Analysis
-
max time kernel
297s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-09-2022 10:23
Static task
static1
Behavioral task
behavioral1
Sample
e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe
Resource
win10-20220812-en
General
-
Target
e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe
-
Size
2.7MB
-
MD5
533244692811a045ab0196075601a5e8
-
SHA1
d767e5fd2e2ecfb84c6b698f3da2acb1b45e1101
-
SHA256
e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06
-
SHA512
a2d403c75887dbfb0c423c8ca8d47a6f684f21b91b66ecad7ab2ccf6fab96f5a5a01efaf53fb03d47357dec6edfb5afa9ac9bd5425265fef5c264af9a0ba28b4
-
SSDEEP
49152:Jcj/tvWu3aPukI16LlRNYn1qgJcwCb9098ebMt0NunlgcMTW72ja:8/t+u3aP1k6ZLYnIg8ebMAu1d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4936 mqbkup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 4936 mqbkup.exe 4936 mqbkup.exe 4936 mqbkup.exe 4936 mqbkup.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4452 schtasks.exe 3768 schtasks.exe 3956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 4936 mqbkup.exe 4936 mqbkup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1004 wrote to memory of 3768 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 35 PID 1004 wrote to memory of 3768 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 35 PID 1004 wrote to memory of 3768 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 35 PID 1004 wrote to memory of 2904 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 69 PID 1004 wrote to memory of 2904 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 69 PID 1004 wrote to memory of 2904 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 69 PID 1004 wrote to memory of 3956 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 71 PID 1004 wrote to memory of 3956 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 71 PID 1004 wrote to memory of 3956 1004 e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe 71 PID 4936 wrote to memory of 4452 4936 mqbkup.exe 75 PID 4936 wrote to memory of 4452 4936 mqbkup.exe 75 PID 4936 wrote to memory of 4452 4936 mqbkup.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe"C:\Users\Admin\AppData\Local\Temp\e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe"2⤵
- Creates scheduled task(s)
PID:3768
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}"2⤵PID:2904
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\67765327532705345647"2⤵
- Creates scheduled task(s)
PID:3956
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Message Queuing Backup{J4G6S2B4M7X2-F6S2J7D9N5-H5D2A3X4V5}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\mqb\mqbkup.exe"2⤵
- Creates scheduled task(s)
PID:4452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a67f0d8f9f190b1081346978439c9cbe
SHA1e56d6dd14f09dc72dba266765da0d7864fcac7d2
SHA256a0b22e2b11551e9efea8608e59d7bef7d4d934d997cf7c13121f89939524ca76
SHA5127af2b5a9fac0df3c871edf2e8fe9ca80e9429f8398b76c06eba5dbbbca8f36a258b00f97f754962acb360fc2193daffd987953724212a47d173f43080fe45dfd
-
Filesize
2.7MB
MD5533244692811a045ab0196075601a5e8
SHA1d767e5fd2e2ecfb84c6b698f3da2acb1b45e1101
SHA256e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06
SHA512a2d403c75887dbfb0c423c8ca8d47a6f684f21b91b66ecad7ab2ccf6fab96f5a5a01efaf53fb03d47357dec6edfb5afa9ac9bd5425265fef5c264af9a0ba28b4
-
Filesize
2.7MB
MD5533244692811a045ab0196075601a5e8
SHA1d767e5fd2e2ecfb84c6b698f3da2acb1b45e1101
SHA256e1f14a44d63d931b1adc8aa4b7502489d24c61d24867cc5143b738271be30d06
SHA512a2d403c75887dbfb0c423c8ca8d47a6f684f21b91b66ecad7ab2ccf6fab96f5a5a01efaf53fb03d47357dec6edfb5afa9ac9bd5425265fef5c264af9a0ba28b4