Analysis
-
max time kernel
24s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe
Resource
win10v2004-20220414-en
General
-
Target
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe
-
Size
837KB
-
MD5
634b173fe43d25859263331dbe25c459
-
SHA1
6092e7be079a9b78a04291c1c5aff02e89d1ae51
-
SHA256
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7
-
SHA512
0774be4714c422cc545851f6a70c07b789fc1b8e05a0164235f84c125deca71a558212cf64a26f7d323f80afd8d18f261010e998d9b46f85fc8e9e036d9b57bd
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exedescription ioc process File opened for modification \??\PhysicalDrive0 c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe -
Drops file in System32 directory 1 IoCs
Processes:
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exedescription ioc process File opened for modification C:\Windows\SysWOW64\qqzc.ini c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exepid process 760 c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe 760 c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe"C:\Users\Admin\AppData\Local\Temp\c052f14f3b6a2aa2ddac02eaaf8afd22e1e19a94725509b28e87f5ee39bc2ed7.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/760-54-0x0000000076851000-0x0000000076853000-memory.dmpFilesize
8KB
-
memory/760-56-0x00000000032E0000-0x00000000032E4000-memory.dmpFilesize
16KB
-
memory/760-55-0x00000000002B0000-0x0000000000304000-memory.dmpFilesize
336KB
-
memory/760-57-0x00000000032D0000-0x00000000032D4000-memory.dmpFilesize
16KB