Resubmissions

09/05/2023, 19:22

230509-x3fn4adg58 10

09/05/2023, 19:14

230509-xxsrgaff7x 10

09/05/2023, 19:14

230509-xxr5yadg42 7

09/05/2023, 19:14

230509-xxrt6sff7w 8

09/05/2023, 19:14

230509-xxrjeaff7v 8

09/05/2023, 19:14

230509-xxqxwadg39 7

09/05/2023, 19:14

230509-xxql4sff7t 10

09/05/2023, 19:14

230509-xxqbcadg38 7

09/05/2023, 19:10

230509-xvl6xadf64 10

Analysis

  • max time kernel
    75s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2023, 19:10

General

  • Target

    trojan-leaks-main/QSO J1228+3128.bat

  • Size

    129KB

  • MD5

    b9b35fbe7121c90f368b13e97bf574a7

  • SHA1

    46c6fb9f06fffa4de1aacb73d4a3436664f79a8a

  • SHA256

    cae015c5705155cc6e2f49263aacef3bc8e4bfd9c2f29886a077471cd5dac447

  • SHA512

    79dcab087efb28845eae2124b559fb5d8188b9d86ae2bf2ac26bcc9a3d4b41acd656e061465900b86cddd0efff35fd987e562ddac5f266fcc2c67ee76a37a9e9

  • SSDEEP

    3072:esyMBvZXdYcpRXphFVhyelsqYTsjLXQ83N83qxho7Y:ewRXqcjDFLyPZT83N83Wik

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Sets file execution options in registry 2 TTPs 42 IoCs
  • Executes dropped EXE 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\QSO J1228+3128.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\system32\cscript.exe
      cscript x.js
      2⤵
      • Suspicious use of FindShellTrayWindow
      PID:1544
    • C:\Users\Admin\AppData\Roaming\QSO J1228+3128.exe
      "C:\Users\Admin\AppData\Roaming\QSO J1228+3128.exe"
      2⤵
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:1128

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TROJAN~1\z.zip

          Filesize

          85KB

          MD5

          1440570efffe6886be86d1b2986993d2

          SHA1

          8104d2543bf2f15748763228c2624c70e787a2e2

          SHA256

          72ffa65ac56b79466f8e3e1aaec7e19db1764fa40b90fb434a3c82d4277ad041

          SHA512

          66ce98a53ed60ab5713e111e48363bc9fa95f390304d3fdbb48867a4034b065250b7a45a94b78627b80ced645184fad29f4f4b2c02f6298010de190961f76e9a

        • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\x

          Filesize

          4KB

          MD5

          b663af1dd37b13b63882eb671a79b30a

          SHA1

          e63eb96461fa0ea3ebd28f0a8863b8413a5a2819

          SHA256

          1cd9a41122483ca9b24c5ce8f2fcf93388d10c1e2fadf6200966f4d14c975f46

          SHA512

          7bc69423529a48db05c971e044eef75fa4f9d9afcd99b3bb236163d578099c47828b5f16872df2c9ea4569eb7b721ef213921adae91ea0734acebf727bfcb91b

        • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\x

          Filesize

          116KB

          MD5

          2e000614aec93ce7ae46dd2eccbd4909

          SHA1

          3729179982898079d2e618dfc5c761032660d2d8

          SHA256

          a7a5732ab9f859e4412b8efc73f32991d702632b37c7b389b6c1cb9c6d3ed0d9

          SHA512

          eb4a886306bd20e334a3dfaddebb18cf9b7cb1b1c40221e6d88a4fbe78b07476ef3f6ffcaace8aa4db986e9b2670f1428c106b400cf46a8e718db6de7ae39732

        • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\x.js

          Filesize

          448B

          MD5

          8eec8704d2a7bc80b95b7460c06f4854

          SHA1

          1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

          SHA256

          aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

          SHA512

          e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

        • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\z.zip

          Filesize

          85KB

          MD5

          1440570efffe6886be86d1b2986993d2

          SHA1

          8104d2543bf2f15748763228c2624c70e787a2e2

          SHA256

          72ffa65ac56b79466f8e3e1aaec7e19db1764fa40b90fb434a3c82d4277ad041

          SHA512

          66ce98a53ed60ab5713e111e48363bc9fa95f390304d3fdbb48867a4034b065250b7a45a94b78627b80ced645184fad29f4f4b2c02f6298010de190961f76e9a

        • C:\Users\Admin\AppData\Roaming\QSO J1228+3128.exe

          Filesize

          206KB

          MD5

          d5f741b0bb991604d5331de863d49d8b

          SHA1

          1c73d032211696e954259b48c3e83029d7852846

          SHA256

          adac36e4faab7c953354b50391774c9b01379cb4445de52f074464c58d751d1d

          SHA512

          a84b1acec34996a5047ff082985510cecf1d381b216e3b02dca2113b16500d417c6f89833ad93a3b1ba96b23cbcc8af5cd5d065fe6235d5273c1c8412538fa30

        • C:\Users\Admin\AppData\Roaming\QSO J1228+3128.exe

          Filesize

          206KB

          MD5

          d5f741b0bb991604d5331de863d49d8b

          SHA1

          1c73d032211696e954259b48c3e83029d7852846

          SHA256

          adac36e4faab7c953354b50391774c9b01379cb4445de52f074464c58d751d1d

          SHA512

          a84b1acec34996a5047ff082985510cecf1d381b216e3b02dca2113b16500d417c6f89833ad93a3b1ba96b23cbcc8af5cd5d065fe6235d5273c1c8412538fa30

        • memory/1544-1611-0x0000000002480000-0x0000000002481000-memory.dmp

          Filesize

          4KB