Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    07-08-2020 18:38

General

  • Target

    [Dev] ¿áQ Air [Õýʽ°æ]/¿áQ Air/CQA.exe

  • Size

    5.6MB

  • MD5

    6aa36f386a3e645f67cd6945374b8ea8

  • SHA1

    17f6d3dedfd6afe56135d3a2e7ae3a7d120151ca

  • SHA256

    39599008089755aa7cccb534b2c94ccb537f266018bb67ae3ed4b9f51c0a40b9

  • SHA512

    87f59bb1a8d6887fa967d811e2db70c2bfb9bf9673347c6bada2d03f1e3371fbe05e7853a063a90df71627f9ea803d83c71c89b88859199f5a28e2c05e38d706

Score
8/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[Dev] ¿áQ Air [Õýʽ°æ]\¿áQ Air\CQA.exe
    "C:\Users\Admin\AppData\Local\Temp\[Dev] ¿áQ Air [Õýʽ°æ]\¿áQ Air\CQA.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Loads dropped DLL
    PID:1668
    • C:\Users\Admin\Documents\itunes.exe
      "C:\Users\Admin\Documents\itunes.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of AdjustPrivilegeToken
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1780

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads