Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe
Resource
win10v2004-20220901-en
General
-
Target
7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe
-
Size
299KB
-
MD5
7cdfddba8f4c3146ba1b23e007817d90
-
SHA1
3871c87b9ebebc84acac734a05e448995a148fdf
-
SHA256
7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0
-
SHA512
e1e1b5ba0df52f4726f6cbc7824947811c22493e8f49f1e80b44589879e0c5ccc52596025927213cb34f6b5489dcb1d11700574e2d8f36f95fd5cbf64d9a3c31
-
SSDEEP
6144:UTQigjOeD798+kcwXB5Fa94Be2kbMVgC4NLvBb79savmHXP:UTQJjz98+6fBe2kYVgxFmHXP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 meiqg.exe -
Deletes itself 1 IoCs
pid Process 660 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run meiqg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Meiqg = "C:\\Users\\Admin\\AppData\\Roaming\\Alolli\\meiqg.exe" meiqg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 784 set thread context of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe 1984 meiqg.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 784 wrote to memory of 1984 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 26 PID 784 wrote to memory of 1984 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 26 PID 784 wrote to memory of 1984 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 26 PID 784 wrote to memory of 1984 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 26 PID 1984 wrote to memory of 1232 1984 meiqg.exe 12 PID 1984 wrote to memory of 1232 1984 meiqg.exe 12 PID 1984 wrote to memory of 1232 1984 meiqg.exe 12 PID 1984 wrote to memory of 1232 1984 meiqg.exe 12 PID 1984 wrote to memory of 1232 1984 meiqg.exe 12 PID 1984 wrote to memory of 1312 1984 meiqg.exe 15 PID 1984 wrote to memory of 1312 1984 meiqg.exe 15 PID 1984 wrote to memory of 1312 1984 meiqg.exe 15 PID 1984 wrote to memory of 1312 1984 meiqg.exe 15 PID 1984 wrote to memory of 1312 1984 meiqg.exe 15 PID 1984 wrote to memory of 1360 1984 meiqg.exe 13 PID 1984 wrote to memory of 1360 1984 meiqg.exe 13 PID 1984 wrote to memory of 1360 1984 meiqg.exe 13 PID 1984 wrote to memory of 1360 1984 meiqg.exe 13 PID 1984 wrote to memory of 1360 1984 meiqg.exe 13 PID 1984 wrote to memory of 784 1984 meiqg.exe 25 PID 1984 wrote to memory of 784 1984 meiqg.exe 25 PID 1984 wrote to memory of 784 1984 meiqg.exe 25 PID 1984 wrote to memory of 784 1984 meiqg.exe 25 PID 1984 wrote to memory of 784 1984 meiqg.exe 25 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27 PID 784 wrote to memory of 660 784 7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe 27
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe"C:\Users\Admin\AppData\Local\Temp\7c5c374fff9dd0e030572ec24a1eb4787f5c5f4ea5101c88c3f208e7cb3f8ca0.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe"C:\Users\Admin\AppData\Roaming\Alolli\meiqg.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HCP992F.bat"3⤵
- Deletes itself
PID:660
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD544f1aefc17dcd09fb27c12a8e07fbcaf
SHA18e50498a6fb0739d8bdb6b360a1b0c03d40a4d83
SHA2565cdd166e2f29924c7a15a6c0af04cf8bcf0df2c35bc37c9e5632e58dcd216e81
SHA51268deb158a4998f326a14fdd77f8f07f974fb3303124115b6d831f0dada93dd5b7e23650665298ebed4872febb0a7406848bbc04bca7befb905cb01716df65155
-
Filesize
299KB
MD56ed89166b822f17f88d2734c12cc993e
SHA10f6d2721ce6760fd7c44ba25a9b4f0e266de2be6
SHA256dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d
SHA512a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02
-
Filesize
299KB
MD56ed89166b822f17f88d2734c12cc993e
SHA10f6d2721ce6760fd7c44ba25a9b4f0e266de2be6
SHA256dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d
SHA512a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02
-
Filesize
299KB
MD56ed89166b822f17f88d2734c12cc993e
SHA10f6d2721ce6760fd7c44ba25a9b4f0e266de2be6
SHA256dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d
SHA512a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02
-
Filesize
299KB
MD56ed89166b822f17f88d2734c12cc993e
SHA10f6d2721ce6760fd7c44ba25a9b4f0e266de2be6
SHA256dacc95c448c6ff0b32575b65533e20fa5421bda18b75e8dc94eacd04f55dcb3d
SHA512a9c88258c507a0e48d1aff54c04c5830a80fbef18424a0f33430d7ea5dd7900a024a138a130546050765c15c8c59b5f9771fe2b3c6ae9155a2bca2b627629d02