Resubmissions

09-05-2023 19:22

230509-x3fn4adg58 10

09-05-2023 19:14

230509-xxsrgaff7x 10

09-05-2023 19:14

230509-xxr5yadg42 7

09-05-2023 19:14

230509-xxrt6sff7w 8

09-05-2023 19:14

230509-xxrjeaff7v 8

09-05-2023 19:14

230509-xxqxwadg39 7

09-05-2023 19:14

230509-xxql4sff7t 10

09-05-2023 19:14

230509-xxqbcadg38 7

09-05-2023 19:10

230509-xvl6xadf64 10

Analysis

  • max time kernel
    151s
  • max time network
    185s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-05-2023 19:14

General

  • Target

    trojan-leaks-main/skidded/Quakeganza.exe

  • Size

    364KB

  • MD5

    754a2aedcf67ea7a42033e1ec45240dd

  • SHA1

    04c00d8a8aedfcae241f5dcf1b5a2226dbe869d8

  • SHA256

    a6ddede60a43769cb19f4fb8de41160c769ae5a58d6e72de6126c3502ed9991e

  • SHA512

    040d52c5b810e083f34aa15f3f97c498364856842b105878c4b83d324150501354f0137fdc5a0e7322dd1e691aaad270dd19ff793e8d58e2185f3ed9dbbdfb5a

  • SSDEEP

    3072:8GWCGPVHzzgd2HPVVf9AebuLFfK9s7IYNgDd9gGKI+LNTzxVMoyeZwoJtd1dOXxk:8frak9gorY6c8+xTzxVMoyeZDSbj0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\skidded\Quakeganza.exe
    "C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\skidded\Quakeganza.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\int10h.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\int10h.exe
        C:\int10h.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\int10h.exe"
          4⤵
          • Creates scheduled task(s)
          PID:4276

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\int10h.exe

    Filesize

    101KB

    MD5

    b99249d8b0c09e77966182acd238b987

    SHA1

    a781dcfda0ace5d529fe3982a45c7289c951015f

    SHA256

    e6204ff17c6d43b574162adca9daa2eb7bb028dfbefbd9f2477387fd5e56ce72

    SHA512

    04626c66251e3e7526be6f7612c7ad5b515bcf74bcf13828f87587aef9dcfee2202d8fa0b0825beb3e98a431a22a5ef216709c9cb20b959eeac48c600c1d0a23

  • C:\int10h.exe

    Filesize

    101KB

    MD5

    b99249d8b0c09e77966182acd238b987

    SHA1

    a781dcfda0ace5d529fe3982a45c7289c951015f

    SHA256

    e6204ff17c6d43b574162adca9daa2eb7bb028dfbefbd9f2477387fd5e56ce72

    SHA512

    04626c66251e3e7526be6f7612c7ad5b515bcf74bcf13828f87587aef9dcfee2202d8fa0b0825beb3e98a431a22a5ef216709c9cb20b959eeac48c600c1d0a23

  • memory/2460-132-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-126-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-130-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-131-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-133-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-134-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-135-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-136-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-137-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-138-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2460-139-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3716-125-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB