Analysis
-
max time kernel
142s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:47
Behavioral task
behavioral1
Sample
Usp10.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Usp10.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
qqmsgsee.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
qqmsgsee.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
使用必读.url
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
使用必读.url
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
华彩软件站.url
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
华彩软件站.url
Resource
win10v2004-20221111-en
General
-
Target
qqmsgsee.exe
-
Size
232KB
-
MD5
d7d5a8136962ee21e14fa33f127064da
-
SHA1
f97737161502842fa07add7b89be3b34271df3c3
-
SHA256
2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f
-
SHA512
da0cade98fae9ef332ebec7b51b513b73402da1e4ed5ba3b1d7078caa957d9bf66da3ca9e865e54102aed546f5948ffad8bae87c4abb19363df97f8d4eb26a2b
-
SSDEEP
3072:AMdgD6dbNFko1ayFCpEZWCfEgl+D7t5VOcoF/7UbNVLPLcqcoMaUfdqMwuW0Gc3I:Jdge1NFVH0pwpMfN5V7bzooMkMwHc0U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winvrtd.exepid process 4224 winvrtd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qqmsgsee.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation qqmsgsee.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
qqmsgsee.exedescription ioc process File opened for modification \??\PhysicalDrive0 qqmsgsee.exe -
Drops file in System32 directory 3 IoCs
Processes:
qqmsgsee.exewinvrtd.exedescription ioc process File created C:\Windows\SysWOW64\winvrtd.exe qqmsgsee.exe File opened for modification C:\Windows\SysWOW64\winvtd.db qqmsgsee.exe File created C:\Windows\SysWOW64\winvtd32.dll winvrtd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
winvrtd.exepid process 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe 4224 winvrtd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
qqmsgsee.exepid process 2064 qqmsgsee.exe 2064 qqmsgsee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
qqmsgsee.exedescription pid process target process PID 2064 wrote to memory of 4224 2064 qqmsgsee.exe winvrtd.exe PID 2064 wrote to memory of 4224 2064 qqmsgsee.exe winvrtd.exe PID 2064 wrote to memory of 4224 2064 qqmsgsee.exe winvrtd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\qqmsgsee.exe"C:\Users\Admin\AppData\Local\Temp\qqmsgsee.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\winvrtd.exe"C:\Windows\system32\winvrtd.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5b4e8d5954975ae43cbf09bf0d7992683
SHA1c530cfaf2d82d3cc1839e8dbca40148b276fad79
SHA2565bb33f70e6dd09970031cfadbce415345f0ce77ea78c030376f8d54d8d5c8142
SHA5120da4996cd7d22517f9ba265ece55f802f651b43cbfd17f878365a794d991574dc24b7361c22c8886eac135d86663296812d7fcb9ed2650f44a63339010775810
-
Filesize
128KB
MD5b4e8d5954975ae43cbf09bf0d7992683
SHA1c530cfaf2d82d3cc1839e8dbca40148b276fad79
SHA2565bb33f70e6dd09970031cfadbce415345f0ce77ea78c030376f8d54d8d5c8142
SHA5120da4996cd7d22517f9ba265ece55f802f651b43cbfd17f878365a794d991574dc24b7361c22c8886eac135d86663296812d7fcb9ed2650f44a63339010775810