Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
0cdb0c7a7c1f2caaef27c75ef8481482.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0cdb0c7a7c1f2caaef27c75ef8481482.exe
Resource
win10v2004-20231020-en
General
-
Target
0cdb0c7a7c1f2caaef27c75ef8481482.exe
-
Size
326KB
-
MD5
0cdb0c7a7c1f2caaef27c75ef8481482
-
SHA1
a5a806d4cd8885e76ea2e5860feb90382dac72f1
-
SHA256
e4b6f95557a2356d046da60a1ca4e52d302618108fae774b8128ffc0586366e0
-
SHA512
02a271c67363078c98962d881b54bce83292b64ae5080d345a18b950e332df9e0e1ff3d0fe99ed49bc5f3bba28eb32e79d961c6b13e3f235320acf7fc4dfda61
-
SSDEEP
6144:JzAJW0SFZ6zM65lS3YQ3QjNzw8pg42WrBfT6DcqoeqRQiF0cW6yF:5H06OlSIQkNzw8pg42WVL1qFkKcWNF
Malware Config
Signatures
-
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
description ioc Process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe 0cdb0c7a7c1f2caaef27c75ef8481482.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Loads dropped DLL 2 IoCs
pid Process 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 2588 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30 PID 1964 wrote to memory of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30 PID 1964 wrote to memory of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30 PID 1964 wrote to memory of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30 PID 1964 wrote to memory of 2588 1964 0cdb0c7a7c1f2caaef27c75ef8481482.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cdb0c7a7c1f2caaef27c75ef8481482.exe"C:\Users\Admin\AppData\Local\Temp\0cdb0c7a7c1f2caaef27c75ef8481482.exe"1⤵
- Checks QEMU agent file
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Users\Admin\AppData\Local\Temp\0cdb0c7a7c1f2caaef27c75ef8481482.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622
-
Filesize
11KB
MD54d3b19a81bd51f8ce44b93643a4e3a99
SHA135f8b00e85577b014080df98bd2c378351d9b3e9
SHA256fda0018ab182ac6025d2fc9a2efcce3745d1da21ce5141859f8286cf319a52ce
SHA512b2ba9c961c0e1617f802990587a9000979ab5cc493ae2f8ca852eb43eeaf24916b0b29057dbff7d41a1797dfb2dce3db41990e8639b8f205771dbec3fd80f622