Analysis
-
max time kernel
57s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe
Resource
win10v2004-20231025-en
General
-
Target
f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe
-
Size
196KB
-
MD5
2ad48c74b3e65e30ae3c1859829f758f
-
SHA1
afc5e2e0de12179e13f259314f72695e3f7578f0
-
SHA256
f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808
-
SHA512
ab617322796364abcae65e44af89abf596f4d402ff4d29a372aea001dc7d29236aa263d84c15d059e16770c5778cbb24a66227e8ecefec55e3c9e4d19a224312
-
SSDEEP
3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4864 ongsq.exe -
Executes dropped EXE 2 IoCs
pid Process 4864 ongsq.exe 4668 yywfxqgfo.exe -
Loads dropped DLL 1 IoCs
pid Process 4668 yywfxqgfo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Depend = "c:\\Program Files\\arqhp\\yywfxqgfo.exe \"c:\\Program Files\\arqhp\\yywfxqgfo.dll\",Compliance" yywfxqgfo.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: yywfxqgfo.exe File opened (read-only) \??\b: yywfxqgfo.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 yywfxqgfo.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification \??\c:\Program Files\arqhp ongsq.exe File created \??\c:\Program Files\arqhp\yywfxqgfo.dll ongsq.exe File created \??\c:\Program Files\arqhp\yywfxqgfo.exe ongsq.exe File opened for modification \??\c:\Program Files\arqhp\yywfxqgfo.exe ongsq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 yywfxqgfo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString yywfxqgfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1084 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4668 yywfxqgfo.exe 4668 yywfxqgfo.exe 4668 yywfxqgfo.exe 4668 yywfxqgfo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4668 yywfxqgfo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3936 f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe 4864 ongsq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3936 wrote to memory of 5012 3936 f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe 26 PID 3936 wrote to memory of 5012 3936 f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe 26 PID 3936 wrote to memory of 5012 3936 f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe 26 PID 5012 wrote to memory of 1084 5012 cmd.exe 31 PID 5012 wrote to memory of 1084 5012 cmd.exe 31 PID 5012 wrote to memory of 1084 5012 cmd.exe 31 PID 5012 wrote to memory of 4864 5012 cmd.exe 60 PID 5012 wrote to memory of 4864 5012 cmd.exe 60 PID 5012 wrote to memory of 4864 5012 cmd.exe 60 PID 4864 wrote to memory of 4668 4864 ongsq.exe 59 PID 4864 wrote to memory of 4668 4864 ongsq.exe 59 PID 4864 wrote to memory of 4668 4864 ongsq.exe 59
Processes
-
C:\Users\Admin\AppData\Local\Temp\f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe"C:\Users\Admin\AppData\Local\Temp\f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\ongsq.exe "C:\Users\Admin\AppData\Local\Temp\f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\ongsq.exeC:\Users\Admin\AppData\Local\Temp\\ongsq.exe "C:\Users\Admin\AppData\Local\Temp\f92011e9aef4773f648da5f75d79c1a7a2ee1932a7d9cf163acac859c35de808.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4864
-
-
-
\??\c:\Program Files\arqhp\yywfxqgfo.exe"c:\Program Files\arqhp\yywfxqgfo.exe" "c:\Program Files\arqhp\yywfxqgfo.dll",Compliance C:\Users\Admin\AppData\Local\Temp\ongsq.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD5d3cf18178692a0ef84c5f6306e850374
SHA1cf49919b903b926044a360bdfab32abdac4bc0fa
SHA2564634c03158bf4f4b8a7b2a2b03b0b7f403e60509126fcf2a46b699f6484654aa
SHA5121c4350d2ca52f2cb98a6d199b6f7c740a86e2ce3f7a028c1e00dd8790fa0a6c71b81c10998ee82f52337286383c5210c8093021e07337d5add11810b0bb2261d
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
197KB
MD5497ab55326e8cf8057c91106659475a7
SHA152b3136c5dec5e5b4171d286e04c182ed20d8754
SHA25663f6c0aea8f0892101444baba577ec93fa9ad0c05c03d560fe9351d415158740
SHA512eb57a288125364f37e185e67a1496489cfcbc4a832f53733646c7618a3f46ed2deecb5059463ae3884e13e74062999223a711a0ff6d9fb689864351b416358b0
-
Filesize
197KB
MD5497ab55326e8cf8057c91106659475a7
SHA152b3136c5dec5e5b4171d286e04c182ed20d8754
SHA25663f6c0aea8f0892101444baba577ec93fa9ad0c05c03d560fe9351d415158740
SHA512eb57a288125364f37e185e67a1496489cfcbc4a832f53733646c7618a3f46ed2deecb5059463ae3884e13e74062999223a711a0ff6d9fb689864351b416358b0
-
Filesize
141KB
MD5d3cf18178692a0ef84c5f6306e850374
SHA1cf49919b903b926044a360bdfab32abdac4bc0fa
SHA2564634c03158bf4f4b8a7b2a2b03b0b7f403e60509126fcf2a46b699f6484654aa
SHA5121c4350d2ca52f2cb98a6d199b6f7c740a86e2ce3f7a028c1e00dd8790fa0a6c71b81c10998ee82f52337286383c5210c8093021e07337d5add11810b0bb2261d
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641