Analysis
-
max time kernel
155s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:13
Static task
static1
Behavioral task
behavioral1
Sample
87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe
Resource
win10v2004-20220812-en
General
-
Target
87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe
-
Size
185KB
-
MD5
44a9cb54256b78f76ac494cee40a9e8b
-
SHA1
b20dcbe5839ce6df957e9b68c259840d5908a825
-
SHA256
87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227
-
SHA512
da0edc275592ada687b2359c972080ff22e210e5588b990f741ab413b8ad07c045558f1d000a192627fc457a0146b1e5009cff0829aa817a953adda5e818783d
-
SSDEEP
3072:3ar0meAs22kChLmrRvDB1R1hFYetoFspICx9OQp7bXXVKcm0anNtIB3flcTIBr:360db2DChmrVND15pIC9OQp7TIcKNtOf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1152 quyso.exe 300 quyso.exe -
Deletes itself 1 IoCs
pid Process 1108 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\Currentversion\Run quyso.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Qeintaodxo = "C:\\Users\\Admin\\AppData\\Roaming\\Ifko\\quyso.exe" quyso.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1656 set thread context of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1152 set thread context of 300 1152 quyso.exe 30 PID 1596 set thread context of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\4EB25CD5-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe 300 quyso.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeSecurityPrivilege 1108 cmd.exe Token: SeManageVolumePrivilege 888 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 888 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 888 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 888 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1656 wrote to memory of 1596 1656 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 28 PID 1596 wrote to memory of 1152 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 29 PID 1596 wrote to memory of 1152 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 29 PID 1596 wrote to memory of 1152 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 29 PID 1596 wrote to memory of 1152 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 29 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 1152 wrote to memory of 300 1152 quyso.exe 30 PID 300 wrote to memory of 1120 300 quyso.exe 10 PID 300 wrote to memory of 1120 300 quyso.exe 10 PID 300 wrote to memory of 1120 300 quyso.exe 10 PID 300 wrote to memory of 1120 300 quyso.exe 10 PID 300 wrote to memory of 1120 300 quyso.exe 10 PID 300 wrote to memory of 1164 300 quyso.exe 19 PID 300 wrote to memory of 1164 300 quyso.exe 19 PID 300 wrote to memory of 1164 300 quyso.exe 19 PID 300 wrote to memory of 1164 300 quyso.exe 19 PID 300 wrote to memory of 1164 300 quyso.exe 19 PID 300 wrote to memory of 1200 300 quyso.exe 18 PID 300 wrote to memory of 1200 300 quyso.exe 18 PID 300 wrote to memory of 1200 300 quyso.exe 18 PID 300 wrote to memory of 1200 300 quyso.exe 18 PID 300 wrote to memory of 1200 300 quyso.exe 18 PID 300 wrote to memory of 1596 300 quyso.exe 28 PID 300 wrote to memory of 1596 300 quyso.exe 28 PID 300 wrote to memory of 1596 300 quyso.exe 28 PID 300 wrote to memory of 1596 300 quyso.exe 28 PID 300 wrote to memory of 1596 300 quyso.exe 28 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 1596 wrote to memory of 1108 1596 87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe 31 PID 300 wrote to memory of 1552 300 quyso.exe 32 PID 300 wrote to memory of 1552 300 quyso.exe 32 PID 300 wrote to memory of 1552 300 quyso.exe 32 PID 300 wrote to memory of 1552 300 quyso.exe 32 PID 300 wrote to memory of 1552 300 quyso.exe 32 PID 300 wrote to memory of 1608 300 quyso.exe 33 PID 300 wrote to memory of 1608 300 quyso.exe 33 PID 300 wrote to memory of 1608 300 quyso.exe 33 PID 300 wrote to memory of 1608 300 quyso.exe 33 PID 300 wrote to memory of 1608 300 quyso.exe 33 PID 300 wrote to memory of 888 300 quyso.exe 34 PID 300 wrote to memory of 888 300 quyso.exe 34 PID 300 wrote to memory of 888 300 quyso.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"C:\Users\Admin\AppData\Local\Temp\87e8e60f0a8039d1abbc5007fc735674eabf9a02cb73997fecd8629ba14d4227.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"C:\Users\Admin\AppData\Roaming\Ifko\quyso.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp4dee54c5.bat"3⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-377856481213443954-16219504382098023873-514223886909486486-10784275-1817288607"1⤵PID:1552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1608
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:888
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD5b51f8c8a9dce5b4d726fe403b5aaf941
SHA1821bac23eb81efb9609e48fe91dbb9d2f937274d
SHA25628addb75c7bb35ae7aff2ad4d0b049f946b800ee7ff35d3093f08b7ef7f3443a
SHA5120b7fcdd80b7666a9aa8eca69258e786a1ab95671422544a4141bce422b487ad4faa52ff47d2b92ab6939a905c780abaf3aa6c3272a934a3e49260213d1ef9eba
-
Filesize
185KB
MD5e017075c7b1a4fa69b6e029ad5745f5b
SHA168345abf6542f027d7a5774163b1c096e1777e12
SHA256309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f
SHA512e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796
-
Filesize
185KB
MD5e017075c7b1a4fa69b6e029ad5745f5b
SHA168345abf6542f027d7a5774163b1c096e1777e12
SHA256309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f
SHA512e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796
-
Filesize
185KB
MD5e017075c7b1a4fa69b6e029ad5745f5b
SHA168345abf6542f027d7a5774163b1c096e1777e12
SHA256309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f
SHA512e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796
-
Filesize
4KB
MD57d0715ffba7e980acdcc579ff1dd4ace
SHA12fd8e053a3a043960c748b828da730e3e7be8744
SHA2568fa5d192a285d8f3ae4ab9db3d9080b52dcedabb86eeecda74326beec94ca089
SHA512dc85b8a468c4a40e0c9f515b97eabf3b42d4305694f87c84c3952275a64889d5aec94b293b72a8d1565f2744094af1ccd1dc62b1c26e1cc477b870ffe52d7bf7
-
Filesize
4KB
MD57d0715ffba7e980acdcc579ff1dd4ace
SHA12fd8e053a3a043960c748b828da730e3e7be8744
SHA2568fa5d192a285d8f3ae4ab9db3d9080b52dcedabb86eeecda74326beec94ca089
SHA512dc85b8a468c4a40e0c9f515b97eabf3b42d4305694f87c84c3952275a64889d5aec94b293b72a8d1565f2744094af1ccd1dc62b1c26e1cc477b870ffe52d7bf7
-
Filesize
185KB
MD5e017075c7b1a4fa69b6e029ad5745f5b
SHA168345abf6542f027d7a5774163b1c096e1777e12
SHA256309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f
SHA512e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796
-
Filesize
185KB
MD5e017075c7b1a4fa69b6e029ad5745f5b
SHA168345abf6542f027d7a5774163b1c096e1777e12
SHA256309a9c4a589ec9d010da156fb1987b4083cfc6c3a03b55c22b0eebe03371694f
SHA512e7824e963235a49369eec249de6b194ef427b120f9895f672690939733a70f707225b84513f1d8966e9d70da58b20411df218dd093f6b39056a25f17a0883796