Analysis
-
max time kernel
192s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe
Resource
win10v2004-20221111-en
General
-
Target
4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe
-
Size
116KB
-
MD5
1568ef0ef210a0eee72a3bb1b9195b10
-
SHA1
6c89b840be9c4dcbbd286dd4d085ccf1c4eed7b9
-
SHA256
4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d
-
SHA512
a94a5445e42694ce211425c4bea25f939e820cae1d5ba0b72da2528be13fc80c0e891dc5b45ca00623230322e0dd587a4ea02e84dc211d247f7b0cac247414d2
-
SSDEEP
1536:d+cIRGsp9heep3E5zkons4MBikY+msHH0o4vwo3L2YRTB6m8AJ0X:dF41s0E5zkPBir+miUoUEYRTB6ZYu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tgquq.exe -
Executes dropped EXE 1 IoCs
pid Process 3604 tgquq.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /w" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /y" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /b" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /h" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /k" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /E" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /I" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /N" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /H" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /f" tgquq.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /j" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /B" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /l" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /x" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /F" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /t" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /o" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /C" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /i" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /q" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /Y" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /u" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /X" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /Z" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /v" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /V" tgquq.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /Q" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /D" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /L" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /G" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /z" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /O" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /n" 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /S" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /K" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /R" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /W" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /g" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /T" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /n" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /U" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /a" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /s" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /J" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /r" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /d" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /A" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /P" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /m" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /c" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /e" tgquq.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tgquq = "C:\\Users\\Admin\\tgquq.exe /M" tgquq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe 3604 tgquq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 3604 tgquq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4428 wrote to memory of 3604 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 87 PID 4428 wrote to memory of 3604 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 87 PID 4428 wrote to memory of 3604 4428 4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe"C:\Users\Admin\AppData\Local\Temp\4149fd4338adee4ad278cef15b8bebe94b55ea2c29ea4ce440f28568a2a7119d.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\tgquq.exe"C:\Users\Admin\tgquq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD56d8e39364aa82bd201194c4e1d3fef3a
SHA111cd1f0056fc18e682bdd394452753a730304e45
SHA256efffd7f69c45664c22aff696e12775e158f4ff65a9cfa2de329b912a698bc97e
SHA51207536b43faad31a8a89c447aa0c17feafb4664c6d82955298eaad81656ad7d79d1e2e7526f7546655caf81304a59092c7d40cfd67a65bae3a095233d3f2e7a71
-
Filesize
116KB
MD56d8e39364aa82bd201194c4e1d3fef3a
SHA111cd1f0056fc18e682bdd394452753a730304e45
SHA256efffd7f69c45664c22aff696e12775e158f4ff65a9cfa2de329b912a698bc97e
SHA51207536b43faad31a8a89c447aa0c17feafb4664c6d82955298eaad81656ad7d79d1e2e7526f7546655caf81304a59092c7d40cfd67a65bae3a095233d3f2e7a71