Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:43
Behavioral task
behavioral1
Sample
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe
Resource
win10v2004-20221111-en
General
-
Target
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe
-
Size
62KB
-
MD5
539bb20f6306b67026434ba400a2b040
-
SHA1
80d82a71ba9c7b11f6933732dc851a0f32c1765e
-
SHA256
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7
-
SHA512
503bb7169cbecd6d3892b2412c6ebe719efecda4295755d7c47d3b327562df252d3d767b6737a946d7b628b1768149c8b499d8af236f703c62c86a753f738cd2
-
SSDEEP
1536:MHoSCdeVMCT6ggMw4Y7FgG2xV89mTr39w6XJJzVt/2nR:MHoLde/OgV432UcP39hXJZn/K
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/996-54-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Wqk.dll c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe File created C:\Windows\SysWOW64\Wqk.dll c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe -
Drops file in Windows directory 1 IoCs
Processes:
c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exedescription ioc process File created C:\Windows\dextor32.exe c26c48e098e13b31c7e47f15d575f58ec6ccebb85474bf460999abf032f611f7.exe