Analysis
-
max time kernel
297s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
21-07-2023 00:00
Static task
static1
Behavioral task
behavioral1
Sample
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe
Resource
win10-20230703-en
General
-
Target
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe
-
Size
4.8MB
-
MD5
1cc4079428f6343a56ce2b33e720820e
-
SHA1
8170a858dbcd7700ad649113631625bec5da9949
-
SHA256
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b
-
SHA512
6f55e7018777296668db1f940c7defbd4781018bfa0149faf9f3dda6ef52401d36f08faf453e3b0765e6f55740cea68b4345f65d9f45c05a2698569fcb659635
-
SSDEEP
12288:TeC3CZ/dn53l3lYZDGR2vK/BY3nLkpVpnG6kzn:i+m33l3lYZE2C/zG5
Malware Config
Extracted
systembc
91.103.252.89:4317
91.103.252.57:4317
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
qfwwlt.exepid process 1012 qfwwlt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000\Software\Microsoft\Windows\CurrentVersion\Run 246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe Set value (str) \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000\Software\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe'\"" 246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe -
Drops file in Windows directory 1 IoCs
Processes:
246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exedescription ioc process File created C:\Windows\Tasks\iwosldlqajrnwosdluq.job 246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe"C:\Users\Admin\AppData\Local\Temp\246cb24d4721596de689605487342848d056bb672224bc673c976db50632066b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:4720
-
C:\Users\Admin\AppData\Local\Temp\qfwwlt.exeC:\Users\Admin\AppData\Local\Temp\qfwwlt.exe1⤵
- Executes dropped EXE
PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5d8e63037d7f87a26c6ea1dd7d7a458ae
SHA12e44954be9c86aac2cb4b3de59b9a37d2df132de
SHA2562dea43ae1f222783b8dbe3b281826a11fadb6f67e72bf6676afab1ed7ebdcc9b
SHA512a25a5b0631a6291adf1d2424b118390def8584753eb6939be99739c38b7544e1dd3b047ab0773cb05027ff46656246aa92e0a9222653422a16455a274b4de439
-
Filesize
4.8MB
MD5d8e63037d7f87a26c6ea1dd7d7a458ae
SHA12e44954be9c86aac2cb4b3de59b9a37d2df132de
SHA2562dea43ae1f222783b8dbe3b281826a11fadb6f67e72bf6676afab1ed7ebdcc9b
SHA512a25a5b0631a6291adf1d2424b118390def8584753eb6939be99739c38b7544e1dd3b047ab0773cb05027ff46656246aa92e0a9222653422a16455a274b4de439