Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 18:48
Static task
static1
Behavioral task
behavioral1
Sample
ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe
Resource
win10v2004-20231020-en
General
-
Target
ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe
-
Size
356KB
-
MD5
6b96baef4479a4b649e66bcc386fa3bf
-
SHA1
450858c469c2b71039ef7aebdd23ba091b8ee192
-
SHA256
ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f
-
SHA512
db6562b341d77cd2b0b4acee27d02fb38a4be7ad6223670cf10bf555390d26e906ff462acbb664c8b222cc0e842ad89942e65a365d4061a46160011e9f832030
-
SSDEEP
1536:riRtp/YdUQtoRp13IOkQNXVfhNrqjlPQbd7MnHDpsOf2AD92KO9AZCM7ED:rAAdrtoRP3DX9hNujlPQb6nr2KOE7ED
Malware Config
Signatures
-
Generic Chinese Botnet
A botnet originating from China which is currently unnamed publicly.
-
Chinese Botnet payload 1 IoCs
resource yara_rule behavioral1/memory/2348-0-0x0000000010000000-0x0000000010018000-memory.dmp unk_chinese_botnet -
Executes dropped EXE 2 IoCs
pid Process 2736 Gcqqesy.exe 2508 Gcqqesy.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\W: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\G: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\O: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\Q: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\R: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\X: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\Y: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\Z: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\I: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\L: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\P: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\B: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\J: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\M: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\N: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\S: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\T: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\V: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\E: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\H: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened (read-only) \??\K: ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Gcqqesy.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat Gcqqesy.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Gcqqesy.exe ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe File opened for modification C:\Program Files (x86)\Gcqqesy.exe ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecisionReason = "1" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecisionTime = 401e2dabcf09da01 Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\3e-94-27-f3-42-b2 Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2 Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecisionReason = "1" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E} Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2 Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecision = "0" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecisionReason = "1" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecisionReason = "1" Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadNetworkName = "Network 3" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecision = "0" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadNetworkName = "Network 3" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E} Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecisionTime = 401e2dabcf09da01 Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecision = "0" Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecision = "0" Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDetectedUrl Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecisionTime = 401e2dabcf09da01 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-94-27-f3-42-b2\WpadDecisionTime = 20f147b0cf09da01 Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Gcqqesy.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\3e-94-27-f3-42-b2 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Gcqqesy.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Gcqqesy.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Gcqqesy.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{8E44623A-C33B-4B70-9030-EA3BF499AF1E}\WpadDecisionTime = 20f147b0cf09da01 Gcqqesy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe 2348 ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2508 2736 Gcqqesy.exe 32 PID 2736 wrote to memory of 2508 2736 Gcqqesy.exe 32 PID 2736 wrote to memory of 2508 2736 Gcqqesy.exe 32 PID 2736 wrote to memory of 2508 2736 Gcqqesy.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe"C:\Users\Admin\AppData\Local\Temp\ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
C:\Program Files (x86)\Gcqqesy.exe"C:\Program Files (x86)\Gcqqesy.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Gcqqesy.exe"C:\Program Files (x86)\Gcqqesy.exe" Win72⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD56b96baef4479a4b649e66bcc386fa3bf
SHA1450858c469c2b71039ef7aebdd23ba091b8ee192
SHA256ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f
SHA512db6562b341d77cd2b0b4acee27d02fb38a4be7ad6223670cf10bf555390d26e906ff462acbb664c8b222cc0e842ad89942e65a365d4061a46160011e9f832030
-
Filesize
356KB
MD56b96baef4479a4b649e66bcc386fa3bf
SHA1450858c469c2b71039ef7aebdd23ba091b8ee192
SHA256ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f
SHA512db6562b341d77cd2b0b4acee27d02fb38a4be7ad6223670cf10bf555390d26e906ff462acbb664c8b222cc0e842ad89942e65a365d4061a46160011e9f832030
-
Filesize
356KB
MD56b96baef4479a4b649e66bcc386fa3bf
SHA1450858c469c2b71039ef7aebdd23ba091b8ee192
SHA256ac6031032aa78a2d47d0956ed94d71920bc849d634006c2b46b138e8593add0f
SHA512db6562b341d77cd2b0b4acee27d02fb38a4be7ad6223670cf10bf555390d26e906ff462acbb664c8b222cc0e842ad89942e65a365d4061a46160011e9f832030