Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_99e83f42796e5390063243810c0629de.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_99e83f42796e5390063243810c0629de.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_99e83f42796e5390063243810c0629de.exe
-
Size
184KB
-
MD5
99e83f42796e5390063243810c0629de
-
SHA1
a97c9cdff2002fc328a933df1ae3bc67508814ee
-
SHA256
722d3afa33d79b277e4198517084248b25db8dc90207b5ee4fff76dfa2b19fb5
-
SHA512
ecc5e1e8fe8b36dbf2326e182772ca852e155f8deb5562e3ff707538c5b24961c16a44b26737efbd09cc6d38683cf51c1a363e2668c27f7453ffea21eb0a7a2c
-
SSDEEP
3072:jFIkQ7yjaILMvzovwBB82T/NyG86ry6BSTqQ+hvVdhCL9juDEDsj/RR:pjLMswHHQG86ry6BSGLVAjuv
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\+REcovER+uhmfj+.txt
http://i5ndw.titlecorta.at/B5EC285F737BD644
http://d34fa.lasmeio.com/B5EC285F737BD644
http://2gdb4.leoraorage.at/B5EC285F737BD644
http://k7tlx3ghr3m4n2tu.onion/B5EC285F737BD644
Extracted
C:\Program Files\7-Zip\Lang\+REcovER+uhmfj+.html
http://i5ndw.titlecorta.at/B5EC285F737BD644</a>
http://d34fa.lasmeio.com/B5EC285F737BD644</a></a>
http://2gdb4.leoraorage.at/B5EC285F737BD644</a>
http://k7tlx3ghr3m4n2tu.onion/B5EC285F737BD644
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation qpekua.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VirusShare_99e83f42796e5390063243810c0629de.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\+REcovER+uhmfj+.html qpekua.exe -
Executes dropped EXE 1 IoCs
pid Process 3272 qpekua.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vssbqgmil = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START \"\" \"C:\\Users\\Admin\\Documents\\qpekua.exe\"" qpekua.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_File_Transfer_Complete.m4a qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-32_altform-unplated.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Spacer\7px.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\WinMetadata\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\SmallTile.scale-125.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Google.scale-150.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailLargeTile.scale-200.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Images\thumb_animation.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\_Resources\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-60_altform-lightunplated.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lt-LT\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionSmallTile.scale-150.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-125_contrast-black.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\LargeTile.scale-100.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt-BR\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Store\AppIcon.targetsize-24.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-80_contrast-white.png qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\ODBC\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TimerWideTile.contrast-white_scale-125.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeLargeTile.scale-200.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeLargeTile.scale-125_contrast-white.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\nl\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-30_contrast-white.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailSmallTile.scale-100.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-72.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-200.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreAppList.targetsize-32.png qpekua.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ca-ES\View3d\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorWideTile.contrast-white_scale-200.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\NavigationIcons\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-80_contrast-black.png qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pl\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-30.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\TimerWideTile.contrast-black_scale-100.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\Dismiss.scale-64.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\am-ET\View3d\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorLargeTile.contrast-white_scale-125.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedLargeTile.scale-200_contrast-white.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-white_scale-100.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\WideTile.scale-100_contrast-black.png qpekua.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-24_altform-unplated_contrast-black.png qpekua.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\+REcovER+uhmfj+.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\170.png qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ru-RU\View3d\+REcovER+uhmfj+.txt qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\MicrosoftSolitaireMedTile.scale-100.jpg qpekua.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\+REcovER+uhmfj+.html qpekua.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\+REcovER+uhmfj+.txt qpekua.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1208 vssadmin.exe 1952 vssadmin.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings qpekua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe 3272 qpekua.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3272 qpekua.exe Token: SeBackupPrivilege 1340 vssvc.exe Token: SeRestorePrivilege 1340 vssvc.exe Token: SeAuditPrivilege 1340 vssvc.