Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:20
Static task
static1
Behavioral task
behavioral1
Sample
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe
Resource
win10v2004-20220901-en
General
-
Target
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe
-
Size
88KB
-
MD5
445f590129ab3578a25406e13bf59676
-
SHA1
b31b91185600c836b00fa11e5a9917d330b28fb8
-
SHA256
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6
-
SHA512
0678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac
-
SSDEEP
1536:tKKs7bYXLLXH0qKPY/jLVTB7GhbO5dnT0LmXub31WLSDYYtw/s:3eE3XHdKQXFNx5omXub3QLKtw
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exelqhuel.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lqhuel.exe -
Executes dropped EXE 2 IoCs
Processes:
lqhuel.exelqhuel.exepid process 4996 lqhuel.exe 384 lqhuel.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
lqhuel.exee921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /f" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /a" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /j" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /b" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /h" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /x" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /c" e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /p" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /d" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /g" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /u" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /w" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /q" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /v" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /s" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /z" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /i" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /e" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /k" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /y" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /c" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /l" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /t" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /m" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /o" lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /r" lqhuel.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run\ lqhuel.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lqhuel = "C:\\Users\\Admin\\lqhuel.exe /n" lqhuel.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
lqhuel.exee921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 lqhuel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum lqhuel.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
lqhuel.exedescription ioc process File opened for modification C:\Users\Admin\c\autorun.inf lqhuel.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exelqhuel.exedescription pid process target process PID 1812 set thread context of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 4996 set thread context of 384 4996 lqhuel.exe lqhuel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exelqhuel.exepid process 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe 384 lqhuel.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exee921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exelqhuel.exelqhuel.exepid process 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe 4996 lqhuel.exe 384 lqhuel.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exee921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exelqhuel.exedescription pid process target process PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 1812 wrote to memory of 3444 1812 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe PID 3444 wrote to memory of 4996 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe lqhuel.exe PID 3444 wrote to memory of 4996 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe lqhuel.exe PID 3444 wrote to memory of 4996 3444 e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe PID 4996 wrote to memory of 384 4996 lqhuel.exe lqhuel.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe"C:\Users\Admin\AppData\Local\Temp\e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6.exe742⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\lqhuel.exe"C:\Users\Admin\lqhuel.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\lqhuel.exe744⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5445f590129ab3578a25406e13bf59676
SHA1b31b91185600c836b00fa11e5a9917d330b28fb8
SHA256e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6
SHA5120678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac
-
Filesize
88KB
MD5445f590129ab3578a25406e13bf59676
SHA1b31b91185600c836b00fa11e5a9917d330b28fb8
SHA256e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6
SHA5120678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac
-
Filesize
88KB
MD5445f590129ab3578a25406e13bf59676
SHA1b31b91185600c836b00fa11e5a9917d330b28fb8
SHA256e921e8f4ff4306a3e67493b831c46591a4b4e16fe3b305d8d53bfbb1572d78c6
SHA5120678760652a5fdd6797138997ae5bace62dc2776679685de163d906fd908d7ccf29f339ad6d0653f2fb2f70734637da19e5dbeebe2529aa374b44679a23e9dac