Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-12-2022 20:14
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
1.2MB
-
MD5
176cba6c54addf55ff9212f8635af268
-
SHA1
99b98dbc56d33073f4a1663b9c7866f673500ea6
-
SHA256
4562160a2d37aa07c97fa784afe700cf0cb8ecb5d1cd2382e27bc40804d938e3
-
SHA512
6b0eba2535e7153e41f9aca21440b0ee448096d5d6da134abfdcccba6dbdd5d9d051aa606cc1810af4d6b9b7bcc784eeb245f74c264c0dd41e96ce391686a023
-
SSDEEP
24576:qMGnno42KEVxeAL7x06blOSE3UHMxpWWEaTaeGyidv:Fo1GxplLE3UHOTTnidv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1952 Qiyccos.exe 1160 Qiyccos.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
pid Process 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1952 Qiyccos.exe 1952 Qiyccos.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1160 Qiyccos.exe 1196 tmp.exe 1160 Qiyccos.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe 1196 tmp.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Qiyccos.exe tmp.exe File opened for modification C:\Program Files (x86)\Qiyccos.exe tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1160 1952 Qiyccos.exe 29 PID 1952 wrote to memory of 1160 1952 Qiyccos.exe 29 PID 1952 wrote to memory of 1160 1952 Qiyccos.exe 29 PID 1952 wrote to memory of 1160 1952 Qiyccos.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:1196
-
C:\Program Files (x86)\Qiyccos.exe"C:\Program Files (x86)\Qiyccos.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Qiyccos.exe"C:\Program Files (x86)\Qiyccos.exe" Win72⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1160
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5176cba6c54addf55ff9212f8635af268
SHA199b98dbc56d33073f4a1663b9c7866f673500ea6
SHA2564562160a2d37aa07c97fa784afe700cf0cb8ecb5d1cd2382e27bc40804d938e3
SHA5126b0eba2535e7153e41f9aca21440b0ee448096d5d6da134abfdcccba6dbdd5d9d051aa606cc1810af4d6b9b7bcc784eeb245f74c264c0dd41e96ce391686a023
-
Filesize
1.2MB
MD5176cba6c54addf55ff9212f8635af268
SHA199b98dbc56d33073f4a1663b9c7866f673500ea6
SHA2564562160a2d37aa07c97fa784afe700cf0cb8ecb5d1cd2382e27bc40804d938e3
SHA5126b0eba2535e7153e41f9aca21440b0ee448096d5d6da134abfdcccba6dbdd5d9d051aa606cc1810af4d6b9b7bcc784eeb245f74c264c0dd41e96ce391686a023
-
Filesize
1.2MB
MD5176cba6c54addf55ff9212f8635af268
SHA199b98dbc56d33073f4a1663b9c7866f673500ea6
SHA2564562160a2d37aa07c97fa784afe700cf0cb8ecb5d1cd2382e27bc40804d938e3
SHA5126b0eba2535e7153e41f9aca21440b0ee448096d5d6da134abfdcccba6dbdd5d9d051aa606cc1810af4d6b9b7bcc784eeb245f74c264c0dd41e96ce391686a023