Analysis

  • max time kernel
    151s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:15

General

  • Target

    87b8ec72ea892cc5c72b443c1e2fc7960343bafc46d68e227291fa7e74f6ff15.exe

  • Size

    180KB

  • MD5

    a5d1b81a023f37fddb4f0c4c7e46aeee

  • SHA1

    0a13594e9268a1ac1e374b8b167eb08db94068bf

  • SHA256

    87b8ec72ea892cc5c72b443c1e2fc7960343bafc46d68e227291fa7e74f6ff15

  • SHA512

    adc8479e377e6cd6f0c1f10f617e4d033f0eee880d2a2261cce80d6e8370a8d663866842a71cdeece5f2a2ce4bf8c632b236d02734a395a033b8adabcf10bcc8

  • SSDEEP

    3072:GnKAg3fsd23WKnvmb7/D26Nq/vJ+VFn8R4F7jIGs2YLtL9TKBd4GqeLQn/xE/M94:BAgviKnvmb7/D26Nq/vJ+VFn8R4F7jIY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87b8ec72ea892cc5c72b443c1e2fc7960343bafc46d68e227291fa7e74f6ff15.exe
    "C:\Users\Admin\AppData\Local\Temp\87b8ec72ea892cc5c72b443c1e2fc7960343bafc46d68e227291fa7e74f6ff15.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\qiooy.exe
      "C:\Users\Admin\qiooy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qiooy.exe

    Filesize

    180KB

    MD5

    527cae36c0ea10ef2e81301876bd2011

    SHA1

    c65e6be05ae7e2c553ab1990ee027362335ebdea

    SHA256

    4b2ddc249cebb0970ae8db5002a0e6e1c7fa335d8fd95d978184d04d661e3320

    SHA512

    43f62b08f2c5fdff0b17b4c240a8a64a9528161d71e200684d765cbff09da0abb2602ed53feddf634854f1fa7e4c5fce17aa84f8c0953e21d7017ca818461fb1

  • C:\Users\Admin\qiooy.exe

    Filesize

    180KB

    MD5

    527cae36c0ea10ef2e81301876bd2011

    SHA1

    c65e6be05ae7e2c553ab1990ee027362335ebdea

    SHA256

    4b2ddc249cebb0970ae8db5002a0e6e1c7fa335d8fd95d978184d04d661e3320

    SHA512

    43f62b08f2c5fdff0b17b4c240a8a64a9528161d71e200684d765cbff09da0abb2602ed53feddf634854f1fa7e4c5fce17aa84f8c0953e21d7017ca818461fb1

  • \Users\Admin\qiooy.exe

    Filesize

    180KB

    MD5

    527cae36c0ea10ef2e81301876bd2011

    SHA1

    c65e6be05ae7e2c553ab1990ee027362335ebdea

    SHA256

    4b2ddc249cebb0970ae8db5002a0e6e1c7fa335d8fd95d978184d04d661e3320

    SHA512

    43f62b08f2c5fdff0b17b4c240a8a64a9528161d71e200684d765cbff09da0abb2602ed53feddf634854f1fa7e4c5fce17aa84f8c0953e21d7017ca818461fb1

  • \Users\Admin\qiooy.exe

    Filesize

    180KB

    MD5

    527cae36c0ea10ef2e81301876bd2011

    SHA1

    c65e6be05ae7e2c553ab1990ee027362335ebdea

    SHA256

    4b2ddc249cebb0970ae8db5002a0e6e1c7fa335d8fd95d978184d04d661e3320

    SHA512

    43f62b08f2c5fdff0b17b4c240a8a64a9528161d71e200684d765cbff09da0abb2602ed53feddf634854f1fa7e4c5fce17aa84f8c0953e21d7017ca818461fb1

  • memory/1652-56-0x0000000075D01000-0x0000000075D03000-memory.dmp

    Filesize

    8KB