Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2023, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
DCQPKX.exe
Resource
win10v2004-20220812-en
General
-
Target
DCQPKX.exe
-
Size
118KB
-
MD5
10f237e6da56cf46bfd0ea8c22544bee
-
SHA1
d83d7974796fd286f24dd606cf11b444ca55e249
-
SHA256
6f4c49af2816b18488a1f4e2c08380c719df849c7030652e4971332ba3100927
-
SHA512
834b6c9b3cfe740c3c0560f974e399d9efd2ca4586580bf148a43285b2cc4c0ad21ed05869587143be448f6fb42fa4b8dea9f2a2c585c4bfb77ba8056130c1ab
-
SSDEEP
768:G9YjkW9gXrjRaxxeOy7C4yi66XjEyKXtItYcFwVc6K:GSwPRax0O4p6lyAtkwVcl
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\System32\README.txt DCQPKX.exe File created C:\Program Files\System32\Argos.exe DCQPKX.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2924 NOTEPAD.EXE 5104 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4364 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3448 DCQPKX.exe Token: SeDebugPrivilege 4364 taskmgr.exe Token: SeSystemProfilePrivilege 4364 taskmgr.exe Token: SeCreateGlobalPrivilege 4364 taskmgr.exe Token: 33 4364 taskmgr.exe Token: SeIncBasePriorityPrivilege 4364 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCQPKX.exe"C:\Users\Admin\AppData\Local\Temp\DCQPKX.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4364
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2924
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README.txt1⤵
- Opens file in notepad (likely ransom note)
PID:5104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD58b3e49acf59c25c4bc99e11fe8e06f21
SHA120f1b205454871df2862cda882bd6150a97823ec
SHA2563f618be70b390efbbffc37ebda76d8ae1e48155be72ff796d187c7891754875b
SHA512a0026bacecd0b6f8b7efc5d87c1f10ced199d76b3cd4c29dc31f330d9582db350b052551ad7c215483147b89435c521cabbc2fc663433c72725c792ba9ce1c6f