Overview
overview
10Static
static
101.exe
windows7-x64
81.exe
windows10-1703-x64
81.exe
windows10-2004-x64
81.exe
windows11-21h2-x64
8360setr.exe
windows7-x64
8360setr.exe
windows10-1703-x64
8360setr.exe
windows10-2004-x64
8360setr.exe
windows11-21h2-x64
88989.exe
windows7-x64
108989.exe
windows10-1703-x64
108989.exe
windows10-2004-x64
108989.exe
windows11-21h2-x64
10988.exe
windows7-x64
7988.exe
windows10-1703-x64
3988.exe
windows10-2004-x64
3988.exe
windows11-21h2-x64
3999999.exe
windows7-x64
10999999.exe
windows10-1703-x64
10999999.exe
windows10-2004-x64
10999999.exe
windows11-21h2-x64
10server.exe
windows7-x64
8server.exe
windows10-1703-x64
8server.exe
windows10-2004-x64
8server.exe
windows11-21h2-x64
8·À½Ù³Ö1.0.exe
windows7-x64
8·À½Ù³Ö1.0.exe
windows10-1703-x64
8·À½Ù³Ö1.0.exe
windows10-2004-x64
8·À½Ù³Ö1.0.exe
windows11-21h2-x64
8Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 02:37
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
1.exe
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
360setr.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
360setr.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
360setr.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
360setr.exe
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
8989.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
8989.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
8989.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
8989.exe
Resource
win11-20240611-en
Behavioral task
behavioral13
Sample
988.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
988.exe
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
988.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
988.exe
Resource
win11-20240611-en
Behavioral task
behavioral17
Sample
999999.exe
Resource
win7-20240611-en
Behavioral task
behavioral18
Sample
999999.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
999999.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
999999.exe
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
server.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
server.exe
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
server.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral24
Sample
server.exe
Resource
win11-20240508-en
Behavioral task
behavioral25
Sample
·À½Ù³Ö1.0.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
·À½Ù³Ö1.0.exe
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
·À½Ù³Ö1.0.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral28
Sample
·À½Ù³Ö1.0.exe
Resource
win11-20240508-en
General
-
Target
988.exe
-
Size
2.1MB
-
MD5
8eadcc4d69631ce1252201d164bff08c
-
SHA1
364278c807838bf3d75001c72bffa9b00bb42dd6
-
SHA256
54334afc530f334754ec13761319c8ef536fc644fcd33e5c405ba4aedb8fd90b
-
SHA512
97fa9dfd9444f711a31c6d017d00151664c8e1e7bc6cc157d55bb59ae13e0d453d1475b82ce6b577b7b3ad448df989550f7594283f016877cda0c8324fd84b6a
-
SSDEEP
49152:TF4qX74X0XrtpUePzKtA+F3l7BPAeYKHdj/PAHD1QCizINk/Sap19W:a874X0JpUePzV+xl79AeYKHdj/PGDAIC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2056 Kuiqyse.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Kuiqyse.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Kuiqyse.exe 988.exe File opened for modification C:\Program Files (x86)\Kuiqyse.exe 988.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Kuiqyse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Kuiqyse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC}\WpadDecisionTime = c030e75496bfda01 Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC}\8a-b4-51-e9-59-b0 Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Kuiqyse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Kuiqyse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b4-51-e9-59-b0 Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b4-51-e9-59-b0\WpadDecisionReason = "1" Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b4-51-e9-59-b0\WpadDecision = "0" Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Kuiqyse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kuiqyse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0139000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC}\WpadDecisionReason = "1" Kuiqyse.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC}\WpadDecision = "0" Kuiqyse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b4-51-e9-59-b0\WpadDecisionTime = c030e75496bfda01 Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Kuiqyse.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Kuiqyse.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC} Kuiqyse.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{4CB0183C-95C5-4820-ACBB-59B75CBBC8BC}\WpadNetworkName = "Network 3" Kuiqyse.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2872 988.exe 2056 Kuiqyse.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\988.exe"C:\Users\Admin\AppData\Local\Temp\988.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2872
-
C:\Program Files (x86)\Kuiqyse.exe"C:\Program Files (x86)\Kuiqyse.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD58eadcc4d69631ce1252201d164bff08c
SHA1364278c807838bf3d75001c72bffa9b00bb42dd6
SHA25654334afc530f334754ec13761319c8ef536fc644fcd33e5c405ba4aedb8fd90b
SHA51297fa9dfd9444f711a31c6d017d00151664c8e1e7bc6cc157d55bb59ae13e0d453d1475b82ce6b577b7b3ad448df989550f7594283f016877cda0c8324fd84b6a
-
Filesize
8B
MD571d864b6b132a9235400af39917131b3
SHA1b79d02acde8be0d57bedef9bd3edeab0a5a066f3
SHA256f4392ea35b8bafc5813b48055be473c4eceb72f11936a67a92cd9086efc2492e
SHA512f331a1c933e016667682d3339784e57f4518305954a7e02643b4deab5ff8ded663232f38190d535457f4351d506f642cea961ea09dc3182c7917f8e483dbd0d3