Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 06:42
Behavioral task
behavioral1
Sample
53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe
Resource
win10v2004-20220812-en
General
-
Target
53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe
-
Size
474KB
-
MD5
73fe38ae34df61585b4797b313305a63
-
SHA1
614c65ef19407f9c524ac9201dccf51b95bfb336
-
SHA256
53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d
-
SHA512
6fee25b492fadd77c6962086ed30b54a3d2936555987936be02c28a6fb710e75b4410d50c7b2bc46841fce2df2cf4b885f3f0dbd7980a74fea8c343f9bcd6324
-
SSDEEP
6144:UdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqH:S8kxNhOZElO5kkWjhD4AOWDLpt
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\odt\\XAFQ.EXE \"%1\" %*" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command QNUN.EXE -
Executes dropped EXE 1 IoCs
pid Process 888 QNUN.EXE -
resource yara_rule behavioral2/memory/944-132-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/files/0x0009000000022e07-134.dat upx behavioral2/files/0x0009000000022e07-135.dat upx behavioral2/memory/944-136-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/888-137-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XAFQ.EXE = "C:\\odt\\XAFQ.EXE" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\L: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\E: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\K: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\M: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\P: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\Q: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\U: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\V: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\I: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\H: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\O: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\S: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\G: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\N: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\R: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\T: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe File opened (read-only) \??\F: 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\System Volume Information\\QOCGBU.EXE %1" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\odt\\XAFQ.EXE \"%1\" %*" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\odt\\XAFQ.EXE %1" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "C:\\System Volume Information\\QOCGBU.EXE \"%1\"" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\odt\\XAFQ.EXE \"%1\"" 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command QNUN.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 888 QNUN.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 944 wrote to memory of 888 944 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe 80 PID 944 wrote to memory of 888 944 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe 80 PID 944 wrote to memory of 888 944 53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe"C:\Users\Admin\AppData\Local\Temp\53fb7d5776dcc46e41ca309db47b8554b335df854b9eba5d1fb818b71da65b0d.exe"1⤵
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\PerfLogs\QNUN.EXEC:\PerfLogs\QNUN.EXE2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD53ded9755539f326561da1054135c12fa
SHA138b7f7eb1dc9f04b550f774cf4376d59652bf786
SHA2560bb3845af7482a967e6330abfc51bd863df95056bd893b1a86719a612e33ad2e
SHA512540f23ff76ad989c08d63b7841b36bce2568918d5d37d096ed89ca2b4da685a067a27bf5448b837f30a514551f2acc985ac02319142b0bf763f235b40871a127
-
Filesize
475KB
MD53ded9755539f326561da1054135c12fa
SHA138b7f7eb1dc9f04b550f774cf4376d59652bf786
SHA2560bb3845af7482a967e6330abfc51bd863df95056bd893b1a86719a612e33ad2e
SHA512540f23ff76ad989c08d63b7841b36bce2568918d5d37d096ed89ca2b4da685a067a27bf5448b837f30a514551f2acc985ac02319142b0bf763f235b40871a127