Analysis

  • max time kernel
    184s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 08:12

General

  • Target

    b1796761d30fdf3752006fd3d7a9d8084db5c95a8c2f0aa5f072be8a1d31c29c.exe

  • Size

    44KB

  • MD5

    d8faeceb29fce25bb9d202ec8a4f2683

  • SHA1

    39d1a1eb4add29dd755bd84996578ea3b4a437ba

  • SHA256

    b1796761d30fdf3752006fd3d7a9d8084db5c95a8c2f0aa5f072be8a1d31c29c

  • SHA512

    82c33e0620ef07399a5cf2bd7c6512ad1b2c42a81eecec404c982e78c64aa5601576c0a200198fa7ac3014b5322f39bdc6219ff4833f5fb741738620c9520dfe

  • SSDEEP

    768:Xrd9EC5rkFBeR3lscNAhI/MK+Bg54d/yBKO7LdBONzOuaBBQARQkJZWSLtE7:OeR3lseAhI/MK+S54d/ot7/ONzIBBQAY

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1796761d30fdf3752006fd3d7a9d8084db5c95a8c2f0aa5f072be8a1d31c29c.exe
    "C:\Users\Admin\AppData\Local\Temp\b1796761d30fdf3752006fd3d7a9d8084db5c95a8c2f0aa5f072be8a1d31c29c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\sc.exe
      sc stop qqTouch
      2⤵
      • Launches sc.exe
      PID:1988
    • C:\Windows\SysWOW64\sc.exe
      sc delete qqTouch
      2⤵
      • Launches sc.exe
      PID:332
    • C:\Windows\SysWOW64\sc.exe
      sc create qqTouch type= kernel binpath= C:\Users\Admin\AppData\Local\Temp\qqTouch.sys
      2⤵
      • Launches sc.exe
      PID:784
    • C:\Windows\SysWOW64\sc.exe
      sc start qqTouch
      2⤵
      • Launches sc.exe
      PID:676

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads