Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 10:36
Behavioral task
behavioral1
Sample
2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe
Resource
win10v2004-20230831-en
General
-
Target
2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe
-
Size
280KB
-
MD5
7baeadc564bed8e78c2bdaa4238eebdc
-
SHA1
a1b76f005a4d789974ce997ed6f3c0990a86ff4d
-
SHA256
2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab
-
SHA512
8f85df10855baa02fc941a018760c60162b0d752543bea91b73579164bbaed2aa41e73d10517bc8df73e33d16995914bdc91b70a0d27d28e39d2c5866ab1159b
-
SSDEEP
6144:NXSQ8BCMis1TMrRQwy7eIeCDbFcEOkCybEaQRXr9HNdvOa:NXv8BCLocRZy7eIeyb1Okx2LIa
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\Nk9sTgNz.sys qwinsta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Control Panel\International\Geo\Nation 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe -
Executes dropped EXE 2 IoCs
pid Process 4136 f7357ce4 4912 qwinsta.exe -
resource yara_rule behavioral2/memory/1936-0-0x0000000000B50000-0x0000000000BDE000-memory.dmp upx behavioral2/files/0x00070000000231c1-2.dat upx behavioral2/memory/4136-4-0x00000000008B0000-0x000000000093E000-memory.dmp upx behavioral2/files/0x00070000000231c1-3.dat upx behavioral2/memory/1936-22-0x0000000000B50000-0x0000000000BDE000-memory.dmp upx behavioral2/memory/4136-24-0x00000000008B0000-0x000000000093E000-memory.dmp upx behavioral2/memory/1936-31-0x0000000000B50000-0x0000000000BDE000-memory.dmp upx behavioral2/memory/4136-47-0x00000000008B0000-0x000000000093E000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 f7357ce4 File created C:\Windows\SysWOW64\f7357ce4 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies f7357ce4 File created C:\Windows\system32\ \Windows\System32\6jIQisMc.sys qwinsta.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A f7357ce4 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 f7357ce4 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\qwinsta.exe Explorer.EXE File opened for modification C:\Program Files\Common Files\qwinsta.exe Explorer.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\kxUPO3.sys qwinsta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 qwinsta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 qwinsta.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName qwinsta.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3892 timeout.exe 4288 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\Software\Microsoft\Internet Explorer\New Windows\Allow qwinsta.exe Set value (data) \REGISTRY\USER\S-1-5-21-2474409663-2236862430-1045297337-1000\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\www.hao774.com qwinsta.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix f7357ce4 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" f7357ce4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" f7357ce4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" f7357ce4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" f7357ce4 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" f7357ce4 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ f7357ce4 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" f7357ce4 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing f7357ce4 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 4136 f7357ce4 2616 Explorer.EXE 2616 Explorer.EXE 2616 Explorer.EXE 2616 Explorer.EXE 4136 f7357ce4 4136 f7357ce4 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 672 Process not Found 672 Process not Found 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe Token: SeTcbPrivilege 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe Token: SeDebugPrivilege 4136 f7357ce4 Token: SeTcbPrivilege 4136 f7357ce4 Token: SeDebugPrivilege 4136 f7357ce4 Token: SeDebugPrivilege 2616 Explorer.EXE Token: SeDebugPrivilege 2616 Explorer.EXE Token: SeIncBasePriorityPrivilege 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe Token: SeDebugPrivilege 4136 f7357ce4 Token: SeDebugPrivilege 4912 qwinsta.exe Token: SeDebugPrivilege 4912 qwinsta.exe Token: SeDebugPrivilege 4912 qwinsta.exe Token: SeShutdownPrivilege 2616 Explorer.EXE Token: SeCreatePagefilePrivilege 2616 Explorer.EXE Token: SeIncBasePriorityPrivilege 4136 f7357ce4 Token: SeDebugPrivilege 4912 qwinsta.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe 4912 qwinsta.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4912 qwinsta.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4136 wrote to memory of 2616 4136 f7357ce4 47 PID 4136 wrote to memory of 2616 4136 f7357ce4 47 PID 4136 wrote to memory of 2616 4136 f7357ce4 47 PID 4136 wrote to memory of 2616 4136 f7357ce4 47 PID 4136 wrote to memory of 2616 4136 f7357ce4 47 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 2616 wrote to memory of 4912 2616 Explorer.EXE 87 PID 4136 wrote to memory of 632 4136 f7357ce4 77 PID 4136 wrote to memory of 632 4136 f7357ce4 77 PID 4136 wrote to memory of 632 4136 f7357ce4 77 PID 4136 wrote to memory of 632 4136 f7357ce4 77 PID 4136 wrote to memory of 632 4136 f7357ce4 77 PID 1936 wrote to memory of 4896 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe 90 PID 1936 wrote to memory of 4896 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe 90 PID 1936 wrote to memory of 4896 1936 2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe 90 PID 4896 wrote to memory of 3892 4896 cmd.exe 92 PID 4896 wrote to memory of 3892 4896 cmd.exe 92 PID 4896 wrote to memory of 3892 4896 cmd.exe 92 PID 4136 wrote to memory of 2324 4136 f7357ce4 93 PID 4136 wrote to memory of 2324 4136 f7357ce4 93 PID 4136 wrote to memory of 2324 4136 f7357ce4 93 PID 2324 wrote to memory of 4288 2324 cmd.exe 95 PID 2324 wrote to memory of 4288 2324 cmd.exe 95 PID 2324 wrote to memory of 4288 2324 cmd.exe 95 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47 PID 4912 wrote to memory of 2616 4912 qwinsta.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe"C:\Users\Admin\AppData\Local\Temp\2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\2c9b3812d538e2be4d0ad9fe35d1c151d97b06d1089f8fa6ae9873b25dae39ab.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:3892
-
-
-
-
C:\Program Files\Common Files\qwinsta.exe"C:\Program Files\Common Files\qwinsta.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:632
-
C:\Windows\Syswow64\f7357ce4C:\Windows\Syswow64\f7357ce41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\f7357ce4"2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD53ed9ccc06af18ef822e1794feaec6183
SHA161bb46e5d659efe16e5c019eabca1aa1d5cd8f8f
SHA25608ac265f1888731d6ff54d762fa08b06b172a9424b66ce113afcefef9759c37b
SHA512c07f8fb0cb5fb1c6e81ab7495653373f6d8f6ac4ce49cc04a337155ee22c9987e950f2676be7b9bbda94a72b3621bf32e607fbdc96d85ed416820a16b7d003e6
-
Filesize
280KB
MD5b29ef5f4fd16537a0d8428d9ac9b1d0c
SHA1a16b99f2ce660cc1a2e8fff7b128db8b1f0fea84
SHA256a3e83eda077e12280ef463c623e50c9e37ae3a28b0a1cf39b2a7da813fd31933
SHA51282c7bb50908135869a264d492190510d07cdfb48fb977a9d87622934934995d21855bd7094aea7c60a6b64a15cad742875af07d68a197e9c3c821a3996db7c6d
-
Filesize
280KB
MD5b29ef5f4fd16537a0d8428d9ac9b1d0c
SHA1a16b99f2ce660cc1a2e8fff7b128db8b1f0fea84
SHA256a3e83eda077e12280ef463c623e50c9e37ae3a28b0a1cf39b2a7da813fd31933
SHA51282c7bb50908135869a264d492190510d07cdfb48fb977a9d87622934934995d21855bd7094aea7c60a6b64a15cad742875af07d68a197e9c3c821a3996db7c6d