Overview
overview
8Static
static
8FastVerCode.dll
windows7-x64
1FastVerCode.dll
windows10-2004-x64
3ICSharpCod...ib.dll
windows7-x64
1ICSharpCod...ib.dll
windows10-2004-x64
1Interop.ADODB.dll
windows7-x64
1Interop.ADODB.dll
windows10-2004-x64
1Interop.ADOX.dll
windows7-x64
1Interop.ADOX.dll
windows10-2004-x64
1Interop.ADQX.dll
windows7-x64
8Interop.ADQX.dll
windows10-2004-x64
8Interop.ADQX64.dll
windows7-x64
1Interop.ADQX64.dll
windows10-2004-x64
1Interop.JPO.dll
windows7-x64
1Interop.JPO.dll
windows10-2004-x64
3Interop.JRO.dll
windows7-x64
1Interop.JRO.dll
windows10-2004-x64
1QQռ...��.exe
windows7-x64
8QQռ...��.exe
windows10-2004-x64
8UUWiseHelper.dll
windows7-x64
1UUWiseHelper.dll
windows10-2004-x64
3dl.dll
windows7-x64
1dl.dll
windows10-2004-x64
1edithtm/in...�.html
windows7-x64
1edithtm/in...�.html
windows10-2004-x64
1edithtm/in...x.html
windows7-x64
1edithtm/in...x.html
windows10-2004-x64
1edithtm/js...on.asp
windows7-x64
3edithtm/js...on.asp
windows10-2004-x64
3edithtm/js....1.jar
windows7-x64
1edithtm/js....1.jar
windows10-2004-x64
1edithtm/js....4.jar
windows7-x64
1edithtm/js....4.jar
windows10-2004-x64
1Analysis
-
max time kernel
185s -
max time network
233s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:20
Behavioral task
behavioral1
Sample
FastVerCode.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
FastVerCode.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ICSharpCode.SharpZipLib.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ICSharpCode.SharpZipLib.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Interop.ADODB.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Interop.ADODB.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Interop.ADOX.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Interop.ADOX.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Interop.ADQX.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Interop.ADQX.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Interop.ADQX64.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Interop.ADQX64.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Interop.JPO.dll
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
Interop.JPO.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Interop.JRO.dll
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
Interop.JRO.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
QQռӪ.exe
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
QQռӪ.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
UUWiseHelper.dll
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
UUWiseHelper.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
dl.dll
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
dl.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
edithtm/index/index - .html
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
edithtm/index/index - .html
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
edithtm/index/index.html
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
edithtm/index/index.html
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
edithtm/jsp/file_manager_json.asp
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
edithtm/jsp/file_manager_json.asp
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
edithtm/jsp/lib/commons-fileupload-1.2.1.jar
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
edithtm/jsp/lib/commons-fileupload-1.2.1.jar
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
edithtm/jsp/lib/commons-io-1.4.jar
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
edithtm/jsp/lib/commons-io-1.4.jar
Resource
win10v2004-20221111-en
General
-
Target
QQռӪ.exe
-
Size
1.1MB
-
MD5
0ff1edfd4166bda9c8e18d01883004c1
-
SHA1
340b52ccdd64fe3342b9db485abe8cc44c9c87b0
-
SHA256
7b8529cebcca7f3dfba8e8e2ee954f91567257cd08ac8d61916b19d4f2a3eabe
-
SHA512
f08e7191b94a36385e3d52538f7d54d00e5b72daea961a9673244ce1c9edb5596f41d8dc973354a9aec9f86e4e3f36b0748a22b2ab065f776a094ab6e8cdff39
-
SSDEEP
12288:m0oi+K5t1dF90uIdz2TlkgIess/zXgDnEcLxwKudV1zdV1udV11dV15LX:mdEtrF6ulkgIess/zJUxqBcD5j
Malware Config
Signatures
-
resource yara_rule behavioral17/memory/1756-57-0x0000000010000000-0x0000000010255000-memory.dmp vmprotect behavioral17/memory/1756-60-0x0000000010000000-0x0000000010255000-memory.dmp vmprotect behavioral17/memory/1756-63-0x0000000010000000-0x0000000010255000-memory.dmp vmprotect -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 QQռӪ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 QQռӪ.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 QQռӪ.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 QQռӪ.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 956 QQռӪ.exe 956 QQռӪ.exe 956 QQռӪ.exe 956 QQռӪ.exe 1756 setup.exe 1756 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30 PID 956 wrote to memory of 1756 956 QQռӪ.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQռӪ.exe"C:\Users\Admin\AppData\Local\Temp\QQռӪ.exe"1⤵
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\setup.exesetup.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1756
-