Analysis
-
max time kernel
151s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 04:51
Static task
static1
Behavioral task
behavioral1
Sample
97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe
Resource
win10v2004-20221111-en
General
-
Target
97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe
-
Size
91KB
-
MD5
ea03c86beddd63fc65795178d33df9c3
-
SHA1
14eb5fcbc306b5106e9f75fe0a1f5c84528a8a4a
-
SHA256
97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1
-
SHA512
a8f5ab4eba1d5e060ca1d6aa1999676e7c348a81f57d8309d6ad247552c9c19efe9dbcc38ba0a87a86b2fff395c74e48f2165860f70f68becb74e3b60705705e
-
SSDEEP
1536:4xOawsp8Ga0fIi/zNbTFTex+1Tjc6F/hpnqRa7CI:4Rp8cHNF+MPcMnnpT
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1580 rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 992 laass.exe -
Sets DLL path for service in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\QQ2O10.lnk" laass.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\AppMgmt\Parameters\ServiceDll = "C:\\Progra~1\\%Program Files%\\QQ2O10.lnk" rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 992 laass.exe 1580 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" laass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "file:c:\\windows\\362.VBS" rundll32.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification \??\c:\Program Files\%Program Files% 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\Progra~1\%Program Files%\laass.exe 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\Progra~1\%Program Files%\363.VBS 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\Progra~1\%Program Files%\Cest.bat 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\Progra~1\%Program Files%\~ 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\Progra~1\%Program Files%\QQ2O10.lnk 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File opened for modification C:\Progra~1\%Program Files%\QQ2O10.lnk 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\best.bat 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe File created C:\windows\362.vbs 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 992 laass.exe 992 laass.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe 1580 rundll32.exe 992 laass.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 992 laass.exe 1580 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1652 wrote to memory of 992 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 28 PID 1652 wrote to memory of 992 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 28 PID 1652 wrote to memory of 992 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 28 PID 1652 wrote to memory of 992 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 28 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1580 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 29 PID 1652 wrote to memory of 1672 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 30 PID 1652 wrote to memory of 1672 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 30 PID 1652 wrote to memory of 1672 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 30 PID 1652 wrote to memory of 1672 1652 97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe"C:\Users\Admin\AppData\Local\Temp\97fe8f5edf161a026720214998f095ab564871f43a75ef70d4963d6c8147dca1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\%Program Files%\laass.exe"C:\Program Files\%Program Files%\laass.exe" QQ2O10.lnk main2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:992
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" QQ2O10.lnk main2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\97FE8F~1.EXE > nul & rd c:\%Progr~1 > nul2⤵PID:1672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71.1MB
MD503f4a51c0d0a3e45bda40f075716b304
SHA145f6c31e64a60033a33fd7591d3e483173319e91
SHA2565c0148445e855afd3855ec38facdca80da88c0f58de20c60faaf4290114b3f58
SHA5121510cc2cdba75aeac54b633c62f901e5410221920f5cb6ca37782980b7c8dde9e5b5ebbf6b807792dbb88e5c9a309dabbff40cbaa64ff5110b0a98eb692a0359
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff
-
Filesize
88B
MD5a78667573d9a9ceb25a0d4e1a7a2db8b
SHA19a4a9cf44d39df2a24f86fc332cb3782eef8876d
SHA25649a93525279882890cb85cb794dfebd8fdc1f10fe0127d016ff1fc864a65167a
SHA51267276d58e5e98e5cfc1853a4b405390f8d9cad8171dc75b99878a8d5e7ddfbef7694fa5be5e50b733b0986301fef6a73171fef2c7b63d2473ba4a2dc105a5d18
-
Filesize
71.1MB
MD503f4a51c0d0a3e45bda40f075716b304
SHA145f6c31e64a60033a33fd7591d3e483173319e91
SHA2565c0148445e855afd3855ec38facdca80da88c0f58de20c60faaf4290114b3f58
SHA5121510cc2cdba75aeac54b633c62f901e5410221920f5cb6ca37782980b7c8dde9e5b5ebbf6b807792dbb88e5c9a309dabbff40cbaa64ff5110b0a98eb692a0359
-
Filesize
71.1MB
MD503f4a51c0d0a3e45bda40f075716b304
SHA145f6c31e64a60033a33fd7591d3e483173319e91
SHA2565c0148445e855afd3855ec38facdca80da88c0f58de20c60faaf4290114b3f58
SHA5121510cc2cdba75aeac54b633c62f901e5410221920f5cb6ca37782980b7c8dde9e5b5ebbf6b807792dbb88e5c9a309dabbff40cbaa64ff5110b0a98eb692a0359
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff
-
Filesize
9KB
MD5359c541c07a39ab11bb45aad29b2d2ce
SHA13c4f277f184ae306a4d0efe1bcb9e03ecabbb9b7
SHA2566e2378348ebebf5b301744fedb0be396ef4e7e92ad94877da79eed9eb46850d5
SHA512768050272dd4875a4c2a6a96f6337334c05d1512dfc0cc9ceee883a7c701de5e2e90872a6f9029de5b528b74c07cb8aa61c10f9f9e834f8021e9759136fcfbff