Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe
Resource
win10v2004-20220812-en
General
-
Target
791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe
-
Size
920KB
-
MD5
8e0c3af31a8276e0d8bf4e3e55bcfff3
-
SHA1
2c92da790e4e6db65a418fb0fbfd071964ab0a59
-
SHA256
791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9
-
SHA512
b447c304b8dec2720454fed3c8d0b9969e33295cc76a9d934e5a256e12c5848f6d08835c96f6d90b55c74adda4420f0335e9f034bfdaf83810fc41bc1de935f0
-
SSDEEP
24576:dwOKOa8Xi6BDPSLXpcdxVPXrx6d2Za1Bb:dlk8XAjpMVPrx6dRXb
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5108 lxfill.exe 3776 lxfill.exe 4840 360Server.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\QQSoft\360Server.dat 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe File created C:\Program Files (x86)\QQSoft\360SYY.dat 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe File created C:\Program Files (x86)\QQSoft\lxfill.exe 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe File opened for modification C:\Program Files (x86)\QQSoft\360Server.dat lxfill.exe File opened for modification C:\Program Files (x86)\QQSoft\360SYY.dat lxfill.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2228 wrote to memory of 5108 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 79 PID 2228 wrote to memory of 5108 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 79 PID 2228 wrote to memory of 5108 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 79 PID 2228 wrote to memory of 3776 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 80 PID 2228 wrote to memory of 3776 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 80 PID 2228 wrote to memory of 3776 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 80 PID 2228 wrote to memory of 984 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 81 PID 2228 wrote to memory of 984 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 81 PID 2228 wrote to memory of 984 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 81 PID 2228 wrote to memory of 3104 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 83 PID 2228 wrote to memory of 3104 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 83 PID 2228 wrote to memory of 3104 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 83 PID 2228 wrote to memory of 1780 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 84 PID 2228 wrote to memory of 1780 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 84 PID 2228 wrote to memory of 1780 2228 791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe 84 PID 3104 wrote to memory of 4840 3104 cmd.exe 87 PID 3104 wrote to memory of 4840 3104 cmd.exe 87 PID 3104 wrote to memory of 4840 3104 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe"C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\QQSoft\lxfill.exelxfill.exe 360Server.dat2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5108
-
-
C:\Program Files (x86)\QQSoft\lxfill.exelxfill.exe 360SYY.dat2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3776
-
-
C:\Windows\SysWOW64\cmd.execmd /c del lxfill.exe2⤵PID:984
-
-
C:\Windows\SysWOW64\cmd.execmd /c 360Server.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\QQSoft\360Server.exe360Server.exe3⤵
- Executes dropped EXE
PID:4840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe"2⤵PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.0MB
MD510eaa25eb3abc0b706d1ca3f0512ab86
SHA1975b03e791bd077067bb0d36c6fdd1f5b0d75e6a
SHA256730f6ff58ee0429cacadd9bf49f1cd978279856e5a8feed196bf21bd51ca7e51
SHA51264d154eade7885cf31c1ae9cd3eb8ad1ccff07eb86e744c50d9e2f223ac95cef86a99d428c137b2bd25202e5465afecf18eeadc7041a6c7a43325230b4422b2b
-
Filesize
19.0MB
MD5da5b0f00380e64ee2273d6d1f2ab166d
SHA12d835bd8a6a1344cfbbe0c6bef14308e97c5d9d8
SHA2566427b59b630ae333e8947ebf7061c4023f3b0dfca17e14005adf52a23cd77acd
SHA512df973644865d35c6202e7ab7f7f6f5c96deb7a23e9285a7fdc2eff118f876a9a71f7639616cfb7e49f76c367d16b5a1ee89336387b15884e7c096c732d0c6ad7
-
Filesize
19.0MB
MD5491b2883a81262e9d22e92a8637bcfe5
SHA13a097d0e89b7f1e9f95711a6e8daa009e82810d5
SHA256a5fc2d13715ecd75a910b42620a9c5c28afb1545c48840c5db265ece44d5e56c
SHA512081dde55c2b7b47095c2afc4a2bc91dbe8ad4d8c2662e316a4e90787e176da44b31315e7eeceeab5cab323b2555d93db31fa648dcae422643680a449b0c312ac
-
Filesize
19.0MB
MD5491b2883a81262e9d22e92a8637bcfe5
SHA13a097d0e89b7f1e9f95711a6e8daa009e82810d5
SHA256a5fc2d13715ecd75a910b42620a9c5c28afb1545c48840c5db265ece44d5e56c
SHA512081dde55c2b7b47095c2afc4a2bc91dbe8ad4d8c2662e316a4e90787e176da44b31315e7eeceeab5cab323b2555d93db31fa648dcae422643680a449b0c312ac
-
Filesize
363KB
MD522ca8a8bf671ad6f3169daa98eb6d44e
SHA12e6a67934ca1b61a58dbb19341a77017167441e1
SHA256fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03
SHA512cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16
-
Filesize
363KB
MD522ca8a8bf671ad6f3169daa98eb6d44e
SHA12e6a67934ca1b61a58dbb19341a77017167441e1
SHA256fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03
SHA512cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16
-
Filesize
363KB
MD522ca8a8bf671ad6f3169daa98eb6d44e
SHA12e6a67934ca1b61a58dbb19341a77017167441e1
SHA256fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03
SHA512cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16