Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2023, 19:18

General

  • Target

    9ace567fe96aa83582487dea1b6b8f1c64d3f2c6fe5b5d2b3e57414d92a1f0d6.exe

  • Size

    4.1MB

  • MD5

    b21b3c712c1253c5050d37e91ff03301

  • SHA1

    7cf206528b9a7fe011340439d0b1b4f7ec765082

  • SHA256

    9ace567fe96aa83582487dea1b6b8f1c64d3f2c6fe5b5d2b3e57414d92a1f0d6

  • SHA512

    2a3a8bfefd016172ada34003c7656e7c913667765984f4bdeb9b2cd25dad1006b433abe84685fe2419878f161f6528af709279d894b1f4a4d714e1903e4d2bc3

  • SSDEEP

    98304:N2U2ziq+t45/7Mhs4b54pz+7539oN9s0j76AmfhI4jPD9jtpx:NKt5/7Mhs4b54pz+753I9sA6AW7D9jt/

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 50 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ace567fe96aa83582487dea1b6b8f1c64d3f2c6fe5b5d2b3e57414d92a1f0d6.exe
    "C:\Users\Admin\AppData\Local\Temp\9ace567fe96aa83582487dea1b6b8f1c64d3f2c6fe5b5d2b3e57414d92a1f0d6.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Windows\\qq405168520.dll"
      2⤵
      • Modifies registry class
      PID:1708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\qq405168520.dll

    Filesize

    2.0MB

    MD5

    2bed81760f576f5710424b608e6f0dce

    SHA1

    36c8011a43599535133632610a00b4224593ce74

    SHA256

    a1f9f271c9e7977a62ede38eb9445d453ae7acc65234eddc6b57954bf2478bca

    SHA512

    c88213726e778e98f7c27cca1e57c2627b8bd1c93ceb1a85317c2078f39bde94b98c7d0dbf5ea3bd425f23d4c396d9a07124e994e24f89a74fdacbe4fde3737e

  • memory/1708-58-0x0000000073B90000-0x000000007405E000-memory.dmp

    Filesize

    4.8MB

  • memory/1708-60-0x0000000073B90000-0x000000007405E000-memory.dmp

    Filesize

    4.8MB

  • memory/1988-54-0x0000000075441000-0x0000000075443000-memory.dmp

    Filesize

    8KB

  • memory/1988-61-0x0000000073E40000-0x000000007430E000-memory.dmp

    Filesize

    4.8MB

  • memory/1988-63-0x0000000073E40000-0x000000007430E000-memory.dmp

    Filesize

    4.8MB