Analysis

  • max time kernel
    235s
  • max time network
    319s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 05:23

General

  • Target

    4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe

  • Size

    220KB

  • MD5

    29bcfd98f86cf162cfd8f8702ee34070

  • SHA1

    07655bd4ef6b7089e1d50ef51e138f081c32cd89

  • SHA256

    4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212

  • SHA512

    695b56454c6ca7f57b1c314611839800e33d710592f8bc81fa762d1a910dc8121dbd29906b5ec66281d00df9b5333af00d8f892993ac3e4457415c548441daf5

  • SSDEEP

    6144:/R2zP+yfsBqacKMBgx/qv+zghESskltX2Q:QzsBqfNSiv858F

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 13 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe
    "C:\Users\Admin\AppData\Local\Temp\4853e9cda86876130f41d660e84c709087904185d4f0ca0c1415a00bb288b212.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe
      "C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:844
    • C:\Users\Admin\AppData\Local\Temp\8.exe
      "C:\Users\Admin\AppData\Local\Temp\8.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls C:\Windows /e /p everyone:f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows /e /p everyone:f
          4⤵
            PID:1180
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
            4⤵
              PID:1420
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c sc config ekrn start= disabled
            3⤵
              PID:1464
              • C:\Windows\SysWOW64\sc.exe
                sc config ekrn start= disabled
                4⤵
                • Launches sc.exe
                PID:1988
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c taskkill /im ekrn.exe /f
              3⤵
                PID:1892
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /im ekrn.exe /f
                  4⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:592
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c taskkill /im egui.exe /f
                3⤵
                  PID:1072
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im egui.exe /f
                    4⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1236
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c taskkill /im ScanFrm.exe /f
                  3⤵
                    PID:1628
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /im ScanFrm.exe /f
                      4⤵
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1872
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe func.dll, droqp
                    3⤵
                    • Drops file in Drivers directory
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:880
                  • C:\Windows\SysWOW64\ipconfig.exe
                    ipconfig /all
                    3⤵
                    • Gathers network information
                    PID:392

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • C:\Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • C:\Windows\SysWOW64\func.dll

                      Filesize

                      37KB

                      MD5

                      534efcd3197edc9906072345a4b97ef7

                      SHA1

                      f6d544cfdb1cad87375e31bc199bc0aa68022617

                      SHA256

                      62fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695

                      SHA512

                      dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21

                    • \Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • \Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • \Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • \Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • \Users\Admin\AppData\Local\Temp\8.exe

                      Filesize

                      31KB

                      MD5

                      d9d04e675f87171eab9b055fef86b46d

                      SHA1

                      f336ca3ad752c01c9a06a0242c94eb2b9d770680

                      SHA256

                      8b25daa7cbe9d46225f9a5fcb82ae5482409088d9dcd83db3d2fa6da8345e7f5

                      SHA512

                      5c49e7078d6810aa3c9f157b66fb8342ad7c653cfc821cc4af5a6184bb92918d307a7a27e1e23fecbab265f849285b79ed2e2a34ff08b374c03b4450cb2aa286

                    • \Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • \Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • \Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • \Users\Admin\AppData\Local\Temp\QvodSetupPlus3.0.exe

                      Filesize

                      149KB

                      MD5

                      813a50e98c2713fe162850040e6d4288

                      SHA1

                      32cdfd3eed2c3ba0cfe91d2c03736e7c78e7db3f

                      SHA256

                      62ff24a1070fc40fa1f13043a61c87d50e80e1f2f734db0e03f38e4fd4db32ba

                      SHA512

                      bdbe30bbb0d22cc5979a1d2762169e9aea2fc35f91343f094bbf4a90c322ec3e86595ee4a289bf32e221beeb5a75cd9128e2f41d90d47e6f41975016473e842a

                    • \Windows\SysWOW64\func.dll

                      Filesize

                      37KB

                      MD5

                      534efcd3197edc9906072345a4b97ef7

                      SHA1

                      f6d544cfdb1cad87375e31bc199bc0aa68022617

                      SHA256

                      62fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695

                      SHA512

                      dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21

                    • \Windows\SysWOW64\func.dll

                      Filesize

                      37KB

                      MD5

                      534efcd3197edc9906072345a4b97ef7

                      SHA1

                      f6d544cfdb1cad87375e31bc199bc0aa68022617

                      SHA256

                      62fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695

                      SHA512

                      dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21

                    • \Windows\SysWOW64\func.dll

                      Filesize

                      37KB

                      MD5

                      534efcd3197edc9906072345a4b97ef7

                      SHA1

                      f6d544cfdb1cad87375e31bc199bc0aa68022617

                      SHA256

                      62fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695

                      SHA512

                      dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21

                    • \Windows\SysWOW64\func.dll

                      Filesize

                      37KB

                      MD5

                      534efcd3197edc9906072345a4b97ef7

                      SHA1

                      f6d544cfdb1cad87375e31bc199bc0aa68022617

                      SHA256

                      62fb66c7fa9edf7851ed484bbcd986c098d09896afa32ebbf5d478ab476b9695

                      SHA512

                      dd94eade742b66c881ac1ad52f0b501845947c689a73c7e0f8dc44aa8dc1d8964031619928a0aec2fa2568204cb5937cb370e463f12083387fb6123a0e94ad21

                    • memory/844-66-0x0000000002E70000-0x0000000003074000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/844-60-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/844-80-0x0000000000400000-0x0000000000456000-memory.dmp

                      Filesize

                      344KB

                    • memory/844-65-0x0000000000240000-0x0000000000296000-memory.dmp

                      Filesize

                      344KB

                    • memory/940-72-0x0000000000610000-0x0000000000634000-memory.dmp

                      Filesize

                      144KB

                    • memory/940-71-0x0000000000610000-0x0000000000634000-memory.dmp

                      Filesize

                      144KB

                    • memory/940-59-0x0000000002F50000-0x0000000002FA6000-memory.dmp

                      Filesize

                      344KB

                    • memory/940-54-0x0000000076391000-0x0000000076393000-memory.dmp

                      Filesize

                      8KB

                    • memory/1456-104-0x0000000000230000-0x0000000000254000-memory.dmp

                      Filesize

                      144KB

                    • memory/1456-73-0x0000000000400000-0x0000000000424000-memory.dmp

                      Filesize

                      144KB

                    • memory/1456-81-0x0000000000400000-0x0000000000424000-memory.dmp

                      Filesize

                      144KB

                    • memory/1456-79-0x0000000000230000-0x0000000000254000-memory.dmp

                      Filesize

                      144KB