Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 13:14

General

  • Target

    e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe

  • Size

    284KB

  • MD5

    acea7eb3caa13865ee594bfcb66bc1da

  • SHA1

    a468a0ee8cfee4461c5a1b3badef8694498a03a3

  • SHA256

    e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf

  • SHA512

    5644007f846387ed26b6df315184e29663f41e801a1f583ac49d4cee0be190094ff3f3c4ce6e99103e37ab43f4b1f33f12ef7f120b7df2536cb7d47483b2ecc0

  • SSDEEP

    6144:iBKeMQ0Nl6loc090LiQF/rxvoO+rkU7DNU7yKeJ5Ig:n6l490Ws9v27DN2yKeog

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe
        "C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe
          "C:\Users\Admin\AppData\Local\Temp\e9b9f1c3113d9912591ba9391b8a88fd13ee8ef09facc1a688afbf813b1862bf.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1168
          • C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe
            "C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1980
            • C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe
              "C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1960
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                6⤵
                • Modifies firewall policy service
                • Deletes itself
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:636
    • C:\Program Files\Windows Mail\WinMail.exe
      "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
      1⤵
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1292

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe

      Filesize

      284KB

      MD5

      47f1629b5be1ceac02543402382ca46e

      SHA1

      f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e

      SHA256

      68ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a

      SHA512

      4ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201

    • C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe

      Filesize

      284KB

      MD5

      47f1629b5be1ceac02543402382ca46e

      SHA1

      f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e

      SHA256

      68ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a

      SHA512

      4ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201

    • C:\Users\Admin\AppData\Roaming\Quqai\enpa.exe

      Filesize

      284KB

      MD5

      47f1629b5be1ceac02543402382ca46e

      SHA1

      f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e

      SHA256

      68ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a

      SHA512

      4ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201

    • \Users\Admin\AppData\Roaming\Quqai\enpa.exe

      Filesize

      284KB

      MD5

      47f1629b5be1ceac02543402382ca46e

      SHA1

      f9e21984ba0c91ae18bb6758e2f5dbe7a9ad092e

      SHA256

      68ae55f39b7d5b1fa93c02820346354967e70b3d527e9638d539d00e219e997a

      SHA512

      4ded6aa03ccf71fc26d9e165530f45259601eee13ecf0d6735ad41386be6c8ba3396f8f8cc1929f035e537e331ee4786a27e8356167bfcad31511a8041f7c201

    • memory/636-113-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/636-96-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/636-93-0x0000000074521000-0x0000000074523000-memory.dmp

      Filesize

      8KB

    • memory/636-91-0x0000000000000000-mapping.dmp

    • memory/1168-94-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-54-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-69-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-70-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-67-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-55-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-111-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-68-0x0000000075571000-0x0000000075573000-memory.dmp

      Filesize

      8KB

    • memory/1168-57-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-64-0x0000000000413D24-mapping.dmp

    • memory/1168-63-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-61-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1168-59-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1292-97-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

      Filesize

      8KB

    • memory/1292-98-0x000007FEF6791000-0x000007FEF6793000-memory.dmp

      Filesize

      8KB

    • memory/1292-99-0x0000000002330000-0x0000000002340000-memory.dmp

      Filesize

      64KB

    • memory/1292-105-0x0000000002390000-0x00000000023A0000-memory.dmp

      Filesize

      64KB

    • memory/1884-65-0x0000000000290000-0x00000000002BD000-memory.dmp

      Filesize

      180KB

    • memory/1960-95-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1960-84-0x0000000000413D24-mapping.dmp

    • memory/1960-112-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1980-86-0x0000000001C30000-0x0000000001C5D000-memory.dmp

      Filesize

      180KB

    • memory/1980-72-0x0000000000000000-mapping.dmp