1ca705140911f55f59d635668fef90ba370cd23b9
SHA256ac3c4f52e46e2e613e6ce548bd7a1e6e2f6fcd77e81f313027c898eecd277fae
SHA512e6b8a0672c0c89a1fdd437f6182feca9f562dca2bda31e0b847a76130a9fc72befbf7dae202bac7b245c4c060818a31a0a52b5e121fcb9875da2b93e392fa802