Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:07
Static task
static1
Behavioral task
behavioral1
Sample
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe
Resource
win10v2004-20220812-en
General
-
Target
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe
-
Size
192KB
-
MD5
35061731f0dbf6ff199340479a7c524c
-
SHA1
96007fbc2c5214b010307d116c95a9ba9ad09690
-
SHA256
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795
-
SHA512
530b96081e10e96d857da5c5df23b35b4812ae965ef1b76016d546e63c46d640bebe20a89dac6114477cb0d49d5d8ba1674b525532e6aa6cf6ba56d3d20f1765
-
SSDEEP
1536:CNcd2Oabfaaaaat031AdQWB5kCFrWszRUOHFlQhzyLwVKftfVBiZHAPloFp5A2mE:kOkVW3kCFrWsF2eLbqx2994sU6G
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
kqteg.exe2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kqteg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe -
Executes dropped EXE 1 IoCs
Processes:
kqteg.exepid process 1820 kqteg.exe -
Loads dropped DLL 2 IoCs
Processes:
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exepid process 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
kqteg.exe2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /x" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /p" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /r" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /i" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /q" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /c" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /y" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /f" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /k" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /z" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /g" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /b" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /a" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /n" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /v" kqteg.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /o" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /l" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /u" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /h" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /s" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /j" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /m" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /s" 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /w" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /t" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /e" kqteg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\kqteg = "C:\\Users\\Admin\\kqteg.exe /d" kqteg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exekqteg.exepid process 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe 1820 kqteg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exekqteg.exepid process 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe 1820 kqteg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exedescription pid process target process PID 1368 wrote to memory of 1820 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe kqteg.exe PID 1368 wrote to memory of 1820 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe kqteg.exe PID 1368 wrote to memory of 1820 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe kqteg.exe PID 1368 wrote to memory of 1820 1368 2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe kqteg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe"C:\Users\Admin\AppData\Local\Temp\2e95e79eeac4fe2208cc3f0d0f063b8681ec9afde324d503489b42d802d61795.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\kqteg.exe"C:\Users\Admin\kqteg.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD583a4a9c4ea63cf787568cbeb0ceacfe0
SHA1500523987e5ca556565e47634c8aba1c77169a77
SHA256cd1260237df0609700792780bb79f221fcf4a0c4606b6eb2a773865b7f62efcc
SHA51290782fc053037236fca27acc1cf66bb3cf376c3c5021eafa075c9a9db4f0687a9568897fa5e536d56c7ff39daac1b1bbe56350240a15656da44399132ad93e90
-
Filesize
192KB
MD583a4a9c4ea63cf787568cbeb0ceacfe0
SHA1500523987e5ca556565e47634c8aba1c77169a77
SHA256cd1260237df0609700792780bb79f221fcf4a0c4606b6eb2a773865b7f62efcc
SHA51290782fc053037236fca27acc1cf66bb3cf376c3c5021eafa075c9a9db4f0687a9568897fa5e536d56c7ff39daac1b1bbe56350240a15656da44399132ad93e90
-
Filesize
192KB
MD583a4a9c4ea63cf787568cbeb0ceacfe0
SHA1500523987e5ca556565e47634c8aba1c77169a77
SHA256cd1260237df0609700792780bb79f221fcf4a0c4606b6eb2a773865b7f62efcc
SHA51290782fc053037236fca27acc1cf66bb3cf376c3c5021eafa075c9a9db4f0687a9568897fa5e536d56c7ff39daac1b1bbe56350240a15656da44399132ad93e90
-
Filesize
192KB
MD583a4a9c4ea63cf787568cbeb0ceacfe0
SHA1500523987e5ca556565e47634c8aba1c77169a77
SHA256cd1260237df0609700792780bb79f221fcf4a0c4606b6eb2a773865b7f62efcc
SHA51290782fc053037236fca27acc1cf66bb3cf376c3c5021eafa075c9a9db4f0687a9568897fa5e536d56c7ff39daac1b1bbe56350240a15656da44399132ad93e90