Analysis
-
max time kernel
20s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 19:59
Behavioral task
behavioral1
Sample
e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe
Resource
win10v2004-20220812-en
General
-
Target
e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe
-
Size
84KB
-
MD5
515b3520ffec32470fff94a448444ac0
-
SHA1
6ac95e294ef522e909bdfb9640e39e9add9c741c
-
SHA256
e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b
-
SHA512
fa058a37cb0e5a51ed99bf0807a8d1a1097f57f2283ae11f87400c9d2b2c42eb6497a044c7145814ce907654680d59178ac6c7d1a49b6509eed4fe3983d460ff
-
SSDEEP
1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2YRmA7hGRIULTxkOPf:MHoLde/OgV432UcP39hXJZn/UEjUxkk
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/memory/904-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-55-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Wqk.dll e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe File created C:\Windows\SysWOW64\Wqk.dll e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dextor32.exe e3fc92664b150f0bdfb406cd110689d16699bfacc9ebaff4716daefae0b41a0b.exe