Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2023 09:13
General
-
Target
MQVIFDDBKZ.exe
-
Size
4.2MB
-
MD5
5f935bf59dd02975d2fcceebdb704ff5
-
SHA1
a845035c8abd398980dde847a79f0101df783481
-
SHA256
adde97df86a4bddb26838cbc17b26a0e02966ba786747ff943150a72fac5fba6
-
SHA512
03d6bc3b9edb15ca5c0b9a18aa18e72bf8bc9a21e03acbba8917abe6e90aa408fe80176a3081409579e47918e8e80a14991335aa021ad8a99f523e920853d906
-
SSDEEP
49152:UcPaYhZjSIhfmzp45kfFos9UUEYSoh26XX6KB7d5egU+1dhXpCm9vEMDj2gmYXAt:tjffmSk+YxhBJHDRvAYbvGgw+js
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1388 powershell.exe 1388 powershell.exe 4448 powershell.exe 4448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 4448 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1388 3880 MQVIFDDBKZ.exe 83 PID 3880 wrote to memory of 1388 3880 MQVIFDDBKZ.exe 83 PID 3880 wrote to memory of 4448 3880 MQVIFDDBKZ.exe 86 PID 3880 wrote to memory of 4448 3880 MQVIFDDBKZ.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\MQVIFDDBKZ.exe"C:\Users\Admin\AppData\Local\Temp\MQVIFDDBKZ.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -Command "Set-MpPreference -ExclusionPath" C:\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -NonInteractive -NoLogo -Command "Get-Culture | Select -ExpandProperty DisplayName"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.3MB
MD5f3fbe6459877cc94efc4def5a81b58de
SHA1a7c81201c19783433bda974ea532fff9d4c5a758
SHA256295241a852afa6b161491de30364a84c12050d687de9684154e65f24deb1c472
SHA512aa8862bdaa39420f64ee3f78ffb89e62a61b730a3164c519386ebcf852dd0ab025ba23719b9c008f48f41974f620dfa229acddf2455e9064def8b12d056aef24