Analysis

  • max time kernel
    209s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 19:03

General

  • Target

    a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe

  • Size

    116KB

  • MD5

    2dd5566a545c687b3b770f24d9a4fa4f

  • SHA1

    8ca957d133a82ba2344401f05a9a320ee37c1c09

  • SHA256

    a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c

  • SHA512

    a2fe42aa3b4081feee4924b79ccf49390394af7d5a8ed3f73addc437d9a3acd3eb272da945cb14b2eeaf29f516cc6bc106ba6e843327990a39ccf1057f103d1c

  • SSDEEP

    1536:oJwB93uVGLnuTaLupX7RFJGE+RsPaaxSVKR0mI53pAs34vc7OtK0iDg+SI37:LB93bbuTaqIESsCaxfRHOAsogOteDJj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe
    "C:\Users\Admin\AppData\Local\Temp\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/dos/qt.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4468 CREDAT:17410 /prefetch:2
        3⤵
          PID:4292
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\A5A837~1.EXE > nul
        2⤵
          PID:2712
      • C:\Windows\SysWOW64\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe
        C:\Windows\SysWOW64\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3632
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3896
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3896 CREDAT:17410 /prefetch:2
            3⤵
              PID:1836
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:388
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:17410 /prefetch:2
              3⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:3432
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2212
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:17410 /prefetch:2
              3⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:852
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1460
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:17410 /prefetch:2
              3⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:1816
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4948
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4948 CREDAT:17410 /prefetch:2
              3⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3768
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=5008c
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4748
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=5008c
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:3956
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0x40,0x10c,0x7ffd9cb246f8,0x7ffd9cb24708,0x7ffd9cb24718
                    6⤵
                    • Drops file in System32 directory
                    PID:4480
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1428
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:17410 /prefetch:2
              3⤵
              • Modifies data under HKEY_USERS
              PID:2632
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://qt.pzdnf.com/NewCC/NewQT.TXT
            2⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3444
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3444 CREDAT:17410 /prefetch:2
              3⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4800
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=70098
                4⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:1932
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=70098
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:3496
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd9cb246f8,0x7ffd9cb24708,0x7ffd9cb24718
                    6⤵
                    • Drops file in System32 directory
                    PID:2244

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe

          Filesize

          116KB

          MD5

          2dd5566a545c687b3b770f24d9a4fa4f

          SHA1

          8ca957d133a82ba2344401f05a9a320ee37c1c09

          SHA256

          a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c

          SHA512

          a2fe42aa3b4081feee4924b79ccf49390394af7d5a8ed3f73addc437d9a3acd3eb272da945cb14b2eeaf29f516cc6bc106ba6e843327990a39ccf1057f103d1c

        • C:\Windows\SysWOW64\a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c.exe

          Filesize

          116KB

          MD5

          2dd5566a545c687b3b770f24d9a4fa4f

          SHA1

          8ca957d133a82ba2344401f05a9a320ee37c1c09

          SHA256

          a5a8377ca7d5996323cbb08072e8ad5803fbf65dad5c5298284b73e09b52f91c

          SHA512

          a2fe42aa3b4081feee4924b79ccf49390394af7d5a8ed3f73addc437d9a3acd3eb272da945cb14b2eeaf29f516cc6bc106ba6e843327990a39ccf1057f103d1c

        • C:\Windows\System32\config\systemprofile\Favorites\desktop.ini

          Filesize

          402B

          MD5

          881dfac93652edb0a8228029ba92d0f5

          SHA1

          5b317253a63fecb167bf07befa05c5ed09c4ccea

          SHA256

          a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464

          SHA512

          592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

          Filesize

          152B

          MD5

          c9ff64ebe10ba04b16d9b6f96eae8831

          SHA1

          f87cc891a4f3d57ba23af3f6a56644ba11f5cc3a

          SHA256

          ef26ca2187ed205d15845b68978070e4b8ac3d316f7c5d9d6be05a8674195855

          SHA512

          146e5494747dc1f767a7a72b26e5bd6fb3ad3edc054d1b1bec26dc2d904f60f1bc9591966f5afc7146bd654d8013cc415e4caddc262bb58954a1867f037cc376

