Analysis

  • max time kernel
    150s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 01:09

General

  • Target

    968172c710edb2c66b597d770962013b586858dca225c285bd90fa866ce32633.exe

  • Size

    152KB

  • MD5

    b51a1b1a633b194a08c54870b7180041

  • SHA1

    d76cd27522e2cce189097fe5c445784a341d4dfd

  • SHA256

    968172c710edb2c66b597d770962013b586858dca225c285bd90fa866ce32633

  • SHA512

    4ece6d028abaa47a53dd928fcb533e3798388cbbcebeb150fb38ada3a42d404e50876ff48e0165882d1691ea990f4c9a54b4d3ba18dc0d902b263f88ccdf6374

  • SSDEEP

    1536:SmDam3zfDju3zWlnyaPSHJic7AqVJVhEGTLDARcfSxam9bHsAcNFvbFw9FCioZoK:3aeTDju3zWQj026GTLURiSEhSqky

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\968172c710edb2c66b597d770962013b586858dca225c285bd90fa866ce32633.exe
    "C:\Users\Admin\AppData\Local\Temp\968172c710edb2c66b597d770962013b586858dca225c285bd90fa866ce32633.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\quajoi.exe
      "C:\Users\Admin\quajoi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 756
      2⤵
      • Program crash
      PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\quajoi.exe

    Filesize

    152KB

    MD5

    09beabce9ac87ca0666740dc6b47e53e

    SHA1

    0b2bfefc8535becd8c9a9c2fb14344d05270a8fc

    SHA256

    fa09c64c7450c9b26e9fca42f1613df5bd95b6eee5fbd15c71b4eb27e39a3b2c

    SHA512

    9ea0acac81fd2a4a702e7cff9f524aaae8c6a833151405488df452a2d082bdee0202747012bf865f97189a5931728d98efda8777ae13d9fa82cef7b7a1dbaedc

  • C:\Users\Admin\quajoi.exe

    Filesize

    152KB

    MD5

    09beabce9ac87ca0666740dc6b47e53e

    SHA1

    0b2bfefc8535becd8c9a9c2fb14344d05270a8fc

    SHA256

    fa09c64c7450c9b26e9fca42f1613df5bd95b6eee5fbd15c71b4eb27e39a3b2c

    SHA512

    9ea0acac81fd2a4a702e7cff9f524aaae8c6a833151405488df452a2d082bdee0202747012bf865f97189a5931728d98efda8777ae13d9fa82cef7b7a1dbaedc

  • \Users\Admin\quajoi.exe

    Filesize

    152KB

    MD5

    09beabce9ac87ca0666740dc6b47e53e

    SHA1

    0b2bfefc8535becd8c9a9c2fb14344d05270a8fc

    SHA256

    fa09c64c7450c9b26e9fca42f1613df5bd95b6eee5fbd15c71b4eb27e39a3b2c

    SHA512

    9ea0acac81fd2a4a702e7cff9f524aaae8c6a833151405488df452a2d082bdee0202747012bf865f97189a5931728d98efda8777ae13d9fa82cef7b7a1dbaedc

  • \Users\Admin\quajoi.exe

    Filesize

    152KB

    MD5

    09beabce9ac87ca0666740dc6b47e53e

    SHA1

    0b2bfefc8535becd8c9a9c2fb14344d05270a8fc

    SHA256

    fa09c64c7450c9b26e9fca42f1613df5bd95b6eee5fbd15c71b4eb27e39a3b2c

    SHA512

    9ea0acac81fd2a4a702e7cff9f524aaae8c6a833151405488df452a2d082bdee0202747012bf865f97189a5931728d98efda8777ae13d9fa82cef7b7a1dbaedc

  • memory/1544-56-0x0000000075681000-0x0000000075683000-memory.dmp

    Filesize

    8KB