Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe
Resource
win10v2004-20240226-en
General
-
Target
8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe
-
Size
204KB
-
MD5
a8165af7b5314d690f8bdd0933b297e9
-
SHA1
a075ff6fbc25d956a0feea0b6c63b8e91f80c522
-
SHA256
8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3
-
SHA512
3c443b84914a4cf9893f8d6d447708b510fdcb5da24d9cd8ab13154b3ead988c915ee2681837a41c1714bfac51af03f4cde78523002f11ad8291f47486eda830
-
SSDEEP
3072:omRW8NC0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWul:zAOC4QxL7B9W0c1RCzR/fSml1
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quyaw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe -
Executes dropped EXE 1 IoCs
pid Process 3832 quyaw.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /d" 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /i" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /s" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /u" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /m" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /w" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /y" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /g" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /f" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /j" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /e" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /d" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /a" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /l" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /k" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /b" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /t" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /p" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /z" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /h" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /q" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /n" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /c" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /v" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /o" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /r" quyaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\quyaw = "C:\\Users\\Admin\\quyaw.exe /x" quyaw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe 3832 quyaw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 3832 quyaw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3832 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 97 PID 4500 wrote to memory of 3832 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 97 PID 4500 wrote to memory of 3832 4500 8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe"C:\Users\Admin\AppData\Local\Temp\8cb22ba2e1fe14f547ec9561a8959b0f3f4e8cd1810d3e2acfafbd7d96581ce3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\quyaw.exe"C:\Users\Admin\quyaw.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD549b289cdc592c88afb681b910836d8d3
SHA14890e7a880e7233c32faa3f90653d40c2f57e1ee
SHA256af0629fbc35adcc1664e1c35e8b0b27d664b78640508db04d5f6cf1c6ca044da
SHA5122c01fbf18f6471d960605549f7129abbc44bf595c56fd4aec65fa1c0f8c72cd53ea9c81560b8b9d5eb3b4dc3046928173a6a00d7fca8fc3717ce1e7356aaa429