Analysis

  • max time kernel
    97s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:07

General

  • Target

    豪迪QQ群发7.7 破解版/QS2013.exe

  • Size

    2.2MB

  • MD5

    327f826191b63c077bbe95ef3dd5f63a

  • SHA1

    bec63f9b09f91a4b307ad11619126ace7fe0b18e

  • SHA256

    7e13145fdbdc9cdb8f103f1d654ebbd3188d75274b82298990eda1d9a5667ab2

  • SHA512

    26b647ec8e8a435565ff914133d459c9aa9c58cfef8fa691025b104f356d01ab7d225c243a196a13a595a95bb4aab1942fd6a2619ee30c918368e59130819699

  • SSDEEP

    49152:hDHRzI9C8WN+j65234IPcunLh6X/IwgqGl1WqYQby6WWouFhKUNmRWdiqUbL2Iql:ZHdIMHNgL0udmglGsjUOx

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\豪迪QQ群发7.7 破解版\QS2013.exe
    "C:\Users\Admin\AppData\Local\Temp\豪迪QQ群发7.7 破解版\QS2013.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:3672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 532
      2⤵
      • Program crash
      PID:1116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3672 -ip 3672
    1⤵
      PID:3188

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3672-132-0x0000000000A80000-0x0000000000A8F000-memory.dmp

      Filesize

      60KB

    • memory/3672-133-0x0000000000A90000-0x0000000000AA0000-memory.dmp

      Filesize

      64KB

    • memory/3672-134-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-135-0x0000000077360000-0x0000000077503000-memory.dmp

      Filesize

      1.6MB

    • memory/3672-136-0x0000000075220000-0x0000000075435000-memory.dmp

      Filesize

      2.1MB

    • memory/3672-138-0x0000000075720000-0x00000000758C0000-memory.dmp

      Filesize

      1.6MB

    • memory/3672-139-0x0000000076440000-0x00000000764BA000-memory.dmp

      Filesize

      488KB

    • memory/3672-1483-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1484-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1485-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1486-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1488-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1489-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB

    • memory/3672-1490-0x0000000002AF0000-0x0000000002BF0000-memory.dmp

      Filesize

      1024KB

    • memory/3672-1491-0x0000000000400000-0x0000000000735000-memory.dmp

      Filesize

      3.2MB