Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:23
Behavioral task
behavioral1
Sample
2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe
Resource
win7-20221111-en
General
-
Target
2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe
-
Size
30KB
-
MD5
cfc5212ceeb52d74ce319bdf2bf96938
-
SHA1
98a88e244c27596473145bbc57a9841d29a0baba
-
SHA256
2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc
-
SHA512
3ecc20cd0834af2e900d3879e8f57ae1c963c580e89bdec6985a6e753c4aab94bc14d035185ee11ad3914b65824e6fb434fa391507043f20759267d06d40cefa
-
SSDEEP
768:Bo7ka4dMTNgxC6xaUCBVhFuiFttM8NE7VC9NNRo6nP3gm:BWqYNg9ap3jzFm7VCTNlPZ
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral2/memory/3528-132-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/3192-139-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/4868-140-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/4596-141-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/3528-144-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/4596-143-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/4868-146-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat behavioral2/memory/4868-147-0x0000000000400000-0x0000000000410000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 3192 Qoayeik.exe 4868 Qoayeik.exe 4596 Qoayeik.exe -
resource yara_rule behavioral2/memory/3528-132-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x0009000000022e3c-133.dat upx behavioral2/files/0x0009000000022e3c-134.dat upx behavioral2/files/0x0009000000022e3c-136.dat upx behavioral2/files/0x0009000000022e3c-138.dat upx behavioral2/memory/3192-139-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4868-140-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4596-141-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3528-144-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4596-143-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4868-146-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4868-147-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 Qoayeik.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE Qoayeik.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies Qoayeik.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 Qoayeik.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Qoayeik.exe 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe File opened for modification C:\Windows\Qoayeik.exe 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 5084 3192 WerFault.exe 80 2072 4868 WerFault.exe 81 -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Qoayeik.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Qoayeik.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Qoayeik.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Qoayeik.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Qoayeik.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Qoayeik.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Qoayeik.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Qoayeik.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3528 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe 3528 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4868 3192 Qoayeik.exe 81 PID 3192 wrote to memory of 4868 3192 Qoayeik.exe 81 PID 3192 wrote to memory of 4868 3192 Qoayeik.exe 81 PID 3192 wrote to memory of 4596 3192 Qoayeik.exe 82 PID 3192 wrote to memory of 4596 3192 Qoayeik.exe 82 PID 3192 wrote to memory of 4596 3192 Qoayeik.exe 82 PID 3528 wrote to memory of 2540 3528 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe 86 PID 3528 wrote to memory of 2540 3528 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe 86 PID 3528 wrote to memory of 2540 3528 2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe"C:\Users\Admin\AppData\Local\Temp\2c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\8074.vbs"2⤵PID:2540
-
-
C:\Windows\Qoayeik.exeC:\Windows\Qoayeik.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Qoayeik.exeC:\Windows\Qoayeik.exe Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 13683⤵
- Program crash
PID:2072
-
-
-
C:\Windows\Qoayeik.exeC:\Windows\Qoayeik.exe Win72⤵
- Executes dropped EXE
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 5122⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3192 -ip 31921⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4868 -ip 48681⤵PID:4768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5e48de04d8739b455b4f78856aaff493c
SHA1cbb89130d5e7ff882b3f22362ed401aa1c353321
SHA256d9d14f86617e3869161368f55b0cac7eace46146eae0ae1cad07d6deb0e980b3
SHA512bb400b17424f3cc931e62e077a79f6f789c6820db96b4f8b4d857bc6484e78c37d23abc5e64dc4f9d0ecf5be662edd78a90f244fb922742d40e9d4fbf9728d51
-
Filesize
30KB
MD5cfc5212ceeb52d74ce319bdf2bf96938
SHA198a88e244c27596473145bbc57a9841d29a0baba
SHA2562c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc
SHA5123ecc20cd0834af2e900d3879e8f57ae1c963c580e89bdec6985a6e753c4aab94bc14d035185ee11ad3914b65824e6fb434fa391507043f20759267d06d40cefa
-
Filesize
30KB
MD5cfc5212ceeb52d74ce319bdf2bf96938
SHA198a88e244c27596473145bbc57a9841d29a0baba
SHA2562c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc
SHA5123ecc20cd0834af2e900d3879e8f57ae1c963c580e89bdec6985a6e753c4aab94bc14d035185ee11ad3914b65824e6fb434fa391507043f20759267d06d40cefa
-
Filesize
30KB
MD5cfc5212ceeb52d74ce319bdf2bf96938
SHA198a88e244c27596473145bbc57a9841d29a0baba
SHA2562c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc
SHA5123ecc20cd0834af2e900d3879e8f57ae1c963c580e89bdec6985a6e753c4aab94bc14d035185ee11ad3914b65824e6fb434fa391507043f20759267d06d40cefa
-
Filesize
30KB
MD5cfc5212ceeb52d74ce319bdf2bf96938
SHA198a88e244c27596473145bbc57a9841d29a0baba
SHA2562c5dc04e2227099f9039d7e0e384a456904737a01303affe2d42a001a86fc6dc
SHA5123ecc20cd0834af2e900d3879e8f57ae1c963c580e89bdec6985a6e753c4aab94bc14d035185ee11ad3914b65824e6fb434fa391507043f20759267d06d40cefa