Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe
Resource
win10v2004-20221111-en
General
-
Target
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe
-
Size
284KB
-
MD5
acea7eb3caa13865ee594bfcb66bc1da
-
SHA1
a468a0ee8cfee4461c5a1b3badef8694498a03a3
-
SHA256
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf
-
SHA512
5644007f846387ed26b6df315184e29663f41e801a1f583ac49d4cee0be190094ff3f3c4ce6e99103e37ab43f4b1f33f12ef7f120b7df2536cb7d47483b2ecc0
-
SSDEEP
6144:iBKeMQ0Nl6loc090LiQF/rxvoO+rkU7DNU7yKeJ5Ig:n6l490Ws9v27DN2yKeog
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 5 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\explorer.exe = "C:\\Windows\\SysWOW64\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhost.exe = "C:\\Windows\\system32\\taskhost.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\system32\taskhostex.exe = "C:\\Windows\\system32\\taskhostex.exe:*:Enabled:Host Process for Windows Tasks" explorer.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\explorer.exe = "C:\\Windows\\explorer.exe:*:Enabled:Windows Explorer" explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
enpa.exeenpa.exepid process 1980 enpa.exe 1960 enpa.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 636 explorer.exe -
Loads dropped DLL 1 IoCs
Processes:
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exepid process 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F737A726-592E-13A9-905E-0874820C542E} = "C:\\Users\\Admin\\AppData\\Roaming\\Quqai\\enpa.exe" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exeenpa.exedescription pid process target process PID 1884 set thread context of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1980 set thread context of 1960 1980 enpa.exe enpa.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\6D991380-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exeenpa.exeenpa.exeexplorer.exepid process 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe 1980 enpa.exe 1960 enpa.exe 1960 enpa.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe 636 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
enpa.exepid process 1960 enpa.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exeWinMail.exedescription pid process Token: SeSecurityPrivilege 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe Token: SeManageVolumePrivilege 1292 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WinMail.exepid process 1292 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
WinMail.exepid process 1292 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1292 WinMail.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exee9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exeenpa.exeenpa.exeexplorer.exedescription pid process target process PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1884 wrote to memory of 1168 1884 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe PID 1168 wrote to memory of 1980 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe enpa.exe PID 1168 wrote to memory of 1980 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe enpa.exe PID 1168 wrote to memory of 1980 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe enpa.exe PID 1168 wrote to memory of 1980 1168 e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1980 wrote to memory of 1960 1980 enpa.exe enpa.exe PID 1960 wrote to memory of 636 1960 enpa.exe explorer.exe PID 1960 wrote to memory of 636 1960 enpa.exe explorer.exe PID 1960 wrote to memory of 636 1960 enpa.exe explorer.exe PID 1960 wrote to memory of 636 1960 enpa.exe explorer.exe PID 636 wrote to memory of 1216 636 explorer.exe Explorer.EXE PID 636 wrote to memory of 1216 636 explorer.exe Explorer.EXE PID 636 wrote to memory of 1216 636 explorer.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Modifies firewall policy service
- Deletes itself
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD547f1629b5be1ceac02543402382ca46e
SHA1f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e
SHA25668ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a
SHA5124ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201
-
Filesize
284KB
MD547f1629b5be1ceac02543402382ca46e
SHA1f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e
SHA25668ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a
SHA5124ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201
-
Filesize
284KB
MD547f1629b5be1ceac02543402382ca46e
SHA1f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e
SHA25668ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a
SHA5124ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201
-
Filesize
284KB
MD547f1629b5be1ceac02543402382ca46e
SHA1f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e
SHA25668ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a
SHA5124ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201