Analysis
-
max time kernel
179s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe
Resource
win10v2004-20221111-en
General
-
Target
c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe
-
Size
212KB
-
MD5
4e19fda8d79313ec8698f7313222aa44
-
SHA1
a1fe7ca6e944beb31d2907e782bc5972a7e2ff3a
-
SHA256
c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d
-
SHA512
c42bf1ea7dd29d8c49fb5dbc15fa2f7999c23afaa82d578bee27429daf4595e3462a32489f68a0c5254bad5c87f50695deee2655933aec6a5f1684acea5386a1
-
SSDEEP
3072:YhQTUwEYksBFJdIdNg0qHaBheXkbxWPobjHCADDv0dqv8AmA2xCkXK:YPwlJdIETdXkbcPujiev2PS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1160 keqii.exe 580 keqii.exe -
Deletes itself 1 IoCs
pid Process 280 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run keqii.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\Currentversion\Run keqii.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ydexox = "C:\\Users\\Admin\\AppData\\Roaming\\Iremor\\keqii.exe" keqii.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1252 set thread context of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1160 set thread context of 580 1160 keqii.exe 30 PID 2040 set thread context of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\59C77F2F-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe 580 keqii.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeSecurityPrivilege 280 cmd.exe Token: SeManageVolumePrivilege 1524 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1524 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1524 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1524 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 1252 wrote to memory of 2040 1252 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 28 PID 2040 wrote to memory of 1160 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 29 PID 2040 wrote to memory of 1160 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 29 PID 2040 wrote to memory of 1160 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 29 PID 2040 wrote to memory of 1160 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 29 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 1160 wrote to memory of 580 1160 keqii.exe 30 PID 580 wrote to memory of 1140 580 keqii.exe 9 PID 580 wrote to memory of 1140 580 keqii.exe 9 PID 580 wrote to memory of 1140 580 keqii.exe 9 PID 580 wrote to memory of 1140 580 keqii.exe 9 PID 580 wrote to memory of 1140 580 keqii.exe 9 PID 580 wrote to memory of 1184 580 keqii.exe 17 PID 580 wrote to memory of 1184 580 keqii.exe 17 PID 580 wrote to memory of 1184 580 keqii.exe 17 PID 580 wrote to memory of 1184 580 keqii.exe 17 PID 580 wrote to memory of 1184 580 keqii.exe 17 PID 580 wrote to memory of 1228 580 keqii.exe 10 PID 580 wrote to memory of 1228 580 keqii.exe 10 PID 580 wrote to memory of 1228 580 keqii.exe 10 PID 580 wrote to memory of 1228 580 keqii.exe 10 PID 580 wrote to memory of 1228 580 keqii.exe 10 PID 580 wrote to memory of 2040 580 keqii.exe 28 PID 580 wrote to memory of 2040 580 keqii.exe 28 PID 580 wrote to memory of 2040 580 keqii.exe 28 PID 580 wrote to memory of 2040 580 keqii.exe 28 PID 580 wrote to memory of 2040 580 keqii.exe 28 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 2040 wrote to memory of 280 2040 c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe 31 PID 580 wrote to memory of 1624 580 keqii.exe 32 PID 580 wrote to memory of 1624 580 keqii.exe 32 PID 580 wrote to memory of 1624 580 keqii.exe 32 PID 580 wrote to memory of 1624 580 keqii.exe 32 PID 580 wrote to memory of 1624 580 keqii.exe 32 PID 580 wrote to memory of 1984 580 keqii.exe 33 PID 580 wrote to memory of 1984 580 keqii.exe 33 PID 580 wrote to memory of 1984 580 keqii.exe 33 PID 580 wrote to memory of 1984 580 keqii.exe 33 PID 580 wrote to memory of 1984 580 keqii.exe 33 PID 580 wrote to memory of 1524 580 keqii.exe 34 PID 580 wrote to memory of 1524 580 keqii.exe 34 PID 580 wrote to memory of 1524 580 keqii.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1140
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"C:\Users\Admin\AppData\Local\Temp\c6e7032aca186d4c52957197d8c50930fc78ec29f0f1917c4b41e43eff32087d.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"C:\Users\Admin\AppData\Roaming\Iremor\keqii.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:580
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp63e703c8.bat"4⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1578033532-1130273514-292879391-658370679498381316-1957784603-14538513251802986260"1⤵PID:1624
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1984
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1524
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD546f2394ac67b276f4acd811d686bdfe4
SHA149e083d69074141bffec57b364dc4766d8c9ef62
SHA256fb126abdec984b06a963ce01adecb02eece999d3d83e1febd922d822335f7c30
SHA51290ee3c7bf4268f275c55cfd5c97e31d79d0c4fd38dc48d00d623dee0c40cbaa6dda595c5ee32f94c68ebcce317a0cc45109d65ae437760041881c4771372d707
-
Filesize
4KB
MD5998c71fb03c94c1d0222bdbe030aeca1
SHA15eefb2e84a358bd4c3c0cd7d1f0ad68d0a157c14
SHA256993d925d73d2c3f0f7ee2e344f00659e49a1942f2d36d7dbf8ed12776f108643
SHA512c5c33b37c2eecd8c1a5c525ae17f648f43ec96f0629324ed3aef5108c6cfd4de706db033ab34f761c924c096afa586a455ff40d1b08f7576e8db29c1e146ceeb
-
Filesize
212KB
MD544f8096d1f44189b7187ad4228919a57
SHA15f49803fff88b6bee180f4aa2ba0865ec7570079
SHA25679a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748
SHA5125c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2
-
Filesize
212KB
MD544f8096d1f44189b7187ad4228919a57
SHA15f49803fff88b6bee180f4aa2ba0865ec7570079
SHA25679a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748
SHA5125c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2
-
Filesize
212KB
MD544f8096d1f44189b7187ad4228919a57
SHA15f49803fff88b6bee180f4aa2ba0865ec7570079
SHA25679a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748
SHA5125c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2
-
Filesize
212KB
MD544f8096d1f44189b7187ad4228919a57
SHA15f49803fff88b6bee180f4aa2ba0865ec7570079
SHA25679a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748
SHA5125c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2
-
Filesize
212KB
MD544f8096d1f44189b7187ad4228919a57
SHA15f49803fff88b6bee180f4aa2ba0865ec7570079
SHA25679a69d62749a41db5ee07c7f3b9d832f97fe8b00d50c58f2210e3b2d49077748
SHA5125c89fda6bc940603b9741aecee70a23d1f36bce118a1c6ecfa531faaab29df289e27c218673fede2555d948f94030b35ea904c89acbb4d192bb50aecb3212fd2