Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2023 15:00
Static task
static1
Behavioral task
behavioral1
Sample
9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe
Resource
win10v2004-20231020-en
General
-
Target
9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe
-
Size
3.6MB
-
MD5
1afe0d7e3bff80348c32e8e83b71a610
-
SHA1
3440a16a25f83a1a7e155acde5a68312bb75c189
-
SHA256
9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0
-
SHA512
f6428bb9b5232013304c2391d3213f3348120070e8be58f33519336545e8702e0a9f790c7e86dc0c0a552ff5e7a6856f15b6b042d4d7345ecfba4abd9f1b0389
-
SSDEEP
98304:KHdfYHcREzq6mPQEqp77qRsCqmlh08SbNnR2zhAmoSSH:QMzFmoE/Rbqa092zNNS
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2240 temp.exe 2380 Quick login.exe 2596 Quinck login.exe -
Loads dropped DLL 3 IoCs
pid Process 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Quick login = "C:\\Program Files (x86)\\Quick login.exe dk=40" 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Quick login.exe 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe File opened for modification C:\Program Files (x86)\Quick login.exe 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe File created C:\Program Files (x86)\Quinck login.exe 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe File opened for modification C:\Program Files (x86)\Quinck login.exe 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 2240 temp.exe 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 2240 temp.exe 2240 temp.exe 2380 Quick login.exe 2380 Quick login.exe 2596 Quinck login.exe 2596 Quinck login.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2240 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 28 PID 2164 wrote to memory of 2240 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 28 PID 2164 wrote to memory of 2240 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 28 PID 2164 wrote to memory of 2240 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 28 PID 2164 wrote to memory of 2380 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 29 PID 2164 wrote to memory of 2380 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 29 PID 2164 wrote to memory of 2380 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 29 PID 2164 wrote to memory of 2380 2164 9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe"C:\Users\Admin\AppData\Local\Temp\9d55401791b27f489aa2d2eaa56f47ad181f787d8621008d91f609a18e4127d0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\temp.exeC:\Users\Admin\AppData\Local\Temp\temp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Program Files (x86)\Quick login.exe"C:\Program Files (x86)\Quick login.exe" dk=402⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Program Files (x86)\Quinck login.exe"C:\Program Files (x86)\Quinck login.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD52a96153f07f83069db283a968c80bfaf
SHA1ced4ae04b6d778d13acf20c76543b2b11c0e41a9
SHA256629850cd18aacd154937b4830fac6545014282bccb1cb2d448a0c7cf6a0f11e4
SHA51261045709145add2b5fa50da7686a0f137807b4be177db807a7a6df2128069a5dea6acbe95be8a695e927693420486c80870c12cab31f95b137909d95141ed31c
-
Filesize
1.0MB
MD52a96153f07f83069db283a968c80bfaf
SHA1ced4ae04b6d778d13acf20c76543b2b11c0e41a9
SHA256629850cd18aacd154937b4830fac6545014282bccb1cb2d448a0c7cf6a0f11e4
SHA51261045709145add2b5fa50da7686a0f137807b4be177db807a7a6df2128069a5dea6acbe95be8a695e927693420486c80870c12cab31f95b137909d95141ed31c
-
Filesize
1.8MB
MD503dd252ad695e03b1c8c98bc1ea3589f
SHA113980a804100360d44ec2bd012e93dddffe990ac
SHA2561c0608b8c2463f0c859861bf31a2ac0359c6b6f5d143d6a27006ca8f74d74e39
SHA51250ed424751b00d9139630d49a858c849ad916bc802bf5ec560fc100730e1874c2ba18dc5a11790904aa2b2017d3aae5cf475617876a2ee4388778ce0f8caa58c
-
Filesize
1.4MB
MD5e009e8280f44aa1f2df093c8c971c7c0
SHA148fbc70f1c9746c6216b0f4d5dc6d009dde87fcb
SHA256cdab2f7f4d58f0fe718b8d1c83c904839c583a15e1ceff69b86c242166b6d2aa
SHA5123dc8925e5b03a75dc7f2e433770e04371e2ab6232ced534b71210a2c762548c269d2f3c63226cddfa2af4a2ed694d64da4e5577812847380d13eb17a5bf06258
-
Filesize
1.0MB
MD52a96153f07f83069db283a968c80bfaf
SHA1ced4ae04b6d778d13acf20c76543b2b11c0e41a9
SHA256629850cd18aacd154937b4830fac6545014282bccb1cb2d448a0c7cf6a0f11e4
SHA51261045709145add2b5fa50da7686a0f137807b4be177db807a7a6df2128069a5dea6acbe95be8a695e927693420486c80870c12cab31f95b137909d95141ed31c
-
Filesize
1.0MB
MD52a96153f07f83069db283a968c80bfaf
SHA1ced4ae04b6d778d13acf20c76543b2b11c0e41a9
SHA256629850cd18aacd154937b4830fac6545014282bccb1cb2d448a0c7cf6a0f11e4
SHA51261045709145add2b5fa50da7686a0f137807b4be177db807a7a6df2128069a5dea6acbe95be8a695e927693420486c80870c12cab31f95b137909d95141ed31c
-
Filesize
1.4MB
MD5e009e8280f44aa1f2df093c8c971c7c0
SHA148fbc70f1c9746c6216b0f4d5dc6d009dde87fcb
SHA256cdab2f7f4d58f0fe718b8d1c83c904839c583a15e1ceff69b86c242166b6d2aa
SHA5123dc8925e5b03a75dc7f2e433770e04371e2ab6232ced534b71210a2c762548c269d2f3c63226cddfa2af4a2ed694d64da4e5577812847380d13eb17a5bf06258