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

          Filesize

          152B

          MD5

          5883698e8500c6b495bdade058dfb92b

          SHA1

          87f575109f2afe70cf8b238493c63a3c33d92898

          SHA256

          52af176890c29191d62aaf3daa9f116fb49d41e19bf54a8703a28dfdcb26c772

          SHA512

          08ca3c6eb7acffecb9f45733bc1ba48142e20466449de008c7b45b19803f18dfd53833a545bcedb78826fa94155f50e890d1020a5da507db82a9bab784c82c96

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Edge\User Data\Crashpad\throttle_store.dat

          Filesize

          20B

          MD5

          9e4e94633b73f4a7680240a0ffd6cd2c

          SHA1

          e68e02453ce22736169a56fdb59043d33668368f

          SHA256

          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

          SHA512

          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B6CBC348-75CC-11ED-BF5F-D668443210E4}.dat

          Filesize

          3KB

          MD5

          648ff5b5dc2914fd9a29f85cfa318718

          SHA1

          ec5379c81de9f1c1ab602226879742ebff7c0c37

          SHA256

          1a2f5dd720e7d9fa45c5ad2770542903ec8fae541018c562650041b43ecf11ad

          SHA512

          f6d749107c089c739b459344db189f105f7140f07e1a1dbe1030a8a94810b765ccd9d247cc47cf19c5e292b6b0ca8111b6e7f6bd729533e746d0c225b689485b

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CCC8D78A-75CC-11ED-BF5F-D668443210E4}.dat

          Filesize

          5KB

          MD5

          442ef8794b817ab5ef97dc28a9227f57

          SHA1

          7854f8f38ab2391d5ab9b22e6f43dbeaa92b2abd

          SHA256

          920cff42be3e71157930b51fdbd83f19a971035d365314ddc66eda69b190c279

          SHA512

          0aec7cd2d955f4d17d597b77cd4d366093a0eede24eaf492618f50800e6f824152d0fa768b657bbfc86173d72dffa8d1917783731ddcd278551dc69d6b933fd0

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D4E57798-75CC-11ED-BF5F-D668443210E4}.dat

          Filesize

          5KB

          MD5

          911423e4f2306a8bb6d36ec6553a4071

          SHA1

          c492aa5ade2cd6219a61d863b1db9078c4d76a7b

          SHA256

          12eb99a6668b78bb31cdc9b294d6af91fc1884461f31e4791e302acf615ab599

          SHA512

          47923cb898d6e8a8aefb4320ab22c34e61e5b659906d62c73b1269b366ea3012bd04de311a79c1c31c8ff672e90ef0588631741eff5caadcab7e7b68b7d66c59

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E6CE3FE3-75CC-11ED-BF5F-D668443210E4}.dat

          Filesize

          5KB

          MD5

          4fdcde01b50a11193a55755c7c8a0fc0

          SHA1

          69162e6660a5c193f7b2158b3148adc701e19939

          SHA256

          a2d791fbcaa2b1be73d7648219b268fb8868347d66f98a8e4316252ca0a5a30c

          SHA512

          c18aadcc813ca3343168cb966745394abea50696c050ca37c032093ff75b0c06e40616c11a25b25d3a929c92a54bcac25ccd101b536e63c6b70d9ecf4d91d794

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{CCC8D78C-75CC-11ED-BF5F-D668443210E4}.dat

          Filesize

          4KB

          MD5

          b76cb65c5ad2dc8360881238fe929c2a

          SHA1

          9d41f1d32dec2810854e5121a007a4595fd99c6a

          SHA256

          31119ebcdc31cf82ad754ec7dec8d769e6c8dcb713de2c8a1bc652b1a4d98540

          SHA512

          fc1cf58c381f047b842a6fb52d8c54bf1974c63bdcdf59696f38bdcc0b4924767aac743365fc492ad56f5ee6ba5d71d116d0d7655297e715f95ea1712a4b3fc6

        • memory/3552-132-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3552-133-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3552-141-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3552-138-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3632-139-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/3632-137-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB