Analysis
-
max time kernel
190s -
max time network
231s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe
Resource
win10v2004-20221111-en
General
-
Target
73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe
-
Size
252KB
-
MD5
b2229032d7b335533a9dd254c9d29c6f
-
SHA1
1b71ab8a14291e67e1a424c633d2957a524bf8a4
-
SHA256
73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c
-
SHA512
51cb72b36e16b89de42cbfa6bc8ef666036dbd49a7bffa8837ba0b4aae63e9915b6a0f6c187c53e09c716f94795588255cef7d922a557f001793e319ac775b9c
-
SSDEEP
6144:0d0EJxRpLPGO/7YBNPVlVRgoEA9Qx2fKHEZXrUEQOy7:cFVjwPVlVRgoEA9Qx2fKHEZXrbG7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qiimu.exe -
Executes dropped EXE 1 IoCs
pid Process 4436 qiimu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /A" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /e" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /K" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /Z" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /w" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /D" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /f" qiimu.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /E" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /R" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /I" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /u" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /j" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /z" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /P" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /M" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /v" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /L" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /W" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /q" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /h" qiimu.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /b" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /a" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /V" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /U" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /J" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /T" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /t" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /O" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /c" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /s" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /i" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /Q" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /x" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /r" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /g" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /H" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /B" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /m" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /F" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /N" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /l" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /o" 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /S" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /C" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /X" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /G" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /n" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /k" qiimu.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qiimu = "C:\\Users\\Admin\\qiimu.exe /o" qiimu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe 4436 qiimu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 4436 qiimu.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4436 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 80 PID 5060 wrote to memory of 4436 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 80 PID 5060 wrote to memory of 4436 5060 73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe"C:\Users\Admin\AppData\Local\Temp\73e1ee879e5839f509e34531ca5972744bad5f24e7738f4bd15bdb6c02ccb93c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\qiimu.exe"C:\Users\Admin\qiimu.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5bc0c941e77caca9754bd5b3985b95d91
SHA1c133e51c4c97cc4468a718dd3c6bfd3657090a10
SHA256341f800593337acabd95147cd5cb2c199a6652bfa465d86e300506cc9aa907d8
SHA51209a2695797941927d6efb42f07d418e27230c6d6a73f9c5eaf25c01b7fb57e1f5339ed0fa845f933e23fc5ac8d61b045ab4e7c9e34052aa655190606af6be9a5
-
Filesize
252KB
MD5bc0c941e77caca9754bd5b3985b95d91
SHA1c133e51c4c97cc4468a718dd3c6bfd3657090a10
SHA256341f800593337acabd95147cd5cb2c199a6652bfa465d86e300506cc9aa907d8
SHA51209a2695797941927d6efb42f07d418e27230c6d6a73f9c5eaf25c01b7fb57e1f5339ed0fa845f933e23fc5ac8d61b045ab4e7c9e34052aa655190606af6be9a5