Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
Resource
win10v2004-20240412-en
General
-
Target
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe
-
Size
204KB
-
MD5
4c587616b34b14a4f488d4925dc40a83
-
SHA1
fbea1bde742fbbc11055a5afb963cb4c8d54d327
-
SHA256
35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed
-
SHA512
6d278d62dad5ee70f2ed0019703a43aaecf9d762929ce9d3630f940baecbb5a343ceaf53f444eb91af91b0e3d992032d66a8195157e4827179490808d9bc69f8
-
SSDEEP
3072:kmlW8tB0tQ9nLHbB9W0c1TqECzR/mkSYGrl9ymgYUWYQ:/0E4QxL7B9W0c1RCzR/fSmlu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cqlex.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 cqlex.exe -
Loads dropped DLL 2 IoCs
pid Process 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /b" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /o" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /g" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /z" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /s" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /n" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /k" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /x" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /r" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /h" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /z" 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /m" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /l" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /j" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /q" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /d" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /f" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /v" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /u" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /y" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /i" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /a" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /e" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /t" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /p" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /w" cqlex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\cqlex = "C:\\Users\\Admin\\cqlex.exe /c" cqlex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe 2980 cqlex.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 2980 cqlex.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2980 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 28 PID 1616 wrote to memory of 2980 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 28 PID 1616 wrote to memory of 2980 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 28 PID 1616 wrote to memory of 2980 1616 35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe"C:\Users\Admin\AppData\Local\Temp\35d84579de71a7dd0de1deef45157fa96d4e9be51702cc78a9f22a355dbf26ed.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\cqlex.exe"C:\Users\Admin\cqlex.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5acd9f6a5a14bc9a2fc6ea605837d697c
SHA1193fe3fcaa56ad4fa0f1c1edec4a9a3ffbacfe71
SHA256fb2174917aa560e4dcfce210db3a0b672d5615b35df3520a5a5fa23234c62db0
SHA5126aad6a640a20abac410eba1428db3614e66c39a307249abf590ca9eb5819e7e55aaaee494ad2161b980741c0c4cbb6acf5bf48d975caaa15c9df0e078845ed6c