Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 17:04

General

  • Target

    d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe

  • Size

    193KB

  • MD5

    12eebdd94702fb02298ceb41ebdfb1fc

  • SHA1

    ae8f6d8cd000c1b47d8247a9680a2ac816c33fbe

  • SHA256

    d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6

  • SHA512

    db9a8090b6813710c0f0f461f9480bdd9a4151edda8495d44d526919772b02a268676a59a0d58f49ed2b836d556bd2c00d042a70788627696817b4d100eb9d5d

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO7:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe
    "C:\Users\Admin\AppData\Local\Temp\d706fff7d06062fafb8fdeede9907cc1f98ac83dfe4ae0668e55dee3bdc806f6.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\D706FF~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2808
  • C:\Windows\Debug\qqwhost.exe
    C:\Windows\Debug\qqwhost.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\debug\qqwhost.exe

    Filesize

    193KB

    MD5

    bbd8b3638a00883a7a70c8b366d049c5

    SHA1

    1a52691e477554b07bfc3577b04d6e53e193d629

    SHA256

    4300481c7be2919c342f08376f85afb2ae624b194b4abe3c470cea5bdb561694

    SHA512

    56725c28cf4399c9cfc45f4388896ac14ea23aad6b842c72aef98dcf9a697f7eb9c8560d57834e2d8c66b427e0482aaa60198eecde98f3d009120e54db942fef