Analysis
-
max time kernel
151s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:17
Static task
static1
Behavioral task
behavioral1
Sample
84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe
Resource
win10v2004-20220901-en
General
-
Target
84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe
-
Size
250KB
-
MD5
5a9bec35a02014351821721db1c1d6a6
-
SHA1
9516cc7c3ca8ebd4a5933d6766eb798987374604
-
SHA256
84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385
-
SHA512
d15072932274d20434305b3b30c4e317f3dc99dc40a51f73c9c0490f1b4b0992f210e1c87b866ee142c96892c42bafef5f17a1978eb82f645b0e9bdf3c4722ca
-
SSDEEP
6144:hrafL38i7BQKtxmvgs3alEUUai/NlV8stHI8s7mGgVsZNoz06FHb/OvX3GQ+GSAw:hruMSQKtxmvZ30EUUaiVlV8s906FHb/X
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xpqaaq.exe -
Executes dropped EXE 1 IoCs
pid Process 1536 xpqaaq.exe -
Loads dropped DLL 2 IoCs
pid Process 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /T" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /Y" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /e" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /s" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /O" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /p" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /X" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /i" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /n" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /J" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /w" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /H" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /t" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /k" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /K" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /F" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /g" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /D" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /b" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /I" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /y" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /a" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /R" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /S" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /r" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /P" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /q" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /E" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /B" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /C" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /z" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /h" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /v" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /W" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /G" xpqaaq.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /M" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /l" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /o" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /c" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /j" xpqaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\xpqaaq = "C:\\Users\\Admin\\xpqaaq.exe /U" xpqaaq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe 1536 xpqaaq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 1536 xpqaaq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1536 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 28 PID 1188 wrote to memory of 1536 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 28 PID 1188 wrote to memory of 1536 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 28 PID 1188 wrote to memory of 1536 1188 84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe"C:\Users\Admin\AppData\Local\Temp\84b8220f15d946ffc8f534fbbe88d52e9f38a983469ebfd1dc677b0637eb8385.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\xpqaaq.exe"C:\Users\Admin\xpqaaq.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD56469fb0bfc4a1bdbaef3a7828cd6a3da
SHA148e8f5df5d413fc0af017ec07f142d4904bf9282
SHA256ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c
SHA512bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350
-
Filesize
252KB
MD56469fb0bfc4a1bdbaef3a7828cd6a3da
SHA148e8f5df5d413fc0af017ec07f142d4904bf9282
SHA256ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c
SHA512bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350
-
Filesize
252KB
MD56469fb0bfc4a1bdbaef3a7828cd6a3da
SHA148e8f5df5d413fc0af017ec07f142d4904bf9282
SHA256ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c
SHA512bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350
-
Filesize
252KB
MD56469fb0bfc4a1bdbaef3a7828cd6a3da
SHA148e8f5df5d413fc0af017ec07f142d4904bf9282
SHA256ce93d81314b45457e2731a17e606f0c82f39bb790b299709d182fbfd2cc2c62c
SHA512bd9d0e85f009b9ed8b064709d090301520838009a8de6ba9043f095366d9fdc386385b4d46b7700c0959ce0b1283a0d1cbc294ec5216103f94137e5748e10350