Overview
overview
8Static
static
8qunfa369/I...dit.js
windows7-x64
1qunfa369/I...dit.js
windows10-2004-x64
1qunfa369/I...it1.js
windows7-x64
1qunfa369/I...it1.js
windows10-2004-x64
1qunfa369/I...dy.htm
windows7-x64
1qunfa369/I...dy.htm
windows10-2004-x64
1qunfa369/I...ost.js
windows7-x64
1qunfa369/I...ost.js
windows10-2004-x64
1qunfa369/I...e.html
windows7-x64
1qunfa369/I...e.html
windows10-2004-x64
1qunfa369/I...rm.htm
windows7-x64
1qunfa369/I...rm.htm
windows10-2004-x64
1qunfa369/I...r.html
windows7-x64
1qunfa369/I...r.html
windows10-2004-x64
1qunfa369/I...r.html
windows7-x64
1qunfa369/I...r.html
windows10-2004-x64
1qunfa369/I...wf.htm
windows7-x64
1qunfa369/I...wf.htm
windows10-2004-x64
1qunfa369/I...e.html
windows7-x64
qunfa369/I...e.html
windows10-2004-x64
1qunfa369/I...2.html
windows7-x64
1qunfa369/I...2.html
windows10-2004-x64
1qunfa369/I...mv.htm
windows7-x64
1qunfa369/I...mv.htm
windows10-2004-x64
1qunfa369/�...��.exe
windows7-x64
8qunfa369/�...��.exe
windows10-2004-x64
8Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:30
Behavioral task
behavioral1
Sample
qunfa369/Images/DhtmlEdit.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
qunfa369/Images/DhtmlEdit.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
qunfa369/Images/DhtmlEdit1.js
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
qunfa369/Images/DhtmlEdit1.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
qunfa369/Images/editbody.htm
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
qunfa369/Images/editbody.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
qunfa369/Images/post.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
qunfa369/Images/post.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
qunfa369/Images/replace.html
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
qunfa369/Images/replace.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
qunfa369/Images/rm.htm
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
qunfa369/Images/rm.htm
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
qunfa369/Images/selcolor.html
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
qunfa369/Images/selcolor.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
qunfa369/Images/specialchar.html
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
qunfa369/Images/specialchar.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
qunfa369/Images/swf.htm
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
qunfa369/Images/swf.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
qunfa369/Images/table.html
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
qunfa369/Images/table.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
qunfa369/Images/table2.html
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
qunfa369/Images/table2.html
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
qunfa369/Images/wmv.htm
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
qunfa369/Images/wmv.htm
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
qunfa369/ʼȺ.exe
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
qunfa369/ʼȺ.exe
Resource
win10v2004-20220812-en
General
-
Target
qunfa369/ʼȺ.exe
-
Size
1.2MB
-
MD5
5b2287b2e9aca4574ca192bc8c149df0
-
SHA1
a469c26dbb53d4b6e1664d4bc9fbb042d425f8a2
-
SHA256
aeb2d20968cc6006e292b6bb01457be4bdbc6408607d2760ca0ad2326d0d7545
-
SHA512
f35771128b3c6bba5e004d33a80395850c7d64d7a7c00b9cb83b0655da7638a36d22a732f1262b07fdc83507f086fd424875bde07bb860fa2405c898c2c22ac6
-
SSDEEP
24576:0h9yM6VXgHnfBmPCVnF6E1c2ZzNSLlmPYGNT8FtubM:0hMM66HfNBCKM8OOw
Malware Config
Signatures
-
resource yara_rule behavioral25/memory/940-55-0x0000000000400000-0x0000000000792000-memory.dmp upx behavioral25/memory/940-57-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-60-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-59-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-61-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-62-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-64-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-66-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-68-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-70-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-72-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-76-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-80-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-84-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-88-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-92-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-96-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-100-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-98-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-94-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-90-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-102-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-86-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-82-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-78-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-74-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-103-0x0000000000400000-0x0000000000792000-memory.dmp upx behavioral25/memory/940-104-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral25/memory/940-106-0x0000000000400000-0x0000000000792000-memory.dmp upx behavioral25/memory/940-107-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" ʼȺ.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main ʼȺ.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU ʼȺ.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" ʼȺ.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" ʼȺ.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" ʼȺ.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 940 ʼȺ.exe 940 ʼȺ.exe 940 ʼȺ.exe 940 ʼȺ.exe 940 ʼȺ.exe 940 ʼȺ.exe