Analysis
-
max time kernel
151s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe
Resource
win10v2004-20220901-en
General
-
Target
f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe
-
Size
140KB
-
MD5
f453eec3a0d099d436a900c56f00fe51
-
SHA1
828d6262c9bc47276e3d3ef75e698a71b0a1261b
-
SHA256
f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3
-
SHA512
1f6625d6c635881f4dff00287fa0af609d60a9caba9bf9bdc147464acce6643e4313a44710271d842c8885de160d67947a225762e7b6ac712a6e0d7f33227a27
-
SSDEEP
3072:cBHcCMclSAY5uXq0cu3XMO4nZLJY0PoeU60ohKdlLWOp:cB8CkAY5uXq0cu3XMO4nZLJPot60ohKf
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qcpuok.exe -
Executes dropped EXE 1 IoCs
pid Process 1760 qcpuok.exe -
Loads dropped DLL 2 IoCs
pid Process 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /R" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /D" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /x" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /d" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /u" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /P" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /j" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /r" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /G" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /Z" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /k" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /g" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /J" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /f" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /Q" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /O" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /N" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /o" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /a" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /V" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /M" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /y" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /U" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /v" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /W" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /h" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /b" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /A" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /e" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /B" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /w" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /K" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /H" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /p" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /X" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /m" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /E" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /l" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /L" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /c" qcpuok.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /q" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /n" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /S" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /Y" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /T" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /t" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /C" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /z" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /F" qcpuok.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcpuok = "C:\\Users\\Admin\\qcpuok.exe /i" qcpuok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe 1760 qcpuok.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 1760 qcpuok.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 960 wrote to memory of 1760 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 27 PID 960 wrote to memory of 1760 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 27 PID 960 wrote to memory of 1760 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 27 PID 960 wrote to memory of 1760 960 f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe"C:\Users\Admin\AppData\Local\Temp\f534b8df0291a8ae52281f06b38f562c5347b2887cf4d4ab389c91dd7ad9fef3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\qcpuok.exe"C:\Users\Admin\qcpuok.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD59325c4919775d225b63a5c086db8992e
SHA154576ccd37cdefc16bf66f2d116b389871a792e5
SHA2568552a614b56f7c038c430adaadff2c03b36cd8408907b85dd224dd4f63aaa8a3
SHA512ec1433a128e046d7424603ea29a850f0c9603d28326eb2e4d52efdafbfe484acd91590406a6eb2bd61d8c5e69d5b762285d0d6b92e4002d2264ae97c122ebbe9
-
Filesize
140KB
MD59325c4919775d225b63a5c086db8992e
SHA154576ccd37cdefc16bf66f2d116b389871a792e5
SHA2568552a614b56f7c038c430adaadff2c03b36cd8408907b85dd224dd4f63aaa8a3
SHA512ec1433a128e046d7424603ea29a850f0c9603d28326eb2e4d52efdafbfe484acd91590406a6eb2bd61d8c5e69d5b762285d0d6b92e4002d2264ae97c122ebbe9
-
Filesize
140KB
MD59325c4919775d225b63a5c086db8992e
SHA154576ccd37cdefc16bf66f2d116b389871a792e5
SHA2568552a614b56f7c038c430adaadff2c03b36cd8408907b85dd224dd4f63aaa8a3
SHA512ec1433a128e046d7424603ea29a850f0c9603d28326eb2e4d52efdafbfe484acd91590406a6eb2bd61d8c5e69d5b762285d0d6b92e4002d2264ae97c122ebbe9
-
Filesize
140KB
MD59325c4919775d225b63a5c086db8992e
SHA154576ccd37cdefc16bf66f2d116b389871a792e5
SHA2568552a614b56f7c038c430adaadff2c03b36cd8408907b85dd224dd4f63aaa8a3
SHA512ec1433a128e046d7424603ea29a850f0c9603d28326eb2e4d52efdafbfe484acd91590406a6eb2bd61d8c5e69d5b762285d0d6b92e4002d2264ae97c122ebbe9