Analysis
-
max time kernel
235s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe
Resource
win10v2004-20220901-en
General
-
Target
4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe
-
Size
220KB
-
MD5
29bcfd98f86cf162cfd8f8702ee34070
-
SHA1
07655bd4ef6b7089e1d50ef51e138f081c32cd89
-
SHA256
4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212
-
SHA512
695b56454c6ca7f57b1c314611839800e33d710592f8bc81fa762d1a910dc8121dbd29906b5ec66281d00df9b5333af00d8f892993ac3e4457415c548441daf5
-
SSDEEP
6144:/R2zP+yfsBqacKMBgx/qv+zghESskltX2Q:QzsBqfNSiv858F
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\acpiec.sys rundll32.exe File created C:\Windows\SysWOW64\drivers\pcidump.sys 8.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 8.exe -
Executes dropped EXE 2 IoCs
pid Process 844 QvodSetupPlus3.0.exe 1456 8.exe -
resource yara_rule behavioral1/files/0x000c000000012306-55.dat upx behavioral1/files/0x000c000000012306-57.dat upx behavioral1/memory/844-60-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/files/0x000c000000012306-62.dat upx behavioral1/files/0x000c000000012306-61.dat upx behavioral1/files/0x000c000000012306-63.dat upx behavioral1/files/0x000c000000012306-64.dat upx behavioral1/memory/844-80-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Loads dropped DLL 13 IoCs
pid Process 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 1456 8.exe 1456 8.exe 1456 8.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf 8.exe File opened for modification C:\autorun.inf 8.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\func.dll 8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\phpq.dll 8.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1988 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 392 ipconfig.exe -
Kills process with taskkill 3 IoCs
pid Process 1236 taskkill.exe 1872 taskkill.exe 592 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe 880 rundll32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1872 taskkill.exe Token: SeDebugPrivilege 1236 taskkill.exe Token: SeDebugPrivilege 880 rundll32.exe Token: SeDebugPrivilege 880 rundll32.exe Token: SeDebugPrivilege 880 rundll32.exe Token: SeDebugPrivilege 880 rundll32.exe Token: SeDebugPrivilege 880 rundll32.exe Token: SeDebugPrivilege 592 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe 844 QvodSetupPlus3.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 844 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 28 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 940 wrote to memory of 1456 940 4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe 29 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 1816 1456 8.exe 30 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 848 1456 8.exe 32 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1464 1456 8.exe 33 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1892 1456 8.exe 35 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1072 1456 8.exe 37 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 1456 wrote to memory of 1628 1456 8.exe 39 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 848 wrote to memory of 1420 848 cmd.exe 41 PID 1816 wrote to memory of 1180 1816 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe"C:\Users\Admin\AppData\Local\Temp\4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows /e /p everyone:f3⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows /e /p everyone:f4⤵PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cacls.execacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f4⤵PID:1420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config ekrn start= disabled3⤵PID:1464
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled4⤵
- Launches sc.exe
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ekrn.exe /f3⤵PID:1892
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im egui.exe /f3⤵PID:1072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im egui.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im ScanFrm.exe /f3⤵PID:1628
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ScanFrm.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe func.dll, droqp3⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:392
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
37KB
MD5534efcd3197edc9906072345a4b97ef7
SHA1f6d544cfdb1cad87375e31bc199bc0aa68022617
SHA25662fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695
SHA512dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
31KB
MD5d9d04e675f87171eab9b055fef86b46d
SHA1f336ca3ad752c01c9a06a0242c94eb2b9d770680
SHA2568b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5
SHA5125c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
149KB
MD5813a50e98c2713fe162850040e6d4288
SHA132cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f
SHA25662ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba
SHA512bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a
-
Filesize
37KB
MD5534efcd3197edc9906072345a4b97ef7
SHA1f6d544cfdb1cad87375e31bc199bc0aa68022617
SHA25662fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695
SHA512dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21
-
Filesize
37KB
MD5534efcd3197edc9906072345a4b97ef7
SHA1f6d544cfdb1cad87375e31bc199bc0aa68022617
SHA25662fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695
SHA512dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21
-
Filesize
37KB
MD5534efcd3197edc9906072345a4b97ef7
SHA1f6d544cfdb1cad87375e31bc199bc0aa68022617
SHA25662fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695
SHA512dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21
-
Filesize
37KB
MD5534efcd3197edc9906072345a4b97ef7
SHA1f6d544cfdb1cad87375e31bc199bc0aa68022617
SHA25662fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695
SHA512dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21