Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe
Resource
win10v2004-20220812-en
General
-
Target
32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe
-
Size
116KB
-
MD5
7218a93aa09ab10dab2a4a696757980b
-
SHA1
61f481919e57d4cc1ce17c9e3baf98bba140dc83
-
SHA256
32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0
-
SHA512
2d54ae32fb9544a471ce052a8338774e4e062ed729ef67ad7dc41174fd159d4c8155ee435d306bd408dbaa1d01758ff00dc5120bb0d946a2f4804ed63538ad6d
-
SSDEEP
1536:gxRTfwJ9MyJJ1Uk+g+pZgGEbGeftRkDhfdxoMqVjFeQJsl0KuwOZZZZH1gMiZ9S:eRT0Ms/UWRJjsl0xdZZZZVgXS
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rzqeuj.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 rzqeuj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /s" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /d" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /c" rzqeuj.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /m" 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /o" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /a" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /u" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /m" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /r" rzqeuj.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /z" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /i" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /g" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /p" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /n" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /j" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /f" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /x" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /l" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /b" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /t" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /h" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /v" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /q" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /e" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /k" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /w" rzqeuj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rzqeuj = "C:\\Users\\Admin\\rzqeuj.exe /y" rzqeuj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe 4340 rzqeuj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 4340 rzqeuj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4340 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 79 PID 4532 wrote to memory of 4340 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 79 PID 4532 wrote to memory of 4340 4532 32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe"C:\Users\Admin\AppData\Local\Temp\32db468a9e052a6d1d238e09edb15a1ae2164283f1c001c7fba11250fcec89b0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\rzqeuj.exe"C:\Users\Admin\rzqeuj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD58732eb3beb017c71a1677ff3a8718e07
SHA1f70236d1c61f27a63f1dd88cd88834a5cd86835b
SHA256eb401378868418deae33abc97547c1fa377e72a5df788dd79a20aab966b7296a
SHA5127937e768bf6a66d4acb2a19dd3c53f00e68d58f75fac0920e640c277d146f1e7635cb17937f111ff5715100d1db076bb820b40e00e1235179fdb565d439c25b4
-
Filesize
116KB
MD58732eb3beb017c71a1677ff3a8718e07
SHA1f70236d1c61f27a63f1dd88cd88834a5cd86835b
SHA256eb401378868418deae33abc97547c1fa377e72a5df788dd79a20aab966b7296a
SHA5127937e768bf6a66d4acb2a19dd3c53f00e68d58f75fac0920e640c277d146f1e7635cb17937f111ff5715100d1db076bb820b40e00e1235179fdb565d439c25b4