Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 03:09
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
dlq.exe
Resource
win7-20230712-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
dlq.exe
Resource
win10v2004-20230703-en
1 signatures
150 seconds
General
-
Target
dlq.exe
-
Size
3.0MB
-
MD5
53ada198b45f7d62148ee58b90dea4db
-
SHA1
2099deff4b98c0aad183e223eba96847374b9343
-
SHA256
28801cb8bdda78bec1535221b45cf2d5120fccce72820af3ae8b3f740d116d86
-
SHA512
364c170c8095bc44992ba43000f94cfdb73734689834c1305475caf2372dc236e2a931a674e2c6697b5ddcde904ca7e4f3ffd63e2b12992faa37fbe25202521e
-
SSDEEP
24576:y6yXwK1SKZQyJ+bYhoxSaFWIpA3yDDGws239GN2:/M2jIoWIqI39K2
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: dlq.exe File opened (read-only) \??\Q: dlq.exe File opened (read-only) \??\T: dlq.exe File opened (read-only) \??\Z: dlq.exe File opened (read-only) \??\P: dlq.exe File opened (read-only) \??\X: dlq.exe File opened (read-only) \??\Y: dlq.exe File opened (read-only) \??\A: dlq.exe File opened (read-only) \??\I: dlq.exe File opened (read-only) \??\L: dlq.exe File opened (read-only) \??\O: dlq.exe File opened (read-only) \??\R: dlq.exe File opened (read-only) \??\S: dlq.exe File opened (read-only) \??\B: dlq.exe File opened (read-only) \??\H: dlq.exe File opened (read-only) \??\M: dlq.exe File opened (read-only) \??\N: dlq.exe File opened (read-only) \??\V: dlq.exe File opened (read-only) \??\W: dlq.exe File opened (read-only) \??\E: dlq.exe File opened (read-only) \??\G: dlq.exe File opened (read-only) \??\K: dlq.exe File opened (read-only) \??\U: dlq.exe