Analysis

  • max time kernel
    142s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2023, 19:07

General

  • Target

    ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe

  • Size

    476KB

  • MD5

    ea0cf0a560a8c73d543e3dc2c0be0746

  • SHA1

    c680dfd744d3537844193b611777c8f5ba5ac387

  • SHA256

    4b4069bc462e10031185e70d3a9fad2a266e708e1f2d55d3890e7442b0e2344f

  • SHA512

    305e5fe3028598ce67a451526866d6e1fcd85da4acdb697a38914abce3b44e3f1787c82b49cc2bcfaddf920b5e15f413d287be9e5a9993f69a686b11134d7a4d

  • SSDEEP

    6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqr:s8kxNhOZElO5kkWjhD4AI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0cf0a560a8c73d543e3dc2c0be0746_JC.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\QWTMCVZ.EXE
      C:\Windows\QWTMCVZ.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\EUAGUVS.EXE

    Filesize

    476KB

    MD5

    446804d2577dccfa30f86d4db53087ef

    SHA1

    19d9f3f12ac5b363d62402d917231a217bdd07e5

    SHA256

    398ea945409860df9f9a0e08bdac08cbf41ea60d0524b0d9562ca3dfd0e3a7a0

    SHA512

    895806b375f28574eb46ede842203e78a394e61e7790251fdc8058e07a79a16c2497abaefc4c57cc36d8bc70611726f249b56f39a52cfbc51bae8ec0b616a7f0

  • C:\Windows\QWTMCVZ.EXE

    Filesize

    476KB

    MD5

    7e9ef04c9d30268c059785e1838c994d

    SHA1

    1156e4cf26a76e6349cc20159e29c58c9d7ebdee

    SHA256

    dca4dda4eafb0aa878dd72b302713ea1cdfe1e6eb50afc322b14cc8eca5669cb

    SHA512

    0eb053a0e0f2bdd726a9674193faa1219eb8c8aa121aebef74a55e48e0e36975005f8f1fcdd132d3e92f3e5c4341df893084a0650c9b48ed60672058d8960f15

  • C:\Windows\QWTMCVZ.EXE

    Filesize

    476KB

    MD5

    7e9ef04c9d30268c059785e1838c994d

    SHA1

    1156e4cf26a76e6349cc20159e29c58c9d7ebdee

    SHA256

    dca4dda4eafb0aa878dd72b302713ea1cdfe1e6eb50afc322b14cc8eca5669cb

    SHA512

    0eb053a0e0f2bdd726a9674193faa1219eb8c8aa121aebef74a55e48e0e36975005f8f1fcdd132d3e92f3e5c4341df893084a0650c9b48ed60672058d8960f15

  • \??\c:\filedebug

    Filesize

    249B

    MD5

    8444d63139d754d78dbd62d398df7fe7

    SHA1

    f0bfc90e5a6ea44a766765a6f84b5c7919ca5fa2

    SHA256

    e17dd38270b68198ebfe2af8657ae1805ecdbae805fc142d673318a49cd13112

    SHA512

    176ac48a05669ee45815f70ac2fa5dd5b43c82e3a25c4538a50606b2288ab2f72475649cc8d7ffec7f193c1f048e0ce76c0d3ca4f57b5404d69d9fe9018d48e5

  • memory/1048-0-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1048-1-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/1048-24-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1756-23-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/1756-25-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1756-26-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB