Analysis
-
max time kernel
148s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe
Resource
win10v2004-20220812-en
General
-
Target
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe
-
Size
327KB
-
MD5
af5802e08b93be5ba00e7f52e7012807
-
SHA1
b493160c357482e4dbec84e750e1d21d9fdafc15
-
SHA256
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a
-
SHA512
ceb82c4cb2e24911ae0e5ee3696761b1b7f5e40291da1c33f6beb6e412bbf17ebd80cfff048867fe2a08e1debbb637c2a5501d53a6aef1cd8401801ee82d8b4e
-
SSDEEP
6144:FJCvfb//eyEFyOStCMWQUt67Q4yP0hTTyN/+CrU+O+LqO:FJKb//evFyOStoy7yP0VbCA+qO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zeuqi.exepid process 332 zeuqi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1640 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exepid process 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exedescription pid process target process PID 2012 set thread context of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7AD616C2-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
zeuqi.exepid process 332 zeuqi.exe 332 zeuqi.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exezeuqi.exepid process 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe 332 zeuqi.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe Token: SeManageVolumePrivilege 1872 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1872 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1872 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1872 WinMail.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exezeuqi.exeexplorer.exedescription pid process target process PID 2012 wrote to memory of 332 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe zeuqi.exe PID 2012 wrote to memory of 332 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe zeuqi.exe PID 2012 wrote to memory of 332 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe zeuqi.exe PID 2012 wrote to memory of 332 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe zeuqi.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 332 wrote to memory of 952 332 zeuqi.exe explorer.exe PID 952 wrote to memory of 1224 952 explorer.exe Explorer.EXE PID 952 wrote to memory of 1224 952 explorer.exe Explorer.EXE PID 952 wrote to memory of 1224 952 explorer.exe Explorer.EXE PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 332 wrote to memory of 2012 332 zeuqi.exe 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe PID 2012 wrote to memory of 1640 2012 5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe"C:\Users\Admin\AppData\Local\Temp\5eeeff350333bae8cc0e8a0fb2117e366e65f513e2b21144a52f70e98474f04a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\Ogdoo\zeuqi.exe"C:\Users\Admin\AppData\Roaming\Ogdoo\zeuqi.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc4e3fb20.bat"3⤵
- Deletes itself
PID:1640
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD511635e6557c983cd1ca6ba04d43e4800
SHA18a7ff72dd7cf5b7764b31cc2fedeb9b20e321de9
SHA2564aae9d441aad9aa846c4684d4481bd4daf6cc6fb16669710ffaeb45a4baa8cb6
SHA5128ef195d7a992a7449aa80df15cf56a0b257dbd0c7d55f7f25c75589eca251878f7ae30445656de10b1b42a0778c6d3392122f6594a0c8298e1e47bdfd9738086
-
Filesize
327KB
MD501811c88e7a6cd3311d408d5cdfe0954
SHA1528b858ac6467c434d8960763aff7cbc23993ae0
SHA256ef563b72ad2e9e9aec171cabc4feefb6b5fa0fe65803e978bd2d1d19be00ae3f
SHA51271fcb90db7c982c00921d972a65b2621e2b5e07937f1028421b68d1b292156b95844b2f246b163fc9533bc84283f6cf539869615249886eb3fa41ef27acca499
-
Filesize
327KB
MD501811c88e7a6cd3311d408d5cdfe0954
SHA1528b858ac6467c434d8960763aff7cbc23993ae0
SHA256ef563b72ad2e9e9aec171cabc4feefb6b5fa0fe65803e978bd2d1d19be00ae3f
SHA51271fcb90db7c982c00921d972a65b2621e2b5e07937f1028421b68d1b292156b95844b2f246b163fc9533bc84283f6cf539869615249886eb3fa41ef27acca499
-
Filesize
327KB
MD501811c88e7a6cd3311d408d5cdfe0954
SHA1528b858ac6467c434d8960763aff7cbc23993ae0
SHA256ef563b72ad2e9e9aec171cabc4feefb6b5fa0fe65803e978bd2d1d19be00ae3f
SHA51271fcb90db7c982c00921d972a65b2621e2b5e07937f1028421b68d1b292156b95844b2f246b163fc9533bc84283f6cf539869615249886eb3fa41ef27acca499