Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe
Resource
win10v2004-20220812-en
General
-
Target
2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe
-
Size
198KB
-
MD5
316e5cc5e5d73244b7a0d92e0994d552
-
SHA1
a627f2c2387fc82fbe524f7d6b5a8abf22f09ac4
-
SHA256
2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea
-
SHA512
9f1507dd72988d95874e3e7ebb8967213bd827017c09f174222625c8106001a2c17f0a4e39bc685caa87ad7769fd393f0fcbd409950538803306d97ef9db5958
-
SSDEEP
6144:OnTrHfU2yqT0nFC7wkZuUm0wgzaqQE0Fzz1Q:OnnHszqoFC7whrm+DE0w
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\qbq.exe\" -a \"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\ = "Application" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon\ = "%1" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\Content Type = "application/x-msdownload" qbq.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1908 qbq.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1908 qbq.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" qbq.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon\ = "%1" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\DefaultIcon qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\Content Type = "application/x-msdownload" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\qbq.exe\" -a \"%1\" %*" qbq.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\ = "Application" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\DefaultIcon\ = "%1" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\Content Type = "application/x-msdownload" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\ = "exefile" qbq.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\qbq.exe\" -a \"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell qbq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" qbq.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 1908 qbq.exe 1908 qbq.exe 1908 qbq.exe 1908 qbq.exe 1908 qbq.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: 33 1000 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1000 AUDIODG.EXE Token: 33 1000 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1000 AUDIODG.EXE Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe Token: SeShutdownPrivilege 1324 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1908 qbq.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1908 qbq.exe 1324 explorer.exe 1324 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1324 explorer.exe 1908 qbq.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1908 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 28 PID 1728 wrote to memory of 1908 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 28 PID 1728 wrote to memory of 1908 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 28 PID 1728 wrote to memory of 1908 1728 2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe"C:\Users\Admin\AppData\Local\Temp\2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\qbq.exe"C:\Users\Admin\AppData\Local\qbq.exe" -gav C:\Users\Admin\AppData\Local\Temp\2d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1908
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5901⤵
- Suspicious use of AdjustPrivilegeToken
PID:1000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5316e5cc5e5d73244b7a0d92e0994d552
SHA1a627f2c2387fc82fbe524f7d6b5a8abf22f09ac4
SHA2562d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea
SHA5129f1507dd72988d95874e3e7ebb8967213bd827017c09f174222625c8106001a2c17f0a4e39bc685caa87ad7769fd393f0fcbd409950538803306d97ef9db5958
-
Filesize
198KB
MD5316e5cc5e5d73244b7a0d92e0994d552
SHA1a627f2c2387fc82fbe524f7d6b5a8abf22f09ac4
SHA2562d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea
SHA5129f1507dd72988d95874e3e7ebb8967213bd827017c09f174222625c8106001a2c17f0a4e39bc685caa87ad7769fd393f0fcbd409950538803306d97ef9db5958
-
Filesize
198KB
MD5316e5cc5e5d73244b7a0d92e0994d552
SHA1a627f2c2387fc82fbe524f7d6b5a8abf22f09ac4
SHA2562d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea
SHA5129f1507dd72988d95874e3e7ebb8967213bd827017c09f174222625c8106001a2c17f0a4e39bc685caa87ad7769fd393f0fcbd409950538803306d97ef9db5958
-
Filesize
198KB
MD5316e5cc5e5d73244b7a0d92e0994d552
SHA1a627f2c2387fc82fbe524f7d6b5a8abf22f09ac4
SHA2562d431819926de331e0fce87860ad5278e08de21aadbb055b1a81044ce5a1acea
SHA5129f1507dd72988d95874e3e7ebb8967213bd827017c09f174222625c8106001a2c17f0a4e39bc685caa87ad7769fd393f0fcbd409950538803306d97ef9db5958