Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
Resource
win10v2004-20220812-en
General
-
Target
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe
-
Size
216KB
-
MD5
7bf5254943ff2016e910b261d20b3601
-
SHA1
5fd7f70573736192c8a67afb75e902908b28eadd
-
SHA256
debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee
-
SHA512
ec5ce285da2a57f31159d5fde9ebd0ac17a0386621c469fdc9c29290a9f0c30cfaa32000f4a72e065607f971a103a79515cdbc187ebb5ee28d4176ff00850f38
-
SSDEEP
1536:H/JfHuJJLdJaB0reFl0QuWe305XrudqyLSAumJ30h+3jE/gNlh1/7ND7zDT6WkXR:fa7ammjuwu1uEh1jNJkX0CLijNX
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quozep.exe -
Executes dropped EXE 1 IoCs
pid Process 2708 quozep.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /h" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /d" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /w" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /c" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /f" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /e" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /l" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /a" debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /t" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /n" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /a" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /j" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /z" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /y" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /k" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /o" quozep.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /m" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /b" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /i" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /r" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /x" quozep.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /u" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /g" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /v" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /q" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /p" quozep.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quozep = "C:\\Users\\Admin\\quozep.exe /s" quozep.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe 2708 quozep.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 2708 quozep.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2708 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 82 PID 1508 wrote to memory of 2708 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 82 PID 1508 wrote to memory of 2708 1508 debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe"C:\Users\Admin\AppData\Local\Temp\debcdd61755102943852b6dea4514c8e310370d33244e9d8506a56ecd4db4eee.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\quozep.exe"C:\Users\Admin\quozep.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD53623b18a12edfe6b5adcbe19ae947d92
SHA19f6398f5a97c75fe0e2a404816395ef5780524c5
SHA256f2c1cc397d7546300004d310230436a3a1fa8137925f2bec92b2422d17f6b5b7
SHA512ea8ac0eb109ae33136e983ac42c17779f2b065320fc6137a9ecc2631ed31736ed35a4c9e5a67f1b886ce2ba0e1be13af1cace98ff2ddb48ea00ce356e0c558e4
-
Filesize
216KB
MD53623b18a12edfe6b5adcbe19ae947d92
SHA19f6398f5a97c75fe0e2a404816395ef5780524c5
SHA256f2c1cc397d7546300004d310230436a3a1fa8137925f2bec92b2422d17f6b5b7
SHA512ea8ac0eb109ae33136e983ac42c17779f2b065320fc6137a9ecc2631ed31736ed35a4c9e5a67f1b886ce2ba0e1be13af1cace98ff2ddb48ea00ce356e0c558e4