Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-06-2022 22:20
Static task
static1
Behavioral task
behavioral1
Sample
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe
Resource
win10v2004-20220414-en
General
-
Target
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe
-
Size
100KB
-
MD5
e1b7edc7b64d3658dc80ff55416b0c13
-
SHA1
dce6acf0d134a7b9a59302624264083a43e0e292
-
SHA256
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
-
SHA512
6b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winqicm.exepid Process 908 winqicm.exe -
Loads dropped DLL 2 IoCs
Processes:
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exepid Process 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update 495955904 = "C:\\Windows\\3765310510651712\\winqicm.exe" 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update 495955904 = "C:\\Windows\\3765310510651712\\winqicm.exe" 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe -
Drops file in Windows directory 3 IoCs
Processes:
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exedescription ioc Process File created C:\Windows\3765310510651712\winqicm.exe 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe File opened for modification C:\Windows\3765310510651712\winqicm.exe 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe File opened for modification C:\Windows\3765310510651712 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exedescription pid Process procid_target PID 1240 wrote to memory of 908 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe 27 PID 1240 wrote to memory of 908 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe 27 PID 1240 wrote to memory of 908 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe 27 PID 1240 wrote to memory of 908 1240 687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe"C:\Users\Admin\AppData\Local\Temp\687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\3765310510651712\winqicm.exeC:\Windows\3765310510651712\winqicm.exe2⤵
- Executes dropped EXE
PID:908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e1b7edc7b64d3658dc80ff55416b0c13
SHA1dce6acf0d134a7b9a59302624264083a43e0e292
SHA256687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
SHA5126b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81
-
Filesize
100KB
MD5e1b7edc7b64d3658dc80ff55416b0c13
SHA1dce6acf0d134a7b9a59302624264083a43e0e292
SHA256687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
SHA5126b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81
-
Filesize
100KB
MD5e1b7edc7b64d3658dc80ff55416b0c13
SHA1dce6acf0d134a7b9a59302624264083a43e0e292
SHA256687d3e649b6ba09bc072fcb69ef751b729983dcdbecfb4da7f0d8b2c509c196b
SHA5126b86abf8505edfe5e428cb3c3128fa9dd65e4d8bdc0c4b1e1f951733fce66d25e8929150137d2454f77332dc96f6be326a9f9ffe309899fa7ebb731e73f24f81