Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:45
Behavioral task
behavioral1
Sample
f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b.exe
Resource
win10v2004-20220901-en
General
-
Target
f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b.exe
-
Size
275KB
-
MD5
53875fa4a487aed0a6afc8e33a43cc57
-
SHA1
a496cf088ddaaa04d2abce14de7a3bfd895cf36e
-
SHA256
f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b
-
SHA512
3700fe508a65a87ec2f1f0f684e0bc4e780559b857b7e374a4d4d2350a63b879e49c470253ee1e46c333b7aad52cb54db404ec602ef8537fdbae3ae61cd305fb
-
SSDEEP
6144:bBKHYmz6mq2pmHmFV2YjnWuwqzeRhvagc+ZtBSUwvECU:c4m5bpnL2KnEqCRhva5+ZtBSUcEX
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\QQDownload.dll acprotect C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\qqdownload.dll acprotect -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
QQPCDownload60116.exeQQPCDownload.exepid process 4000 QQPCDownload60116.exe 3968 QQPCDownload.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\QQDownload.dll upx C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\qqdownload.dll upx behavioral2/memory/3968-141-0x0000000010000000-0x00000000101DA000-memory.dmp upx behavioral2/memory/3968-142-0x0000000010000000-0x00000000101DA000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
QQPCDownload60116.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation QQPCDownload60116.exe -
Loads dropped DLL 1 IoCs
Processes:
QQPCDownload.exepid process 3968 QQPCDownload.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
QQPCDownload.exedescription ioc process File opened for modification \??\PhysicalDrive0 QQPCDownload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
Processes:
QQPCDownload.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd QQPCDownload.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid\SequenceID = 05886c22a606814485cb29225193490a QQPCDownload.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\metnsd\clsid QQPCDownload.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
QQPCDownload.exepid process 3968 QQPCDownload.exe 3968 QQPCDownload.exe 3968 QQPCDownload.exe 3968 QQPCDownload.exe 3968 QQPCDownload.exe 3968 QQPCDownload.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
QQPCDownload.exepid process 3968 QQPCDownload.exe 3968 QQPCDownload.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
QQPCDownload60116.exedescription pid process target process PID 4000 wrote to memory of 3968 4000 QQPCDownload60116.exe QQPCDownload.exe PID 4000 wrote to memory of 3968 4000 QQPCDownload60116.exe QQPCDownload.exe PID 4000 wrote to memory of 3968 4000 QQPCDownload60116.exe QQPCDownload.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b.exe"C:\Users\Admin\AppData\Local\Temp\f14fec887115be18cb74261bb74934c19bbae6bc35d9d703986d58cbb8614c2b.exe"1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\QQPCDownload60116.exeC:\Users\Admin\AppData\Local\Temp\QQPCDownload60116.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\QQPCDownload.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\QQPCDownload.exe" ##cmd=1;supplyid=601162⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD5e2401fa2c7096c83a26153135c389b5c
SHA17f453599197034ec36716577d4525e4961444af8
SHA256a9a5456d3878664a0f689d25401de1328a56972a697d38b0798a32de05f42c61
SHA512a42d0f5e127e3c36e03518eac6da4f953bff912f4515591b8a857c6a525ebc7352769edb5bb389d156babf187bc84bd0981db7a9e50d10fb35b9aa8c10372b1d
-
Filesize
449KB
MD577f662ee28f3965a4d8f3fc0cf55e5d9
SHA1c78e1e0846bc5a5be770dd1159266c995b4b6fcb
SHA2563e1a024853a85fab452e078d8014a3ec12c20fe8e836acfcde45ab5d636069c2
SHA5124fda8167f82c47ba732718aafe5ad544c292e9776ff3a8520d641dc66acaeb5b6d2c9b43de37634080f1e01d52ba95df7896bddccf8abd8ea624cb3171d41c3a
-
Filesize
449KB
MD577f662ee28f3965a4d8f3fc0cf55e5d9
SHA1c78e1e0846bc5a5be770dd1159266c995b4b6fcb
SHA2563e1a024853a85fab452e078d8014a3ec12c20fe8e836acfcde45ab5d636069c2
SHA5124fda8167f82c47ba732718aafe5ad544c292e9776ff3a8520d641dc66acaeb5b6d2c9b43de37634080f1e01d52ba95df7896bddccf8abd8ea624cb3171d41c3a
-
Filesize
636KB
MD5e2401fa2c7096c83a26153135c389b5c
SHA17f453599197034ec36716577d4525e4961444af8
SHA256a9a5456d3878664a0f689d25401de1328a56972a697d38b0798a32de05f42c61
SHA512a42d0f5e127e3c36e03518eac6da4f953bff912f4515591b8a857c6a525ebc7352769edb5bb389d156babf187bc84bd0981db7a9e50d10fb35b9aa8c10372b1d
-
Filesize
889KB
MD5d7df8b258c882fe7ac2229ab26efa83d
SHA1dc099e6be8e77900f34728d46f331ff6e14dae75
SHA2569c7cc6693aad43de46ea3a5900e81ecc32b601cf3e2a2b428b6d1aef6f0d22c0
SHA512cdedabe7d359ce30e9b268093cb6fa547fbd9cab8c5bfb96398bd92fd4008d7ed4a942053dcf3add8f30217ca53ae064f223de5bb9f616a15afea29bd8601638
-
Filesize
889KB
MD5d7df8b258c882fe7ac2229ab26efa83d
SHA1dc099e6be8e77900f34728d46f331ff6e14dae75
SHA2569c7cc6693aad43de46ea3a5900e81ecc32b601cf3e2a2b428b6d1aef6f0d22c0
SHA512cdedabe7d359ce30e9b268093cb6fa547fbd9cab8c5bfb96398bd92fd4008d7ed4a942053dcf3add8f30217ca53ae064f223de5bb9f616a15afea29bd8601638