Analysis
-
max time kernel
203s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:15
Static task
static1
Behavioral task
behavioral1
Sample
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe
Resource
win10v2004-20221111-en
General
-
Target
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe
-
Size
132KB
-
MD5
7f2c14c5348a3a3ba2b36a63790edc3f
-
SHA1
4bf9ff875ef40224d9ff234f705fdfa0300a2165
-
SHA256
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2
-
SHA512
2e577f28f6d2f3f9e7d57f8e1cc406e84322c8cea768ad862967c34d37a064e67b999657b217c9008e3b15d62a7cdb6caa9c206bd166630ee917a819d21c7c20
-
SSDEEP
1536:M1vNECmXyUof/C5/oeWBbzAmHawpglWxOAUbU0Gvlgbs4hdGtavoycXI:MvN7Uyv/CVpWBbrxQ2gwSoavHc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exeqouob.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qouob.exe -
Executes dropped EXE 1 IoCs
Processes:
qouob.exepid process 1540 qouob.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe -
Adds Run key to start application 2 TTPs 29 IoCs
Processes:
qouob.exe08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /l" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /t" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /u" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /e" 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /o" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /f" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /w" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /i" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /q" qouob.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /b" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /j" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /d" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /g" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /m" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /y" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /r" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /k" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /x" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /n" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /z" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /a" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /e" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /p" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /s" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /c" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /h" qouob.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qouob = "C:\\Users\\Admin\\qouob.exe /v" qouob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 900 3392 WerFault.exe 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exeqouob.exepid process 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe 1540 qouob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exeqouob.exepid process 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe 1540 qouob.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exedescription pid process target process PID 3392 wrote to memory of 1540 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe qouob.exe PID 3392 wrote to memory of 1540 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe qouob.exe PID 3392 wrote to memory of 1540 3392 08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe qouob.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe"C:\Users\Admin\AppData\Local\Temp\08d947988dc6f300e9c934ecdb6933285635caedd131f17d7795b6853d6009d2.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\qouob.exe"C:\Users\Admin\qouob.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3392 -s 17482⤵
- Program crash
PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3392 -ip 33921⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5f898070716814da64b8b271bddfdb8bf
SHA19e42385300eae35cabdc8f35edb2ea4479e73849
SHA256db9084ffcb95739b6a27f86cf60d9daa722c1abbf4022e16a3690c31f5c52bcf
SHA512f0066f45553edf5feaa00e52e91e3fb1457e6b22036b363ccad2afe6f3d6debf01577a3698733b621e2bcc3e74e796208104f16ff70d8ffeb83ae162be54b20c
-
Filesize
132KB
MD5f898070716814da64b8b271bddfdb8bf
SHA19e42385300eae35cabdc8f35edb2ea4479e73849
SHA256db9084ffcb95739b6a27f86cf60d9daa722c1abbf4022e16a3690c31f5c52bcf
SHA512f0066f45553edf5feaa00e52e91e3fb1457e6b22036b363ccad2afe6f3d6debf01577a3698733b621e2bcc3e74e796208104f16ff70d8ffeb83ae162be54b20c