Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe
Resource
win10v2004-20221111-en
General
-
Target
ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe
-
Size
520KB
-
MD5
59721efb2bd533e85bf0a7abc52742e7
-
SHA1
d28190be75b3133e4604bef5b069d71cb112a609
-
SHA256
ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
-
SHA512
7e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d
-
SSDEEP
12288:QIIqhtE00eKOpUaGNHdzBb1KHYLyuE3z:SqhyO6aGNHTJkAyd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 592 zqpruukqr.exe -
Deletes itself 1 IoCs
pid Process 960 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 960 cmd.exe 960 cmd.exe 592 zqpruukqr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 2036 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1016 PING.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe 592 zqpruukqr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 340 wrote to memory of 960 340 ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe 27 PID 340 wrote to memory of 960 340 ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe 27 PID 340 wrote to memory of 960 340 ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe 27 PID 340 wrote to memory of 960 340 ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe 27 PID 960 wrote to memory of 2036 960 cmd.exe 29 PID 960 wrote to memory of 2036 960 cmd.exe 29 PID 960 wrote to memory of 2036 960 cmd.exe 29 PID 960 wrote to memory of 2036 960 cmd.exe 29 PID 960 wrote to memory of 1016 960 cmd.exe 31 PID 960 wrote to memory of 1016 960 cmd.exe 31 PID 960 wrote to memory of 1016 960 cmd.exe 31 PID 960 wrote to memory of 1016 960 cmd.exe 31 PID 960 wrote to memory of 592 960 cmd.exe 32 PID 960 wrote to memory of 592 960 cmd.exe 32 PID 960 wrote to memory of 592 960 cmd.exe 32 PID 960 wrote to memory of 592 960 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe"C:\Users\Admin\AppData\Local\Temp\ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 340 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463.exe" & start C:\Users\Admin\AppData\Local\ZQPRUU~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 3403⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1016
-
-
C:\Users\Admin\AppData\Local\zqpruukqr.exeC:\Users\Admin\AppData\Local\ZQPRUU~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD559721efb2bd533e85bf0a7abc52742e7
SHA1d28190be75b3133e4604bef5b069d71cb112a609
SHA256ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
SHA5127e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d
-
Filesize
520KB
MD559721efb2bd533e85bf0a7abc52742e7
SHA1d28190be75b3133e4604bef5b069d71cb112a609
SHA256ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
SHA5127e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d
-
Filesize
520KB
MD559721efb2bd533e85bf0a7abc52742e7
SHA1d28190be75b3133e4604bef5b069d71cb112a609
SHA256ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
SHA5127e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d
-
Filesize
520KB
MD559721efb2bd533e85bf0a7abc52742e7
SHA1d28190be75b3133e4604bef5b069d71cb112a609
SHA256ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
SHA5127e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d
-
Filesize
520KB
MD559721efb2bd533e85bf0a7abc52742e7
SHA1d28190be75b3133e4604bef5b069d71cb112a609
SHA256ba182f6633f5207b71f02b5fab97d4199c7c650363d392cb352b4f875f970463
SHA5127e8c3e0b4bd4f1f755fdb72f0e3b5e0a15b494295e8fb7f8469fbac45c913cfc78805d7d84e5d2dd75c2534d4a49af793100d5912d7d73ffa028848206db3e9d