Analysis
-
max time kernel
151s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe
Resource
win10v2004-20221111-en
General
-
Target
bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe
-
Size
332KB
-
MD5
f53c30b74c7109aad69bc9c7c2a7efd0
-
SHA1
4a071954fcee854a33b2c63e206f9bcabde9e728
-
SHA256
bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59
-
SHA512
24d61ecbdf176457f5544d4a1c31a70dc0260e5c548c857cde294b3f74f90a12efede9bca5adc008041508fbe2d44a600f350f8cb7598fc74e6297b618b3391e
-
SSDEEP
6144:sz9jYa2v8yCrmZHKnvmb7/D26jCEwC+9Zuuh7wmwbO8u3e5S:YtcnkmZHKnvmb7/D263uh7NwbO88P
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ciiqo.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 ciiqo.exe -
Loads dropped DLL 2 IoCs
pid Process 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /t" ciiqo.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /N" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /S" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /C" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /A" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /W" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /J" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /u" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /f" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /a" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /L" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /X" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /B" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /z" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /r" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /G" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /e" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /y" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /E" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /R" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /i" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /F" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /M" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /P" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /Y" ciiqo.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /h" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /w" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /v" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /q" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /Q" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /I" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /n" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /p" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /Z" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /d" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /g" bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /x" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /j" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /O" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /V" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /T" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /m" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /s" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /U" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /D" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /c" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /K" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /g" ciiqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\ciiqo = "C:\\Users\\Admin\\ciiqo.exe /H" ciiqo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe 2036 ciiqo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 2036 ciiqo.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2036 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 28 PID 1260 wrote to memory of 2036 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 28 PID 1260 wrote to memory of 2036 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 28 PID 1260 wrote to memory of 2036 1260 bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe"C:\Users\Admin\AppData\Local\Temp\bb0c7d52547958e4d474648e389cd0fd92efd50fd5d82f82075b2f14a3258f59.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\ciiqo.exe"C:\Users\Admin\ciiqo.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD59df2bd0f8f840d31dff7dcbcf36ae72c
SHA1ca72c5ee5294baeb80a3a664b529e0c5ab1fbc86
SHA256927bdb0afe99b2ff2f552fccd0d72a3f628b63dc3a8b9ac901c5c19cc5b25aef
SHA51228dffefc17e84d4826f553f838066d96a893f23cf44c8804d5330374196f13417ec365ebc7d7f774dd1a9fe768a3da0ed295ff50c3f1db316d625bb7f35b7769
-
Filesize
332KB
MD59df2bd0f8f840d31dff7dcbcf36ae72c
SHA1ca72c5ee5294baeb80a3a664b529e0c5ab1fbc86
SHA256927bdb0afe99b2ff2f552fccd0d72a3f628b63dc3a8b9ac901c5c19cc5b25aef
SHA51228dffefc17e84d4826f553f838066d96a893f23cf44c8804d5330374196f13417ec365ebc7d7f774dd1a9fe768a3da0ed295ff50c3f1db316d625bb7f35b7769
-
Filesize
332KB
MD59df2bd0f8f840d31dff7dcbcf36ae72c
SHA1ca72c5ee5294baeb80a3a664b529e0c5ab1fbc86
SHA256927bdb0afe99b2ff2f552fccd0d72a3f628b63dc3a8b9ac901c5c19cc5b25aef
SHA51228dffefc17e84d4826f553f838066d96a893f23cf44c8804d5330374196f13417ec365ebc7d7f774dd1a9fe768a3da0ed295ff50c3f1db316d625bb7f35b7769
-
Filesize
332KB
MD59df2bd0f8f840d31dff7dcbcf36ae72c
SHA1ca72c5ee5294baeb80a3a664b529e0c5ab1fbc86
SHA256927bdb0afe99b2ff2f552fccd0d72a3f628b63dc3a8b9ac901c5c19cc5b25aef
SHA51228dffefc17e84d4826f553f838066d96a893f23cf44c8804d5330374196f13417ec365ebc7d7f774dd1a9fe768a3da0ed295ff50c3f1db316d625bb7f35b7769