Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-01-2023 15:55
Static task
static1
Behavioral task
behavioral1
Sample
cd7f488588b891094c27999d19388be9.exe
Resource
win7-20220901-en
General
-
Target
cd7f488588b891094c27999d19388be9.exe
-
Size
255KB
-
MD5
cd7f488588b891094c27999d19388be9
-
SHA1
8f6d5e96247d0bd8c04842727f08b9fdaf879d06
-
SHA256
2a9262660a612c10017d661e2cd82a2e1dabef943542e83bc0f72426622a761a
-
SHA512
b8d90f7b60d90d269239da9b8845d84e546da2135aa3f444e84efd52b347cc96d46440ed2f728489e281ffad1cf220697c6bfa57137c9f3e44632102a408d188
-
SSDEEP
3072:gXiPmaJUdsa8HFq56I7HOeRUmPzGiX4KE8Z8j7ynXum1FYRlufdUJ66H:UEmaJUN4Ir6BiX4K5yj7ynXLFYQ+Jl
Malware Config
Extracted
systembc
45.182.189.231:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qfsrarl.exepid process 688 qfsrarl.exe -
Drops file in Windows directory 2 IoCs
Processes:
cd7f488588b891094c27999d19388be9.exedescription ioc process File opened for modification C:\Windows\Tasks\qfsrarl.job cd7f488588b891094c27999d19388be9.exe File created C:\Windows\Tasks\qfsrarl.job cd7f488588b891094c27999d19388be9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cd7f488588b891094c27999d19388be9.exepid process 1244 cd7f488588b891094c27999d19388be9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1276 wrote to memory of 688 1276 taskeng.exe qfsrarl.exe PID 1276 wrote to memory of 688 1276 taskeng.exe qfsrarl.exe PID 1276 wrote to memory of 688 1276 taskeng.exe qfsrarl.exe PID 1276 wrote to memory of 688 1276 taskeng.exe qfsrarl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd7f488588b891094c27999d19388be9.exe"C:\Users\Admin\AppData\Local\Temp\cd7f488588b891094c27999d19388be9.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E240CDE-D8E9-4D8D-8A8F-4C82559D24A1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\uqbkf\qfsrarl.exeC:\ProgramData\uqbkf\qfsrarl.exe start2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\uqbkf\qfsrarl.exeFilesize
255KB
MD5cd7f488588b891094c27999d19388be9
SHA18f6d5e96247d0bd8c04842727f08b9fdaf879d06
SHA2562a9262660a612c10017d661e2cd82a2e1dabef943542e83bc0f72426622a761a
SHA512b8d90f7b60d90d269239da9b8845d84e546da2135aa3f444e84efd52b347cc96d46440ed2f728489e281ffad1cf220697c6bfa57137c9f3e44632102a408d188
-
C:\ProgramData\uqbkf\qfsrarl.exeFilesize
255KB
MD5cd7f488588b891094c27999d19388be9
SHA18f6d5e96247d0bd8c04842727f08b9fdaf879d06
SHA2562a9262660a612c10017d661e2cd82a2e1dabef943542e83bc0f72426622a761a
SHA512b8d90f7b60d90d269239da9b8845d84e546da2135aa3f444e84efd52b347cc96d46440ed2f728489e281ffad1cf220697c6bfa57137c9f3e44632102a408d188
-
memory/688-59-0x0000000000000000-mapping.dmp
-
memory/688-61-0x0000000002D58000-0x0000000002D6E000-memory.dmpFilesize
88KB
-
memory/688-64-0x0000000002D58000-0x0000000002D6E000-memory.dmpFilesize
88KB
-
memory/688-65-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/688-66-0x0000000002D58000-0x0000000002D6E000-memory.dmpFilesize
88KB
-
memory/1244-54-0x00000000752B1000-0x00000000752B3000-memory.dmpFilesize
8KB
-
memory/1244-55-0x00000000002A9000-0x00000000002BE000-memory.dmpFilesize
84KB
-
memory/1244-56-0x00000000001B0000-0x00000000001B9000-memory.dmpFilesize
36KB
-
memory/1244-57-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/1244-62-0x00000000002A9000-0x00000000002BE000-memory.dmpFilesize
84KB