Analysis
-
max time kernel
152s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe
Resource
win10v2004-20221111-en
General
-
Target
db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe
-
Size
168KB
-
MD5
27c25ef387fcc1f5494a293f8c05c139
-
SHA1
7ed5514f5be509eb098f11551c0d75415e7922af
-
SHA256
db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007
-
SHA512
55e64a5d8c224bc293ec8712c0e4ff472cb830b8e77f1b44ea2d5c69ee261f352ab9453836977e7f80567bd0b70a067e183b6c91038496274d1ed5d51ed5fc3f
-
SSDEEP
1536:IV7y3/PPqPwyzTGRfu+1niPRI7gIeTo88zQMihZOy+RMnmE7UkAFJZvhICqDojIv:kkPqPVzTGRfu67bNz2hT9nmEzHv
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rqcef.exe -
Executes dropped EXE 1 IoCs
pid Process 948 rqcef.exe -
Loads dropped DLL 2 IoCs
pid Process 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /z" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /o" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /a" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /f" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /d" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /k" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /p" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /w" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /r" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /u" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /g" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /c" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /e" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /q" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /s" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /g" db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /i" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /n" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /j" rqcef.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /t" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /l" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /y" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /h" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /m" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /b" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /x" rqcef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\rqcef = "C:\\Users\\Admin\\rqcef.exe /v" rqcef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe 948 rqcef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 948 rqcef.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 948 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 28 PID 1132 wrote to memory of 948 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 28 PID 1132 wrote to memory of 948 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 28 PID 1132 wrote to memory of 948 1132 db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe"C:\Users\Admin\AppData\Local\Temp\db7477805f1c6f62ff72c185bc103aedf8f709d70cbc4eec1f5f1e54141e0007.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\rqcef.exe"C:\Users\Admin\rqcef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5849464af02126a3afdfd9bb426b444f8
SHA127540e8b2de7bdb485010221a03b8002cb77ec45
SHA25681e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539
SHA512081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc
-
Filesize
168KB
MD5849464af02126a3afdfd9bb426b444f8
SHA127540e8b2de7bdb485010221a03b8002cb77ec45
SHA25681e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539
SHA512081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc
-
Filesize
168KB
MD5849464af02126a3afdfd9bb426b444f8
SHA127540e8b2de7bdb485010221a03b8002cb77ec45
SHA25681e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539
SHA512081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc
-
Filesize
168KB
MD5849464af02126a3afdfd9bb426b444f8
SHA127540e8b2de7bdb485010221a03b8002cb77ec45
SHA25681e564b08ce9c6f85d516a1ed48a39266212cb9df2b5d4a686306be57f2ae539
SHA512081c389654bbb1a2e24e5b64832e9fd21d650bacca6cded6bb4aa0acaf1e29b8c609c2c15d35b38a4e33b8485e06c2b7e9dff22e9ac0539f6558f4de514360cc