Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2023, 06:45

General

  • Target

    GS_LOADER/QS_SETUP_V4.4.430.376_RE.exe

  • Size

    1.3MB

  • MD5

    d6f8b188f695d70af5dd24ad1bdaa6ab

  • SHA1

    128068815ab43adf372b1cccf9126e6003817467

  • SHA256

    d12508eb6d9d60e94b11b6a2dcc75ad4e6f7f11704694856e797800dc87828ca

  • SHA512

    2a82e8a081a3de7befed29b920baee792b24da4c17ef09d7afbeb4d3af41f6b7aa1ae88c5e19adf064d180586aaa0973cd4606b27f8220f292927a14be6cee90

  • SSDEEP

    24576:ktdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFtLzi3ZAiSLxenD1op42GbaNDRHq:cqTytRFk6ekfzUZAiSLxenD1op42Gba6

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GS_LOADER\QS_SETUP_V4.4.430.376_RE.exe
    "C:\Users\Admin\AppData\Local\Temp\GS_LOADER\QS_SETUP_V4.4.430.376_RE.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1836

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1836-54-0x0000000075C51000-0x0000000075C53000-memory.dmp

          Filesize

          8KB

        • memory/1836-55-0x0000000001F70000-0x0000000002136000-memory.dmp

          Filesize

          1.8MB

        • memory/1836-60-0x0000000001F70000-0x0000000002136000-memory.dmp

          Filesize

          1.8MB

        • memory/1836-61-0x0000000002140000-0x00000000021EF000-memory.dmp

          Filesize

          700KB

        • memory/1836-66-0x0000000010000000-0x0000000010F69000-memory.dmp

          Filesize

          15.4MB

        • memory/1836-67-0x0000000002140000-0x00000000021EF000-memory.dmp

          Filesize

          700KB

        • memory/1836-70-0x0000000010000000-0x0000000010F69000-memory.dmp

          Filesize

          15.4MB