Analysis

  • max time kernel
    152s
  • max time network
    88s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 22:09

General

  • Target

    db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe

  • Size

    168KB

  • MD5

    27c25ef387fcc1f5494a293f8c05c139

  • SHA1

    7ed5514f5be509eb098f11551c0d75415e7922af

  • SHA256

    db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007

  • SHA512

    55e64a5d8c224bc293ec8712c0e4ff472cb830b8e77f1b44ea2d5c69ee261f352ab9453836977e7f80567bd0b70a067e183b6c91038496274d1ed5d51ed5fc3f

  • SSDEEP

    1536:IV7y3/PPqPwyzTGRfu+1niPRI7gIeTo88zQMihZOy+RMnmE7UkAFJZvhICqDojIv:kkPqPVzTGRfu67bNz2hT9nmEzHv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe
    "C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Users\Admin\rqcef.exe
      "C:\Users\Admin\rqcef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\rqcef.exe

    Filesize

    168KB

    MD5

    849464af02126a3afdfd9bb426b444f8

    SHA1

    27540e8b2de7bdb485010221a03b8002cb77ec45

    SHA256

    81e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539

    SHA512

    081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc

  • C:\Users\Admin\rqcef.exe

    Filesize

    168KB

    MD5

    849464af02126a3afdfd9bb426b444f8

    SHA1

    27540e8b2de7bdb485010221a03b8002cb77ec45

    SHA256

    81e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539

    SHA512

    081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc

  • \Users\Admin\rqcef.exe

    Filesize

    168KB

    MD5

    849464af02126a3afdfd9bb426b444f8

    SHA1

    27540e8b2de7bdb485010221a03b8002cb77ec45

    SHA256

    81e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539

    SHA512

    081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc

  • \Users\Admin\rqcef.exe

    Filesize

    168KB

    MD5

    849464af02126a3afdfd9bb426b444f8

    SHA1

    27540e8b2de7bdb485010221a03b8002cb77ec45

    SHA256

    81e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539

    SHA512

    081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc

  • memory/948-59-0x0000000000000000-mapping.dmp

  • memory/1132-56-0x00000000761E1000-0x00000000761E3000-memory.dmp

    Filesize

    8KB