Analysis
-
max time kernel
203s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:07
Static task
static1
Behavioral task
behavioral1
Sample
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe
Resource
win10v2004-20221111-en
General
-
Target
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe
-
Size
180KB
-
MD5
42cb80ca79a27481762f46670f57bfa0
-
SHA1
f06d6bed47bb1c1737036c91a79fc69c5659f2b8
-
SHA256
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8
-
SHA512
c11713c51ecaa7d752de1bc23ff0e272f7b432aa790f6f51497bbe80abde433b7a15fab797adc97b17e94c5089cab363c25077d88e617fb5f73e1b75d6c9f2b3
-
SSDEEP
3072:Axiu7ehhNrWlAIJqPYNbihKovbAM4VkRvjCKuz3EwBT3edZlSL6aOuTOunpE7bVS:Ax5uhNrWlAIJqPYNbihRzrNvjITEeedI
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exeneiqua.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neiqua.exe -
Executes dropped EXE 1 IoCs
Processes:
neiqua.exepid process 1840 neiqua.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe -
Adds Run key to start application 2 TTPs 55 IoCs
Processes:
neiqua.exe89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /b" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /V" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /k" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /y" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /r" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /p" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /W" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /q" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /a" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /d" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /E" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /O" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /T" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /R" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /G" neiqua.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /S" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /e" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /U" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /o" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /Q" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /x" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /m" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /w" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /u" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /v" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /P" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /C" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /L" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /j" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /M" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /D" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /A" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /X" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /h" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /U" 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /Y" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /F" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /N" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /l" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /t" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /n" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /B" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /c" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /s" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /g" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /I" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /K" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /J" neiqua.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run\ neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /z" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /H" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /i" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /f" neiqua.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neiqua = "C:\\Users\\Admin\\neiqua.exe /Z" neiqua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exeneiqua.exepid process 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe 1840 neiqua.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exeneiqua.exepid process 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe 1840 neiqua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exedescription pid process target process PID 1084 wrote to memory of 1840 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe neiqua.exe PID 1084 wrote to memory of 1840 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe neiqua.exe PID 1084 wrote to memory of 1840 1084 89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe neiqua.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe"C:\Users\Admin\AppData\Local\Temp\89fe7bd251de10bc1437bbceddb95fc316f42ad72f5a019a2f0c2f17eb822cd8.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\neiqua.exe"C:\Users\Admin\neiqua.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5d37c6adb75d269b93f478114f600d380
SHA1db4d58a1cd0ccab2c8c215e9944fa205b26d11ce
SHA256f3dbd66dfebd1a31357b4766dc8ea855b1a93fde5876d1b7d0773d530fa6f6ba
SHA5123af2749e5aa3beb72b9c7bd57ddc125f7e419cf2e5cb585236f1dd4bf288641038d29c8e6775b65bcf71516c4f1788f5487624ac086297799dfd48c3560c42fa
-
Filesize
180KB
MD5d37c6adb75d269b93f478114f600d380
SHA1db4d58a1cd0ccab2c8c215e9944fa205b26d11ce
SHA256f3dbd66dfebd1a31357b4766dc8ea855b1a93fde5876d1b7d0773d530fa6f6ba
SHA5123af2749e5aa3beb72b9c7bd57ddc125f7e419cf2e5cb585236f1dd4bf288641038d29c8e6775b65bcf71516c4f1788f5487624ac086297799dfd48c3560c42fa