Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe
Resource
win10v2004-20220414-en
General
-
Target
15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe
-
Size
3.7MB
-
MD5
7095a724461739b15822fd0dd49b327f
-
SHA1
3d98b504b552c0b86912aaaec3cb9658f8b9260e
-
SHA256
15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd
-
SHA512
1753efee3a36f8aeb6fec810433e7f07feef30774b9ba65d6c3487862f88f64fc006e12a166a306f1be1974fb1e50129587897d63b919e700c9dbf8abd1a2272
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1812 QMDesktopAnimation.exe 1808 lsass.exe 2036 lsass.exe -
Loads dropped DLL 5 IoCs
pid Process 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 1812 QMDesktopAnimation.exe 1812 QMDesktopAnimation.exe 1812 QMDesktopAnimation.exe 1812 QMDesktopAnimation.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360°²È«·þÎñ = "C:\\Users\\QMDesktopAnimation.exe" QMDesktopAnimation.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 1812 QMDesktopAnimation.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1812 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 27 PID 1672 wrote to memory of 1812 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 27 PID 1672 wrote to memory of 1812 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 27 PID 1672 wrote to memory of 1812 1672 15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe 27 PID 1812 wrote to memory of 1808 1812 QMDesktopAnimation.exe 28 PID 1812 wrote to memory of 1808 1812 QMDesktopAnimation.exe 28 PID 1812 wrote to memory of 1808 1812 QMDesktopAnimation.exe 28 PID 1812 wrote to memory of 1808 1812 QMDesktopAnimation.exe 28 PID 1812 wrote to memory of 2036 1812 QMDesktopAnimation.exe 29 PID 1812 wrote to memory of 2036 1812 QMDesktopAnimation.exe 29 PID 1812 wrote to memory of 2036 1812 QMDesktopAnimation.exe 29 PID 1812 wrote to memory of 2036 1812 QMDesktopAnimation.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe"C:\Users\Admin\AppData\Local\Temp\15b59ff79bbe290dc9da9c695017740a697f5b2f58c3aa78c04af1485a7b75dd.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\QMDesktopAnimation.exeC:\Users\QMDesktopAnimation.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
PID:1808
-
-
C:\Users\Public\lsass.exeC:\Users\Public\lsass.exe3⤵
- Executes dropped EXE
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5be31e9cbf3aaa02fec9a6dc2fe49b8f1
SHA1dd554ece008b8d5a9425fa7b5792033e42217484
SHA256931bd3c45bca3a6766e67870457663ae386c04a4983b57cd10b83c1c5fddd19a
SHA5129757bee88f27d9e5a860f3a69046e23bbfea39521c09bb59476fcf5e53eea530e04d717ebe1805a0af78c5d8e4cf0d988fe1e94c1e1c5543c89449debe070a0a
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff
-
Filesize
2.2MB
MD5be31e9cbf3aaa02fec9a6dc2fe49b8f1
SHA1dd554ece008b8d5a9425fa7b5792033e42217484
SHA256931bd3c45bca3a6766e67870457663ae386c04a4983b57cd10b83c1c5fddd19a
SHA5129757bee88f27d9e5a860f3a69046e23bbfea39521c09bb59476fcf5e53eea530e04d717ebe1805a0af78c5d8e4cf0d988fe1e94c1e1c5543c89449debe070a0a
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
1.5MB
MD54d223a6a4e9402cca12dfb8ac4cb470e
SHA15e2a470561d4a788bc53e8ebbfc208eccc98f390
SHA256bdc9e471d303f81dbf0a62a50d86e45647505786b3cdf7a0d14a4595a4ae68e1
SHA512091a5e194d45d02f7f156bc611c4c35ed19ab8bf0b806dcbfd2fc63f72837000fcc52e981bb7c980302cecbbca29ae941f30b7136a97c90953b94383e384dd29
-
Filesize
69KB
MD53d924b86f8dc8215ea1dcda84c218ad7
SHA1bff3baea1ea9f1eef642773382d6e8945fa5bf8c
SHA256a429ee865286dc2be99cb61ac2ed8f29c148aabd7f77943e65114744bc4df98b
SHA512bab02ad0a21b44692bf60db8600872290274b44212febae90c6cf99e09a30c516493253da52b3d80b4fe805100e90fde953b8674c4c8e11911e187dd12dbc7ff