Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 05:34

General

  • Target

    QQĦ¥ܼv22.4/qqĦ¥ܼҸv22.4.exe

  • Size

    1.6MB

  • MD5

    5948681981b28b91e2f6f8f1b8ca9629

  • SHA1

    2941b432bdd5fb18014c708bc929befbca9420c8

  • SHA256

    27e82e15d5a6911c6011eb91544bde282c13920cf79570569dde5f8f82e8d8f5

  • SHA512

    1e78e7ae17b76b812261f2ea744d27fc6925ffccb8016896e83aed9883f8936cef87542ce671981452b08b86bdb25149f98a0ca4dcdaf6224c3c6e05739e082e

  • SSDEEP

    24576:hRlGmKeaF18N8S/kFv8WRYEFOpmSXjDlGHsPNAMMxuOSUF4Up6dGx42EvGo78v5:fDKeGidQEPASPEHeIpX6dGfCGi4

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQĦ¥ܼv22.4\qqĦ¥ܼҸv22.4.exe
    "C:\Users\Admin\AppData\Local\Temp\QQĦ¥ܼv22.4\qqĦ¥ܼҸv22.4.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1268-132-0x0000000077E30000-0x0000000077FD3000-memory.dmp

    Filesize

    1.6MB

  • memory/1268-133-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-134-0x0000000077400000-0x0000000077615000-memory.dmp

    Filesize

    2.1MB

  • memory/1268-136-0x0000000076110000-0x00000000762B0000-memory.dmp

    Filesize

    1.6MB

  • memory/1268-137-0x0000000076090000-0x000000007610A000-memory.dmp

    Filesize

    488KB

  • memory/1268-1479-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1480-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1481-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1482-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1484-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1485-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB

  • memory/1268-1486-0x0000000000400000-0x0000000000665000-memory.dmp

    Filesize

    2.4MB