Analysis

  • max time kernel
    154s
  • max time network
    98s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 09:27

General

  • Target

    bc0a757942a3d43fa1a920342806d7a4de65ed1e21a89fc8a0a40292bfca1bfb.exe

  • Size

    204KB

  • MD5

    499976918742b99b70abea781a704cdc

  • SHA1

    dc08880d93ecc9601a30e4deace5115ccf3ccf78

  • SHA256

    bc0a757942a3d43fa1a920342806d7a4de65ed1e21a89fc8a0a40292bfca1bfb

  • SHA512

    e08a5bed9e326b24bb7b7274c858d26b3ba0be57e30442211eaea2a5231219f9530e0980d5391a7c58a0b714bdb388de2be8363f792f32ffd0f9280e16dc646b

  • SSDEEP

    1536:/L9dqaHQ4zxHwxAxNy3tQ9CW5EZWHakMwP9W6uXNi9f1AWa11GBPIdRONd+w6ESe:x/HQ20tQ9nLHbB9W+k9ZJgImCtT0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc0a757942a3d43fa1a920342806d7a4de65ed1e21a89fc8a0a40292bfca1bfb.exe
    "C:\Users\Admin\AppData\Local\Temp\bc0a757942a3d43fa1a920342806d7a4de65ed1e21a89fc8a0a40292bfca1bfb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Users\Admin\qoeeli.exe
      "C:\Users\Admin\qoeeli.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1000

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qoeeli.exe

          Filesize

          204KB

          MD5

          7fc744c1f98163b7690965036ed98741

          SHA1

          ddba8b3408c6e1fd344ec3e4c2e4064d1843c065

          SHA256

          13258e46f3f903389e4837b0cfc0b74c5efcf3ef6835673a6216577924c3afc0

          SHA512

          3e7d318dc5c468e804938800aad220832ac33a33bb6c313da31854488d69727daaec24492a59bb318aec16ffdfd7d1ec6d5de59781e9c4a55e55389b53cf4b2d

        • C:\Users\Admin\qoeeli.exe

          Filesize

          204KB

          MD5

          7fc744c1f98163b7690965036ed98741

          SHA1

          ddba8b3408c6e1fd344ec3e4c2e4064d1843c065

          SHA256

          13258e46f3f903389e4837b0cfc0b74c5efcf3ef6835673a6216577924c3afc0

          SHA512

          3e7d318dc5c468e804938800aad220832ac33a33bb6c313da31854488d69727daaec24492a59bb318aec16ffdfd7d1ec6d5de59781e9c4a55e55389b53cf4b2d

        • \Users\Admin\qoeeli.exe

          Filesize

          204KB

          MD5

          7fc744c1f98163b7690965036ed98741

          SHA1

          ddba8b3408c6e1fd344ec3e4c2e4064d1843c065

          SHA256

          13258e46f3f903389e4837b0cfc0b74c5efcf3ef6835673a6216577924c3afc0

          SHA512

          3e7d318dc5c468e804938800aad220832ac33a33bb6c313da31854488d69727daaec24492a59bb318aec16ffdfd7d1ec6d5de59781e9c4a55e55389b53cf4b2d

        • \Users\Admin\qoeeli.exe

          Filesize

          204KB

          MD5

          7fc744c1f98163b7690965036ed98741

          SHA1

          ddba8b3408c6e1fd344ec3e4c2e4064d1843c065

          SHA256

          13258e46f3f903389e4837b0cfc0b74c5efcf3ef6835673a6216577924c3afc0

          SHA512

          3e7d318dc5c468e804938800aad220832ac33a33bb6c313da31854488d69727daaec24492a59bb318aec16ffdfd7d1ec6d5de59781e9c4a55e55389b53cf4b2d

        • memory/1416-56-0x0000000075F01000-0x0000000075F03000-memory.dmp

          Filesize

          8KB