Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 01:46
Static task
static1
Behavioral task
behavioral1
Sample
82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe
Resource
win10v2004-20230703-en
General
-
Target
82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe
-
Size
421KB
-
MD5
92b8b8d35ba16bf772e1c3c55972ccda
-
SHA1
4cb1fcef30fdcfe0f590ba1f223787939257ba36
-
SHA256
82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f
-
SHA512
fed3b35b7f131fc80ca8d21f697ea0e91f3b9ed04eb36087b5d652a3396ce46e649dd6f401839ca0235a1c7bcd7e777c7cf27898ae00fe3dfe1712f0064b6be6
-
SSDEEP
6144:vmOPuFNlaapl0zQwY0CyKlBGfpnAW4VKDkjdl8Jp42KcUMhmtL6Rt93WhX3A1maq:AlhpcCyKOf8l8D42XmxOt93OXQ1eoU
Malware Config
Signatures
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Loads dropped DLL 2 IoCs
pid Process 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 3484 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4728 set thread context of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\unstirrable\microprint\torose.lit 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe File opened for modification C:\Windows\Values157\calinas\Ledendes.Bul 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91 PID 4728 wrote to memory of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91 PID 4728 wrote to memory of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91 PID 4728 wrote to memory of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91 PID 4728 wrote to memory of 3484 4728 82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe"C:\Users\Admin\AppData\Local\Temp\82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\82d48c9bb4936387228e0de374d235ac364bd4011519b988623707cb7025150f.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b
-
Filesize
11KB
MD59625d5b1754bc4ff29281d415d27a0fd
SHA180e85afc5cccd4c0a3775edbb90595a1a59f5ce0
SHA256c2f405d7402f815d0c3fadd9a50f0bbbb1bab9aa38fe347823478a2587299448
SHA512dce52b640897c2e8dbfd0a1472d5377fa91fb9cf1aeff62604d014bccbe5b56af1378f173132abeb0edd18c225b9f8f5e3d3e72434aed946661e036c779f165b