Analysis

  • max time kernel
    147s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 12:52

General

  • Target

    791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe

  • Size

    920KB

  • MD5

    8e0c3af31a8276e0d8bf4e3e55bcfff3

  • SHA1

    2c92da790e4e6db65a418fb0fbfd071964ab0a59

  • SHA256

    791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9

  • SHA512

    b447c304b8dec2720454fed3c8d0b9969e33295cc76a9d934e5a256e12c5848f6d08835c96f6d90b55c74adda4420f0335e9f034bfdaf83810fc41bc1de935f0

  • SSDEEP

    24576:dwOKOa8Xi6BDPSLXpcdxVPXrx6d2Za1Bb:dlk8XAjpMVPrx6dRXb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe
    "C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Program Files (x86)\QQSoft\lxfill.exe
      lxfill.exe 360Server.dat
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:5108
    • C:\Program Files (x86)\QQSoft\lxfill.exe
      lxfill.exe 360SYY.dat
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:3776
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del lxfill.exe
      2⤵
        PID:984
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c 360Server.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Program Files (x86)\QQSoft\360Server.exe
          360Server.exe
          3⤵
          • Executes dropped EXE
          PID:4840
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\791f1581e47320da82bf15f1bb525a118d344bf0d3fdad640c68d0a0cf17d9c9.exe"
        2⤵
          PID:1780

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\QQSoft\360SYY.dat

              Filesize

              19.0MB

              MD5

              10eaa25eb3abc0b706d1ca3f0512ab86

              SHA1

              975b03e791bd077067bb0d36c6fdd1f5b0d75e6a

              SHA256

              730f6ff58ee0429cacadd9bf49f1cd978279856e5a8feed196bf21bd51ca7e51

              SHA512

              64d154eade7885cf31c1ae9cd3eb8ad1ccff07eb86e744c50d9e2f223ac95cef86a99d428c137b2bd25202e5465afecf18eeadc7041a6c7a43325230b4422b2b

            • C:\Program Files (x86)\QQSoft\360Server.dat

              Filesize

              19.0MB

              MD5

              da5b0f00380e64ee2273d6d1f2ab166d

              SHA1

              2d835bd8a6a1344cfbbe0c6bef14308e97c5d9d8

              SHA256

              6427b59b630ae333e8947ebf7061c4023f3b0dfca17e14005adf52a23cd77acd

              SHA512

              df973644865d35c6202e7ab7f7f6f5c96deb7a23e9285a7fdc2eff118f876a9a71f7639616cfb7e49f76c367d16b5a1ee89336387b15884e7c096c732d0c6ad7

            • C:\Program Files (x86)\QQSoft\360Server.exe

              Filesize

              19.0MB

              MD5

              491b2883a81262e9d22e92a8637bcfe5

              SHA1

              3a097d0e89b7f1e9f95711a6e8daa009e82810d5

              SHA256

              a5fc2d13715ecd75a910b42620a9c5c28afb1545c48840c5db265ece44d5e56c

              SHA512

              081dde55c2b7b47095c2afc4a2bc91dbe8ad4d8c2662e316a4e90787e176da44b31315e7eeceeab5cab323b2555d93db31fa648dcae422643680a449b0c312ac

            • C:\Program Files (x86)\QQSoft\360Server.exe

              Filesize

              19.0MB

              MD5

              491b2883a81262e9d22e92a8637bcfe5

              SHA1

              3a097d0e89b7f1e9f95711a6e8daa009e82810d5

              SHA256

              a5fc2d13715ecd75a910b42620a9c5c28afb1545c48840c5db265ece44d5e56c

              SHA512

              081dde55c2b7b47095c2afc4a2bc91dbe8ad4d8c2662e316a4e90787e176da44b31315e7eeceeab5cab323b2555d93db31fa648dcae422643680a449b0c312ac

            • C:\Program Files (x86)\QQSoft\lxfill.exe

              Filesize

              363KB

              MD5

              22ca8a8bf671ad6f3169daa98eb6d44e

              SHA1

              2e6a67934ca1b61a58dbb19341a77017167441e1

              SHA256

              fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03

              SHA512

              cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16

            • C:\Program Files (x86)\QQSoft\lxfill.exe

              Filesize

              363KB

              MD5

              22ca8a8bf671ad6f3169daa98eb6d44e

              SHA1

              2e6a67934ca1b61a58dbb19341a77017167441e1

              SHA256

              fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03

              SHA512

              cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16

            • C:\Program Files (x86)\QQSoft\lxfill.exe

              Filesize

              363KB

              MD5

              22ca8a8bf671ad6f3169daa98eb6d44e

              SHA1

              2e6a67934ca1b61a58dbb19341a77017167441e1

              SHA256

              fff20313a64bf754754bfcee887d155918f5d444d43f6f6e1fbd0cf0893b5f03

              SHA512

              cf1d6652f488d80035b37e844be4235459a49bb824fc4e89c0ae9f89428e2da747dab2b7608f937dfca84c444276b948a27c345350c7a498280eb6b27bad4d16

            • memory/2228-132-0x0000000000400000-0x0000000000605000-memory.dmp

              Filesize

              2.0MB

            • memory/2228-143-0x0000000000400000-0x0000000000605000-memory.dmp

              Filesize

              2.0MB