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1836 wrote to memory of 3272 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 87 PID 1836 wrote to memory of 3272 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 87 PID 1836 wrote to memory of 3272 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 87 PID 1836 wrote to memory of 2812 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 88 PID 1836 wrote to memory of 2812 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 88 PID 1836 wrote to memory of 2812 1836 VirusShare_99e83f42796e5390063243810c0629de.exe 88 PID 3272 wrote to memory of 1208 3272 qpekua.exe 90 PID 3272 wrote to memory of 1208 3272 qpekua.exe 90 PID 3272 wrote to memory of 1684 3272 qpekua.exe 103 PID 3272 wrote to memory of 1684 3272 qpekua.exe 103 PID 3272 wrote to memory of 1684 3272 qpekua.exe 103 PID 3272 wrote to memory of 4888 3272 qpekua.exe 104 PID 3272 wrote to memory of 4888 3272 qpekua.exe 104 PID 4888 wrote to memory of 3340 4888 msedge.exe 105 PID 4888 wrote to memory of 3340 4888 msedge.exe 105 PID 3272 wrote to memory of 1952 3272 qpekua.exe 106 PID 3272 wrote to memory of 1952 3272 qpekua.exe 106 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 4744 4888 msedge.exe 108 PID 4888 wrote to memory of 2632 4888 msedge.exe 109 PID 4888 wrote to memory of 2632 4888 msedge.exe 109 PID 4888 wrote to memory of 2728 4888 msedge.exe 110 PID 4888 wrote to memory of 2728 4888 msedge.exe 110 PID 4888 wrote to memory of 2728 4888 msedge.exe 110 PID 4888 wrote to memory of 2728 4888 msedge.exe 110 PID 4888 wrote to memory of 2728 4888 msedge.exe 110 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System qpekua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" qpekua.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_99e83f42796e5390063243810c0629de.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_99e83f42796e5390063243810c0629de.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\Documents\qpekua.exeC:\Users\Admin\Documents\qpekua.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3272 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1208
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\+REcovER+uhmfj+.txt3⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\+REcovER+uhmfj+.html3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea69046f8,0x7ffea6904708,0x7ffea69047184⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:34⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2548 /prefetch:84⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:14⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:14⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:84⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:14⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:14⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14422472583282283148,9916680941742449184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:14⤵PID:3272
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:1952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\DOCUME~1\qpekua.exe >> NUL3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE >> NUL2⤵PID:2812
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5c31dc805496fe47a137137ba0d8fab72
SHA1e34c5d6b8be360d90648eaf2d8bee8a58091f998
SHA256c28aaa75e32c408777f7fa846af2b01ff6c329ff95e3155e8621ca6a7d561122
SHA5124deaa42a71aafa78854c9f5bb1452185db388815b1870526c362a8681ea044f8b5bc543a4b81cea8ae87f1658ff25a01f5112435f9ecd1ca6f1b7496bae898b6
-
Filesize
82KB
MD594dae22c6c680d54650313423d2fc950
SHA1c349d411d5baa8492a397cd62d688bc8a60de970
SHA2568ef4681157ade40ccda2ef7f40695dece2bbd7920420a30d37f8c991f29af0d4
SHA5123595fc50a66028be5a9d86cfef69a70569a1ff74818f51bc05a653982fbf0e7bb89120d2b915d074cc2042ee258e314676318da0af4bdcbf2d668d9fdb8e5917
-
Filesize
2KB
MD54b366c5be58d2348488c1ef4e5bd9e3b
SHA1216cd1ad25cf2a5e8f19a4bcc87dc063f636d137
SHA256c2aac3ac8348d8a5d6c358b632c72ee4e0f69c2d7e3e7cf20e7af50120fb0905
SHA51217fc311745463cb9d69efeecfaf3c7ff4d1cf33d538168e311a7702b6aa9cc234b6eb67fd0cc1efb96c3ab451bc927b58395ad7e6bbac50c7fc88f07e60804ef
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD56ae296606ea7df8ccc4862c0df39f557
SHA1c525d4af3956ddc28779c1b7c14bbb972d1bd64f
SHA2565180b59b93a76809fbc5393daf7562c04255578d17e650a1e5e067fa80f9a192
SHA5121eb6adb785f9fd3bf34e456e67563b676bf0cfb887cebdb6ff2b0e71103bbe4c4aa7e895df852eb938ae8cd37116b97dd3cc141df21bb4feb88efd82cb0c245a
-
Filesize
6KB
MD55472c09fff523669e5b4d8ecd8fde080
SHA1c7a0d62737adc71635a89fb9a919073101bf4460
SHA256c823bc367411b1db8fa41fa17b3501f3cedefe5dcfc7b5eda9b2135a1c38bb1e
SHA5123ab40f5c07c03af6bb3686257aed34ed43dc4b06c4c154f4d85de66bb06b50bb7af7a50839f71dd7dfd6be8187477aac49a7d7026aa86dc412f77abd57e59496
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5156105a13121efa61a5cf18fcd1a05e0
SHA12ad7a91bf477fa4df6614868be14369a7c602c63
SHA256647eaafbbb1a835887e2ae35fb324cbe89d45dd816419796038f3bd156e89d7e
SHA512240edc8eb7f0b4a034e97c32ab0b79ef0cfb3e28758d2bca22ac54fe11742f809052fc1c99c2744ac4d3b9b7d392599d13f5793e24bb2b15ca725fce0be682ba
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596477626237069.txt
Filesize75KB
MD58d80ee7e05b7cb03e11f1eb910db8a16
SHA16c736bd1fabb8c2ce57f0ead9128433c26ae55fd
SHA2565034435edfc958c08fe45ea8e8d2621ce12b3269157124420ad6cdda8e1db967
SHA512b4a8adf357e70e105024665dbad0a9d1ada4b76ed985ba836522f1f48532eb2985b795c1e9d2c8873e1532a975f3cddd1c650b39661bf521ad064a506ec4c00b
-
Filesize
184KB
MD599e83f42796e5390063243810c0629de
SHA1a97c9cdff2002fc328a933df1ae3bc67508814ee
SHA256722d3afa33d79b277e4198517084248b25db8dc90207b5ee4fff76dfa2b19fb5
SHA512ecc5e1e8fe8b36dbf2326e182772ca852e155f8deb5562e3ff707538c5b24961c16a44b26737efbd09cc6d38683cf51c1a363e2668c27f7453ffea21eb0a7a2c