Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe
Resource
win10v2004-20221111-en
General
-
Target
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe
-
Size
304KB
-
MD5
531c089b09cbb3d9f844fcc14d923cb9
-
SHA1
5841cf7eea53efc76d1a352db134e013acdab4a9
-
SHA256
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e
-
SHA512
bcf148985d10a4e2f70b79bdf8656b7e3fb72537e9d2c45bdfd3be2e2d164913435eefc3ecdb89499802869156eb0f2c05ee6649344f12a4fb3531955a700fce
-
SSDEEP
6144:XdpaKl/9f8AbGcdeoDW+/OWtb9yOPmeAVbfP1r4riA7AroW+nYaFyzf/H551FjmZ:Xvx/9UtO2TW00UM5AEPoViJAndeyC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
kauqe.exef55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kauqe.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe -
Executes dropped EXE 1 IoCs
Processes:
kauqe.exepid process 32 kauqe.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe -
Adds Run key to start application 2 TTPs 54 IoCs
Processes:
kauqe.exef55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /d" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /S" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /P" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /Y" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /H" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /L" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /u" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /O" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /r" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /p" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /j" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /W" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /v" f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /h" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /F" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /b" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /Q" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /y" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /t" kauqe.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /D" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /J" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /V" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /w" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /z" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /x" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /s" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /N" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /c" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /M" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /R" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /Z" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /G" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /f" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /U" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /g" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /i" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /B" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /v" kauqe.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /n" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /m" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /C" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /A" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /l" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /X" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /e" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /E" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /o" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /T" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /I" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /a" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /K" kauqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kauqe = "C:\\Users\\Admin\\kauqe.exe /q" kauqe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exekauqe.exepid process 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe 32 kauqe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exekauqe.exepid process 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe 32 kauqe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exedescription pid process target process PID 452 wrote to memory of 32 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe kauqe.exe PID 452 wrote to memory of 32 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe kauqe.exe PID 452 wrote to memory of 32 452 f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe kauqe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe"C:\Users\Admin\AppData\Local\Temp\f55b5dfd8dff621457042292d36b93dc8f324893814f4c3e4b1f55027da8626e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\kauqe.exe"C:\Users\Admin\kauqe.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:32
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD53a698938f79d52f5743e54a55027b11e
SHA1a59b12b800630822820e8c76e1451efeccbe40a5
SHA2566c587dd26ab67de9de36afcb93bbee79aee1ac29a03b7c248b3c27a6826c570f
SHA512eb7cb280e440a3d5b516922178333f12bd01d99a92ae991d9ee696f33e19de82f945b430af5ad219a116b190ae66c84f34fbdf1807f7a1cd7d9eb8ecfd259e4e
-
Filesize
304KB
MD53a698938f79d52f5743e54a55027b11e
SHA1a59b12b800630822820e8c76e1451efeccbe40a5
SHA2566c587dd26ab67de9de36afcb93bbee79aee1ac29a03b7c248b3c27a6826c570f
SHA512eb7cb280e440a3d5b516922178333f12bd01d99a92ae991d9ee696f33e19de82f945b430af5ad219a116b190ae66c84f34fbdf1807f7a1cd7d9eb8ecfd259e4e