Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe
Resource
win10v2004-20220812-en
General
-
Target
617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe
-
Size
36KB
-
MD5
ba519da814ee8989889fbab4ab506ee3
-
SHA1
7be209efcf8cfc06a8fe8dc57ad3ddc62ace0342
-
SHA256
617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d
-
SHA512
fb4c2a7e76a8af966020b4ac52304c78e367c098ddfbd5b14b361980715dd26e6afefccd61b822268cbd2514ac282414a7aae8f120903865d4d6b6ffd3e9320f
-
SSDEEP
384:PSGaBtZZCR0gs4ALhpKNifhkSujObfVU3KGqCyn0guSPypYafeA146/B+rcEblo4:Bah8Ht2yfE5JPaW64UUlayHVojY9P5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3504 yqskqc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\yqskqc.exe 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe File opened for modification C:\Windows\SysWOW64\yqskqc.exe 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3504 set thread context of 2872 3504 yqskqc.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 4892 2872 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4964 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3504 wrote to memory of 2872 3504 yqskqc.exe 81 PID 3504 wrote to memory of 2872 3504 yqskqc.exe 81 PID 3504 wrote to memory of 2872 3504 yqskqc.exe 81 PID 3504 wrote to memory of 2872 3504 yqskqc.exe 81 PID 3504 wrote to memory of 2872 3504 yqskqc.exe 81 PID 4964 wrote to memory of 4456 4964 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe 85 PID 4964 wrote to memory of 4456 4964 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe 85 PID 4964 wrote to memory of 4456 4964 617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe"C:\Users\Admin\AppData\Local\Temp\617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\617803~1.EXE > nul2⤵PID:4456
-
-
C:\Windows\SysWOW64\yqskqc.exeC:\Windows\SysWOW64\yqskqc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 123⤵
- Program crash
PID:4892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2872 -ip 28721⤵PID:4868
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5ba519da814ee8989889fbab4ab506ee3
SHA17be209efcf8cfc06a8fe8dc57ad3ddc62ace0342
SHA256617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d
SHA512fb4c2a7e76a8af966020b4ac52304c78e367c098ddfbd5b14b361980715dd26e6afefccd61b822268cbd2514ac282414a7aae8f120903865d4d6b6ffd3e9320f
-
Filesize
36KB
MD5ba519da814ee8989889fbab4ab506ee3
SHA17be209efcf8cfc06a8fe8dc57ad3ddc62ace0342
SHA256617803cf96cebf193abc0835ab6aa40d5b8c05074979276b0ee9fec78516132d
SHA512fb4c2a7e76a8af966020b4ac52304c78e367c098ddfbd5b14b361980715dd26e6afefccd61b822268cbd2514ac282414a7aae8f120903865d4d6b6ffd3e9320f