Overview
overview
5Static
static
QQĦ....4.exe
windows7-x64
5QQĦ....4.exe
windows10-2004-x64
5QQĦ...վ.url
windows7-x64
1QQĦ...վ.url
windows10-2004-x64
1QQĦ...��.url
windows7-x64
1QQĦ...��.url
windows10-2004-x64
1QQĦ...te.exe
windows7-x64
1QQĦ...te.exe
windows10-2004-x64
1ɫ�...��.url
windows7-x64
1ɫ�...��.url
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
QQĦ¥ܼv22.4/qqĦ¥ܼҸv22.4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
QQĦ¥ܼv22.4/qqĦ¥ܼҸv22.4.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
QQĦ¥ܼv22.4/ٷվ.url
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
QQĦ¥ܼv22.4/ٷվ.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
QQĦ¥ܼv22.4/ڼҺ-hao123ַ.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
QQĦ¥ܼv22.4/ڼҺ-hao123ַ.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
QQĦ¥ܼv22.4/ڼQQܼϵиԶupdate.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
QQĦ¥ܼv22.4/ڼQQܼϵиԶupdate.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
ɫ.url
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
ɫ.url
Resource
win10v2004-20220812-en
General
-
Target
QQĦ¥ܼv22.4/qqĦ¥ܼҸv22.4.exe
-
Size
1.6MB
-
MD5
5948681981b28b91e2f6f8f1b8ca9629
-
SHA1
2941b432bdd5fb18014c708bc929befbca9420c8
-
SHA256
27e82e15d5a6911c6011eb91544bde282c13920cf79570569dde5f8f82e8d8f5
-
SHA512
1e78e7ae17b76b812261f2ea744d27fc6925ffccb8016896e83aed9883f8936cef87542ce671981452b08b86bdb25149f98a0ca4dcdaf6224c3c6e05739e082e
-
SSDEEP
24576:hRlGmKeaF18N8S/kFv8WRYEFOpmSXjDlGHsPNAMMxuOSUF4Up6dGx42EvGo78v5:fDKeGidQEPASPEHeIpX6dGfCGi4
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
pid Process 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch qqĦ¥ܼҸv22.4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" qqĦ¥ܼҸv22.4.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync qqĦ¥ܼҸv22.4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" qqĦ¥ܼҸv22.4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe 1268 qqĦ¥ܼҸv22.4.exe