Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe
Resource
win10v2004-20230915-en
General
-
Target
f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe
-
Size
198KB
-
MD5
37c674ea6a09ab4e8b37bdcda9b5724b
-
SHA1
6136d805704336cca57791cf60f6e4bc7ecf79be
-
SHA256
f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0
-
SHA512
34476fabba46a0694fd3e38db5341f34a3d7a5042a9b5901bc033dbb2f16030dc64b448aea9afaeb105272a9e1248ee65aaacf62a47f387e12786923ea9f06a2
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOj:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 qqwhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\qqwhost.exe f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe File opened for modification C:\Windows\Debug\qqwhost.exe f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qqwhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qqwhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2292 f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2648 2292 f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe 29 PID 2292 wrote to memory of 2648 2292 f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe 29 PID 2292 wrote to memory of 2648 2292 f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe 29 PID 2292 wrote to memory of 2648 2292 f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe"C:\Users\Admin\AppData\Local\Temp\f97897ac1a73b96cdb28762f06ba347561fa39369ed261a9c41717e88e01f1a0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\F97897~1.EXE > nul2⤵
- Deletes itself
PID:2648
-
-
C:\Windows\Debug\qqwhost.exeC:\Windows\Debug\qqwhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD522f1e1dbf75608e97ce894431bfb873c
SHA1c94a9d3c2eaf934a1338fd3d4ccd0eb7041fad4f
SHA25691e7bdccf79bb6492cd1598086a5c730cc591d7707792edb078a03a9f2758564
SHA5120169eb093e1e32a94e831697025273604af07d014943cc2289e260eb5b286e592c1edffbc65c57951cc459c074a305e433d0b44b2d05fa01d8d6fa6533603a91