Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 13:08

General

  • Target

    ae912c45cf99db9c89b7becc762337689f592a8c135ca510504c218497e3c628.exe

  • Size

    377KB

  • MD5

    abf5b022f2445cc8259d9658a4f4a59b

  • SHA1

    f93f93a2174254fd4c495e4bc6dc3f495ac2be1b

  • SHA256

    ae912c45cf99db9c89b7becc762337689f592a8c135ca510504c218497e3c628

  • SHA512

    148e17c42e62bb090fe3c0fe297ac3a6025f3d7addd928d7fdb95f4f4e91b9ad97f416f2cc84fdbeed6d514e54b96c2a79531a1a977c1c0515ff642cb036e5c7

  • SSDEEP

    6144:8qGYgXWlQw7zFgW5+Gs0XFN4j/c5yJkF6mbeYd+/JvmMcryRrW6gHheNFRrECx6J:CDG35gWEN0/4jk0Jw6YsRsrKrRihkRrU

Score
7/10

Malware Config

Signatures

  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Loads dropped DLL 11 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae912c45cf99db9c89b7becc762337689f592a8c135ca510504c218497e3c628.exe
    "C:\Users\Admin\AppData\Local\Temp\ae912c45cf99db9c89b7becc762337689f592a8c135ca510504c218497e3c628.exe"
    1⤵
    • Checks QEMU agent file
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Program Files (x86)\windows mail\wab.exe
      "C:\Users\Admin\AppData\Local\Temp\ae912c45cf99db9c89b7becc762337689f592a8c135ca510504c218497e3c628.exe"
      2⤵
      • Checks QEMU agent file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:1896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    be828e6e1885cc5a25e18f123e2a76a0

    SHA1

    96432bf2da4e1c454f49f76e20855f27c2fce2f9

    SHA256

    01773690efda3c1fa609287f4bf2277f3d366fe4a1ddc099d2949fab54f0fbd4

    SHA512

    983e9a9e941b162031b8acf372c3ec12180b54f8e5f7172a6e87599e127170240841889d6e346a730f4970c9079f5f9cededc2730f910eb4e0bb897f68cfca70

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\System.dll

    Filesize

    11KB

    MD5

    ee260c45e97b62a5e42f17460d406068

    SHA1

    df35f6300a03c4d3d3bd69752574426296b78695

    SHA256

    e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27

    SHA512

    a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\System.dll

    Filesize

    11KB

    MD5

    ee260c45e97b62a5e42f17460d406068

    SHA1

    df35f6300a03c4d3d3bd69752574426296b78695

    SHA256

    e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27

    SHA512

    a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3

  • C:\Users\Admin\AppData\Local\Temp\nsw7050.tmp\System.dll

    Filesize

    11KB

    MD5

    ee260c45e97b62a5e42f17460d406068

    SHA1

    df35f6300a03c4d3d3bd69752574426296b78695

    SHA256

    e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27

    SHA512

    a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3

  • memory/1896-38-0x0000000077048000-0x0000000077049000-memory.dmp

    Filesize

    4KB

  • memory/1896-37-0x0000000072A70000-0x0000000073CC4000-memory.dmp

    Filesize

    18.3MB

  • memory/1896-39-0x0000000076FC1000-0x00000000770E1000-memory.dmp

    Filesize

    1.1MB

  • memory/4584-35-0x0000000076FC1000-0x00000000770E1000-memory.dmp

    Filesize

    1.1MB

  • memory/4584-36-0x0000000010000000-0x0000000010006000-memory.dmp

    Filesize

    24KB