Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:22
Static task
static1
Behavioral task
behavioral1
Sample
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe
Resource
win10v2004-20220901-en
General
-
Target
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe
-
Size
264KB
-
MD5
8b58640df18e896068b2c09f45c98730
-
SHA1
7f0fca297f251f01de2a31c130eb255c6de27ac2
-
SHA256
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f
-
SHA512
ebaa937a99257c8e89440f030f91e720bb94a5541ebf520bf9b8110af8fd3b91f4fa2dcf714750550b50601086529dd8bea0530b9c807a422a8d4a48644119b2
-
SSDEEP
6144:hbuK4LJf61g46aFPr5vAvIvP5VLObatk:havLx61g46mxLXSbatk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
uqas.exeuqas.exepid process 1316 uqas.exe 840 uqas.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1564 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exepid process 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
uqas.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run uqas.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{19ED80CB-C310-6D58-B3B1-F1C53EEAA9AA} = "C:\\Users\\Admin\\AppData\\Roaming\\Qoedax\\uqas.exe" uqas.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exeuqas.exedescription pid process target process PID 1368 set thread context of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1316 set thread context of 840 1316 uqas.exe uqas.exe -
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
uqas.exepid process 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe 840 uqas.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exedescription pid process Token: SeSecurityPrivilege 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe Token: SeSecurityPrivilege 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe Token: SeSecurityPrivilege 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exeuqas.exepid process 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe 1316 uqas.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exef2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exeuqas.exeuqas.exedescription pid process target process PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 1368 wrote to memory of 940 1368 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 940 wrote to memory of 1316 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe uqas.exe PID 940 wrote to memory of 1316 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe uqas.exe PID 940 wrote to memory of 1316 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe uqas.exe PID 940 wrote to memory of 1316 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 1316 wrote to memory of 840 1316 uqas.exe uqas.exe PID 840 wrote to memory of 1260 840 uqas.exe taskhost.exe PID 840 wrote to memory of 1260 840 uqas.exe taskhost.exe PID 840 wrote to memory of 1260 840 uqas.exe taskhost.exe PID 840 wrote to memory of 1260 840 uqas.exe taskhost.exe PID 840 wrote to memory of 1260 840 uqas.exe taskhost.exe PID 840 wrote to memory of 1396 840 uqas.exe Dwm.exe PID 840 wrote to memory of 1396 840 uqas.exe Dwm.exe PID 840 wrote to memory of 1396 840 uqas.exe Dwm.exe PID 840 wrote to memory of 1396 840 uqas.exe Dwm.exe PID 840 wrote to memory of 1396 840 uqas.exe Dwm.exe PID 840 wrote to memory of 1424 840 uqas.exe Explorer.EXE PID 840 wrote to memory of 1424 840 uqas.exe Explorer.EXE PID 840 wrote to memory of 1424 840 uqas.exe Explorer.EXE PID 840 wrote to memory of 1424 840 uqas.exe Explorer.EXE PID 840 wrote to memory of 1424 840 uqas.exe Explorer.EXE PID 840 wrote to memory of 940 840 uqas.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 840 wrote to memory of 940 840 uqas.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 840 wrote to memory of 940 840 uqas.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 840 wrote to memory of 940 840 uqas.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 840 wrote to memory of 940 840 uqas.exe f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe PID 940 wrote to memory of 1564 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe cmd.exe PID 940 wrote to memory of 1564 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe cmd.exe PID 940 wrote to memory of 1564 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe cmd.exe PID 940 wrote to memory of 1564 940 f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe cmd.exe PID 840 wrote to memory of 1564 840 uqas.exe cmd.exe PID 840 wrote to memory of 1564 840 uqas.exe cmd.exe PID 840 wrote to memory of 1564 840 uqas.exe cmd.exe PID 840 wrote to memory of 1564 840 uqas.exe cmd.exe PID 840 wrote to memory of 1564 840 uqas.exe cmd.exe PID 840 wrote to memory of 1744 840 uqas.exe DllHost.exe PID 840 wrote to memory of 1744 840 uqas.exe DllHost.exe PID 840 wrote to memory of 1744 840 uqas.exe DllHost.exe PID 840 wrote to memory of 1744 840 uqas.exe DllHost.exe PID 840 wrote to memory of 1744 840 uqas.exe DllHost.exe PID 840 wrote to memory of 660 840 uqas.exe DllHost.exe PID 840 wrote to memory of 660 840 uqas.exe DllHost.exe PID 840 wrote to memory of 660 840 uqas.exe DllHost.exe PID 840 wrote to memory of 660 840 uqas.exe DllHost.exe PID 840 wrote to memory of 660 840 uqas.exe DllHost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"C:\Users\Admin\AppData\Local\Temp\f2f2cd42281ac1c9bde4c87390d922224bf787e2951f4fbfa7688c3e5f8c8f9f.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"C:\Users\Admin\AppData\Roaming\Qoedax\uqas.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5229f4a.bat"4⤵
- Deletes itself
PID:1564
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1396
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1260
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1744
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD52671893980026627416843f22009498b
SHA10d0f247c98fca1bb5d1152aa618edcb0e504415f
SHA2569041c5efc433b2006454b1156fefb3f71311894c01cb8e14b193406247725580
SHA512c719db3c8f79c2e29011b1df3b780946b201b681e25afdee908421e84c9b7648e959898dde5a5d3ac51151273ea3bac537ad2cd28461b8b8584f952e055106d7
-
Filesize
398B
MD50de95071e5b0b924f57dfd3e96298890
SHA1c5caa7a6156d0da3c6b8e395afcedfa4e226ca12
SHA2562323949fd421badab8fc05a518ace12be2dded239339ed7636bf5cfaa0c7c7a2
SHA5120b28a66a81912bc5b117e6c258cebb023c10582ddc1c9439785ef5c934c18754447d04afb97ed683e2ce05e69ba501e7d7e72d3331852194ce57bf23437be830
-
Filesize
264KB
MD5192692d0801edc671e706338af74cb39
SHA1e307095ff69fb7261f21837fc37a1a32ea24d301
SHA2561e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace
SHA512c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f
-
Filesize
264KB
MD5192692d0801edc671e706338af74cb39
SHA1e307095ff69fb7261f21837fc37a1a32ea24d301
SHA2561e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace
SHA512c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f
-
Filesize
264KB
MD5192692d0801edc671e706338af74cb39
SHA1e307095ff69fb7261f21837fc37a1a32ea24d301
SHA2561e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace
SHA512c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f
-
Filesize
264KB
MD5192692d0801edc671e706338af74cb39
SHA1e307095ff69fb7261f21837fc37a1a32ea24d301
SHA2561e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace
SHA512c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f
-
Filesize
264KB
MD5192692d0801edc671e706338af74cb39
SHA1e307095ff69fb7261f21837fc37a1a32ea24d301
SHA2561e9bd3d72530225787a6b66658f14ae6984e8df15eba16615ebb2b11cc803ace
SHA512c87ec37c70c91718909d9af91c3c7c732ef2f639a572cd355c1d87adf1c6e8734bb804087941179e92829bc4ec1151125a3f4190d2c61ab3c6fca02a43433d6f