Analysis
-
max time kernel
179s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
Resource
win10v2004-20221111-en
General
-
Target
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
-
Size
958KB
-
MD5
ed7272f7f45de161f0c7f49f80aebf11
-
SHA1
fb4507805f927cea5511474f8dde93d1e9a0dcd4
-
SHA256
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9
-
SHA512
f0b4ebdb1d55a4946dcd2594bb8647615ac4bab417bdc3950d4d925d0bcd25f642f6fe4d5c4bf85b487a98a68f46d0c779da97952585cfa667f85da5d8262866
-
SSDEEP
24576:qc//////5T0CHKaKy5hAETLg9HY3tfE93cazXKZjUM:qc//////5IQK8KETL4HGs93tKG
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\qdfy.sys 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe File opened for modification C:\WINDOWS\SysWOW64\drivers\qdfy.sys 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4956 set thread context of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 -
Kills process with taskkill 15 IoCs
pid Process 4212 taskkill.exe 4988 taskkill.exe 2272 taskkill.exe 620 taskkill.exe 3112 taskkill.exe 2832 taskkill.exe 2492 taskkill.exe 940 taskkill.exe 4092 taskkill.exe 5012 taskkill.exe 3368 taskkill.exe 3184 taskkill.exe 4276 taskkill.exe 3640 taskkill.exe 2464 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 3184 taskkill.exe Token: SeDebugPrivilege 4988 taskkill.exe Token: SeDebugPrivilege 620 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 4276 taskkill.exe Token: SeDebugPrivilege 3640 taskkill.exe Token: SeDebugPrivilege 4212 taskkill.exe Token: SeDebugPrivilege 2272 taskkill.exe Token: SeDebugPrivilege 5012 taskkill.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 3112 taskkill.exe Token: SeDebugPrivilege 940 taskkill.exe Token: SeDebugPrivilege 4092 taskkill.exe Token: SeDebugPrivilege 2464 taskkill.exe Token: SeDebugPrivilege 2832 taskkill.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 PID 4956 wrote to memory of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 PID 4956 wrote to memory of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 PID 4956 wrote to memory of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 PID 4956 wrote to memory of 3164 4956 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 82 PID 3164 wrote to memory of 3368 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 85 PID 3164 wrote to memory of 3368 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 85 PID 3164 wrote to memory of 3368 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 85 PID 3164 wrote to memory of 4212 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 87 PID 3164 wrote to memory of 4212 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 87 PID 3164 wrote to memory of 4212 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 87 PID 3164 wrote to memory of 940 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 88 PID 3164 wrote to memory of 940 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 88 PID 3164 wrote to memory of 940 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 88 PID 3164 wrote to memory of 4988 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 89 PID 3164 wrote to memory of 4988 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 89 PID 3164 wrote to memory of 4988 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 89 PID 3164 wrote to memory of 4092 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 91 PID 3164 wrote to memory of 4092 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 91 PID 3164 wrote to memory of 4092 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 91 PID 3164 wrote to memory of 3184 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 94 PID 3164 wrote to memory of 3184 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 94 PID 3164 wrote to memory of 3184 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 94 PID 3164 wrote to memory of 5012 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 96 PID 3164 wrote to memory of 5012 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 96 PID 3164 wrote to memory of 5012 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 96 PID 3164 wrote to memory of 2492 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 98 PID 3164 wrote to memory of 2492 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 98 PID 3164 wrote to memory of 2492 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 98 PID 3164 wrote to memory of 4276 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 99 PID 3164 wrote to memory of 4276 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 99 PID 3164 wrote to memory of 4276 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 99 PID 3164 wrote to memory of 2272 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 102 PID 3164 wrote to memory of 2272 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 102 PID 3164 wrote to memory of 2272 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 102 PID 3164 wrote to memory of 3640 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 104 PID 3164 wrote to memory of 3640 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 104 PID 3164 wrote to memory of 3640 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 104 PID 3164 wrote to memory of 620 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 106 PID 3164 wrote to memory of 620 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 106 PID 3164 wrote to memory of 620 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 106 PID 3164 wrote to memory of 3112 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 107 PID 3164 wrote to memory of 3112 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 107 PID 3164 wrote to memory of 3112 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 107 PID 3164 wrote to memory of 2464 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 111 PID 3164 wrote to memory of 2464 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 111 PID 3164 wrote to memory of 2464 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 111 PID 3164 wrote to memory of 2832 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 113 PID 3164 wrote to memory of 2832 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 113 PID 3164 wrote to memory of 2832 3164 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe"C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exeC:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_13⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_23⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_1.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_2.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQDL.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TXPlatform.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Tencentdl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQLOING.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNFchina.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Tencentdl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-