Analysis
-
max time kernel
46s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 04:06
Static task
static1
Behavioral task
behavioral1
Sample
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
Resource
win10-20220901-en
General
-
Target
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe
-
Size
449.7MB
-
MD5
0d6dfaceb17ba1292c061758f9c9cc29
-
SHA1
49de8d4fb7bd9e74c33d84fd9c7e8e5c1016ff68
-
SHA256
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef
-
SHA512
f9b462863b3bf547bd6e2d851a66884a0867d6566341d9893f3145899c7ed510cfbbf7d6ffb0d809bda3ff174396cb7ad8461d6788b73cc0cf5fd3e444cde19e
-
SSDEEP
24576:v5ar505yClYM/gCHWxXDPy0cphuST/3PW1ucqqwje973dxu0yLCiXt9jTWcq/:v5ariy4YMexJZw/Iucdp3IbXtFT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Quo_mox niquo niquopen quilo bom lekavasi.exepid process 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 908 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exepid process 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exeQuo_mox niquo niquopen quilo bom lekavasi.exepid process 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe 1792 Quo_mox niquo niquopen quilo bom lekavasi.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.execmd.exedescription pid process target process PID 848 wrote to memory of 1104 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 848 wrote to memory of 1104 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 848 wrote to memory of 1104 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 848 wrote to memory of 1104 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe schtasks.exe PID 848 wrote to memory of 1792 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 848 wrote to memory of 1792 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 848 wrote to memory of 1792 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 848 wrote to memory of 1792 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe Quo_mox niquo niquopen quilo bom lekavasi.exe PID 848 wrote to memory of 908 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 848 wrote to memory of 908 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 848 wrote to memory of 908 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 848 wrote to memory of 908 848 bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe cmd.exe PID 908 wrote to memory of 432 908 cmd.exe chcp.com PID 908 wrote to memory of 432 908 cmd.exe chcp.com PID 908 wrote to memory of 432 908 cmd.exe chcp.com PID 908 wrote to memory of 432 908 cmd.exe chcp.com PID 908 wrote to memory of 1128 908 cmd.exe PING.EXE PID 908 wrote to memory of 1128 908 cmd.exe PING.EXE PID 908 wrote to memory of 1128 908 cmd.exe PING.EXE PID 908 wrote to memory of 1128 908 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\bed801306842692dafa1aa5c7a23ae4effc9a214f765ca6572c7253630e434ef.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exeFilesize
1247.7MB
MD578e60d228cd9ea570e149f7ca013a303
SHA13ab1f3bfecc611284eec48e73f374efc4712b289
SHA2568d20d37cd3c0746a4f88e929fa68350ff895cb19bbaac9231a16579b5dfe5c97
SHA51276cf1bea10b48fe64b11a782aa18b7207e7970b9ccdf2b1f5846af72f9cebfe256560cb45a74d3dfbb83ab68cd6c0e59ee627e53c7eb0a04a5e9c48d0c16710b
-
\Users\Admin\mexo xamahaxi tetoteb\Quo_mox niquo niquopen quilo bom lekavasi.exeFilesize
1247.7MB
MD578e60d228cd9ea570e149f7ca013a303
SHA13ab1f3bfecc611284eec48e73f374efc4712b289
SHA2568d20d37cd3c0746a4f88e929fa68350ff895cb19bbaac9231a16579b5dfe5c97
SHA51276cf1bea10b48fe64b11a782aa18b7207e7970b9ccdf2b1f5846af72f9cebfe256560cb45a74d3dfbb83ab68cd6c0e59ee627e53c7eb0a04a5e9c48d0c16710b
-
memory/432-65-0x0000000000000000-mapping.dmp
-
memory/848-64-0x0000000000B90000-0x0000000000CD9000-memory.dmpFilesize
1.3MB
-
memory/848-54-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/848-55-0x0000000000B90000-0x0000000000CD9000-memory.dmpFilesize
1.3MB
-
memory/908-63-0x0000000000000000-mapping.dmp
-
memory/1104-56-0x0000000000000000-mapping.dmp
-
memory/1128-67-0x0000000000000000-mapping.dmp
-
memory/1792-58-0x0000000000000000-mapping.dmp
-
memory/1792-61-0x0000000000810000-0x0000000000959000-memory.dmpFilesize
1.3MB
-
memory/1792-62-0x000000000CD80000-0x000000000CDE6000-memory.dmpFilesize
408KB
-
memory/1792-66-0x0000000000810000-0x0000000000959000-memory.dmpFilesize
1.3MB
-
memory/1792-68-0x000000000CD80000-0x000000000CDE6000-memory.dmpFilesize
408KB