Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe
Resource
win10v2004-20241007-en
General
-
Target
2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe
-
Size
156KB
-
MD5
1e366e36c80cba426cffcc2836713681
-
SHA1
b045181fc509aedc6e6c7b59b2138cf217aae4cf
-
SHA256
2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3
-
SHA512
d985ae1c4902be9a25727e1c15e6bd087dd02ab83cb9663b580d18807e7dd2d1f816399c4a2f12df01b2552d15c6e86c8f79e0d2dcd4d550e92c508273662617
-
SSDEEP
3072:QBd1iE2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiEbMc:SdcE2R7Qvb4tQTaCeFP4A+W/
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" quihov.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 quihov.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /D" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /R" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /A" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /t" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /T" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /N" 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /L" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /f" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /J" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /E" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /N" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /i" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /a" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /s" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /O" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /C" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /b" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /k" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /F" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /B" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /p" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /S" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /v" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /X" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /z" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /n" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /g" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /o" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /l" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /G" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /V" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /Y" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /w" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /H" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /j" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /u" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /m" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /d" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /Z" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /Q" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /y" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /I" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /K" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /c" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /W" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /x" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /e" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /U" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /h" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /M" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /q" quihov.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\quihov = "C:\\Users\\Admin\\quihov.exe /P" quihov.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quihov.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe 2684 quihov.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 2684 quihov.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2684 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 31 PID 3024 wrote to memory of 2684 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 31 PID 3024 wrote to memory of 2684 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 31 PID 3024 wrote to memory of 2684 3024 2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe"C:\Users\Admin\AppData\Local\Temp\2d7c2eadeff9fcb6a0ba8f497c24bcecbee72a281a18ea4c9bc7ab52519c04b3.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\quihov.exe"C:\Users\Admin\quihov.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD53e18b6be88eebfda286527c859c4d39c
SHA1f3c31784283965ca3b1ba9894656b651a0d5ae8e
SHA256781391324ff175560799f6fc85835b3dc982627964b91e2435dc84cbf57c646a
SHA51280bb21caff39de4461a4006128e21c4e5bb76e44f12957ab9a62522aaa67b83e7c0200288b9e759795ba240cde89193d018b8d48a8e1392707f23834a6af370e