Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe
Resource
win10v2004-20230220-en
General
-
Target
3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe
-
Size
269KB
-
MD5
4c0190d6b7ac50cdcaf5dc81063661d1
-
SHA1
3626f438a52eac2537c46584b09f95755c32ab9f
-
SHA256
3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd
-
SHA512
7eea53640561964ab647ba5ca2e7840d0320f7b054b2ec6df1230d68eb6fbfa63a7df7c286b634355f45f90558f58e489c453a6598716028324eeeb57563b03a
-
SSDEEP
6144:rqjIlLXk1aZxZ6T6iW9KZwweUu/aKkplDPraNU/fFoC9ZeaXd1WU:2aQg6T6iiKOUmkHnaNAv9ZvXH
Malware Config
Signatures
-
Checks QEMU agent file 2 TTPs 1 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe -
Loads dropped DLL 1 IoCs
pid Process 4536 3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Chiffonen\Brownnoser65\Tarpaper\Merkantiliseringers.ini 3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe File opened for modification C:\Windows\resources\0409\Unstagily\Minstrels\Rhapontin\Disguisal.ini 3717424b02bedb7c66265376952fe5d5bd335615474e1ead4df636c0accc4cfd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c