Analysis
-
max time kernel
262s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe
Resource
win10-20220812-en
General
-
Target
8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe
-
Size
6.0MB
-
MD5
631dfec43025a25dae41c929ffa34ec8
-
SHA1
817c9b8be0f446b4765b97092277decbdde976d3
-
SHA256
8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1
-
SHA512
402f81064a3931d2218e36e8506a7708cfe60d89a585dcfc58555f4616cdd22f130667d2ea30f6ea1b2820a1b68cf2e85777cfccc055eb9da8f4478890ff1179
-
SSDEEP
196608:Pf+RazMuKqUmCiOnNZ9a2BxDQBTgqT9Cl:3+RcemCiOT2a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 mqbkup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 1364 mqbkup.exe 1364 mqbkup.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2008 1784 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1624 schtasks.exe 960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 1364 mqbkup.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1784 wrote to memory of 1624 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 28 PID 1784 wrote to memory of 1624 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 28 PID 1784 wrote to memory of 1624 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 28 PID 1784 wrote to memory of 1624 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 28 PID 1784 wrote to memory of 2036 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 30 PID 1784 wrote to memory of 2036 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 30 PID 1784 wrote to memory of 2036 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 30 PID 1784 wrote to memory of 2036 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 30 PID 1784 wrote to memory of 2008 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 33 PID 1784 wrote to memory of 2008 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 33 PID 1784 wrote to memory of 2008 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 33 PID 1784 wrote to memory of 2008 1784 8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe 33 PID 1572 wrote to memory of 1364 1572 taskeng.exe 35 PID 1572 wrote to memory of 1364 1572 taskeng.exe 35 PID 1572 wrote to memory of 1364 1572 taskeng.exe 35 PID 1572 wrote to memory of 1364 1572 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe"C:\Users\Admin\AppData\Local\Temp\8d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe"2⤵
- Creates scheduled task(s)
PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}"2⤵PID:2036
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\67765327532705345647"2⤵
- Creates scheduled task(s)
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1922⤵
- Program crash
PID:2008
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9229BC81-4540-45C5-B548-8D0702AD93C2} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5631dfec43025a25dae41c929ffa34ec8
SHA1817c9b8be0f446b4765b97092277decbdde976d3
SHA2568d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1
SHA512402f81064a3931d2218e36e8506a7708cfe60d89a585dcfc58555f4616cdd22f130667d2ea30f6ea1b2820a1b68cf2e85777cfccc055eb9da8f4478890ff1179
-
Filesize
6.0MB
MD5631dfec43025a25dae41c929ffa34ec8
SHA1817c9b8be0f446b4765b97092277decbdde976d3
SHA2568d3a2571b7fb00b61a631d533ebdad8c89f7c419048f8d1e84745c37e37182c1
SHA512402f81064a3931d2218e36e8506a7708cfe60d89a585dcfc58555f4616cdd22f130667d2ea30f6ea1b2820a1b68cf2e85777cfccc055eb9da8f4478890ff1179