Analysis
-
max time kernel
15s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:54
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe
-
Size
620KB
-
MD5
377a9b356f6e80ec29083be9f5b8f74f
-
SHA1
e69d5175c3db1190927f680eb4173b2abd64fa19
-
SHA256
da97d22eb7016e9daa46962d9c6eb47d9227ad534a996531b793cd00f71b36a0
-
SHA512
31c4a38c48f85e48b87bfb0fcb557ee5305227ec4e1f5690291800dfa79839a143642eb126b24574c504848f52c43c806124fc14ea7cfe920f35dc0d4bfad60e
Score
1/10
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exeSecuriteInfo.com.Troj.Qbot-FS.19822.1181.exepid process 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe 4224 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe 4224 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe 4224 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe 4224 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SecuriteInfo.com.Troj.Qbot-FS.19822.1181.execmd.exedescription pid process target process PID 4760 wrote to memory of 4224 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe PID 4760 wrote to memory of 4224 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe PID 4760 wrote to memory of 4224 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe PID 4760 wrote to memory of 3084 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe cmd.exe PID 4760 wrote to memory of 3084 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe cmd.exe PID 4760 wrote to memory of 3084 4760 SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe cmd.exe PID 3084 wrote to memory of 556 3084 cmd.exe PING.EXE PID 3084 wrote to memory of 556 3084 cmd.exe PING.EXE PID 3084 wrote to memory of 556 3084 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Troj.Qbot-FS.19822.1181.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:556