Analysis
-
max time kernel
1608s -
max time network
1625s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 04:25
Static task
static1
Behavioral task
behavioral1
Sample
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
Resource
win10v2004-20220901-en
General
-
Target
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
-
Size
449.7MB
-
MD5
0d6dfaceb17ba1292c061758f9c9cc29
-
SHA1
49de8d4fb7bd9e74c33d84fd9c7e8e5c1016ff68
-
SHA256
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef
-
SHA512
f9b462863b3bf547bd6e2d851a66884a0867d6566341d9893f3145899c7ed510cfbbf7d6ffb0d809bda3ff174396cb7ad8461d6788b73cc0cf5fd3e444cde19e
-
SSDEEP
24576:v5ar505yClYM/gCHWxXDPy0cphuST/3PW1ucqqwje973dxu0yLCiXt9jTWcq/:v5ariy4YMexJZw/Iucdp3IbXtFT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Quo_mox niquo niquopen quilo bom lekavasi.exepid process 380 Quo_mox niquo niquopen quilo bom lekavasi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1672 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exepid process 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exeQuo_mox niquo niquopen quilo bom lekavasi.exepid process 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 380 Quo_mox niquo niquopen quilo bom lekavasi.exe 380 Quo_mox niquo niquopen quilo bom lekavasi.exe 380 Quo_mox niquo niquopen quilo bom lekavasi.exe 380 Quo_mox niquo niquopen quilo bom lekavasi.exe 380 Quo_mox niquo niquopen quilo bom lekavasi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.execmd.exedescription pid process target process PID 1476 wrote to memory of 980 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 1476 wrote to memory of 980 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 1476 wrote to memory of 980 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 1476 wrote to memory of 980 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 1476 wrote to memory of 380 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 1476 wrote to memory of 380 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 1476 wrote to memory of 380 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 1476 wrote to memory of 380 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 1476 wrote to memory of 1672 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 1476 wrote to memory of 1672 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 1476 wrote to memory of 1672 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 1476 wrote to memory of 1672 1476 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 1672 wrote to memory of 900 1672 cmd.exe chcp.com PID 1672 wrote to memory of 900 1672 cmd.exe chcp.com PID 1672 wrote to memory of 900 1672 cmd.exe chcp.com PID 1672 wrote to memory of 900 1672 cmd.exe chcp.com PID 1672 wrote to memory of 960 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 960 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 960 1672 cmd.exe PING.EXE PID 1672 wrote to memory of 960 1672 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"2⤵
- Creates scheduled task(s)
PID:980 -
C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:900
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1207.7MB
MD51847a06cc5cabb9299a612ae5dd71b85
SHA1b031e35b73e324998f16db950bf833b38efee88a
SHA256d565f96d445c375034db900194ed8bfa4e3bfc5020dc806e459321dfee51f6fa
SHA512cfafa7ef01312342a32395ae1a059a4b97aabf6ba13ba4c6ce154b012beb07dfa6dfb228ebf04fccc38fe059761da31f190f45f4b550363d24c7ed030a7c32d9
-
Filesize
1207.7MB
MD51847a06cc5cabb9299a612ae5dd71b85
SHA1b031e35b73e324998f16db950bf833b38efee88a
SHA256d565f96d445c375034db900194ed8bfa4e3bfc5020dc806e459321dfee51f6fa
SHA512cfafa7ef01312342a32395ae1a059a4b97aabf6ba13ba4c6ce154b012beb07dfa6dfb228ebf04fccc38fe059761da31f190f45f4b550363d24c7ed030a7c32d9