Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
Q7ZiqgD1IZjP7fs.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Q7ZiqgD1IZjP7fs.exe
Resource
win10v2004-20231023-en
General
-
Target
Q7ZiqgD1IZjP7fs.exe
-
Size
600KB
-
MD5
c93b8ad115f2693f3e5e33f505f44d06
-
SHA1
9b9e46a0140773ebb1686bb5d4567a4a7895f2da
-
SHA256
95db9ea9df83185a3ab4cdcdac19f62ebf64daaf94ce2ba1f77677bcb361ba9e
-
SHA512
e25b8859feaef40d340238ffd112dd80ab65369761c81f30a0fe12b5a74795a63f86e3e9699d39f37024c819da2cd93de71f782df11d6fde18902a0871f53025
-
SSDEEP
12288:DXy8oCF8Jwc0mfNXgotB4mmTnufYT1c4gWLpYX1WRMZicwHvZqvDH5f:DXFO2c0SNd74mNwZYX1WWZibP4F
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2800 credwiz.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2148 set thread context of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2728 set thread context of 1236 2728 Q7ZiqgD1IZjP7fs.exe 8 PID 2728 set thread context of 2800 2728 Q7ZiqgD1IZjP7fs.exe 31 PID 2800 set thread context of 1236 2800 credwiz.exe 8 -
description ioc Process Key created \Registry\User\S-1-5-21-1154728922-3261336865-3456416385-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 credwiz.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2728 Q7ZiqgD1IZjP7fs.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2728 Q7ZiqgD1IZjP7fs.exe 1236 Explorer.EXE 1236 Explorer.EXE 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe 2800 credwiz.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 2148 wrote to memory of 2728 2148 Q7ZiqgD1IZjP7fs.exe 28 PID 1236 wrote to memory of 2800 1236 Explorer.EXE 31 PID 1236 wrote to memory of 2800 1236 Explorer.EXE 31 PID 1236 wrote to memory of 2800 1236 Explorer.EXE 31 PID 1236 wrote to memory of 2800 1236 Explorer.EXE 31 PID 2800 wrote to memory of 1424 2800 credwiz.exe 33 PID 2800 wrote to memory of 1424 2800 credwiz.exe 33 PID 2800 wrote to memory of 1424 2800 credwiz.exe 33 PID 2800 wrote to memory of 1424 2800 credwiz.exe 33 PID 2800 wrote to memory of 1424 2800 credwiz.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Q7ZiqgD1IZjP7fs.exe"C:\Users\Admin\AppData\Local\Temp\Q7ZiqgD1IZjP7fs.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Q7ZiqgD1IZjP7fs.exe"C:\Users\Admin\AppData\Local\Temp\Q7ZiqgD1IZjP7fs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2728
-
-
-
C:\Windows\SysWOW64\credwiz.exe"C:\Windows\SysWOW64\credwiz.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD572b88067a5a1a4f8d52c45e6621d13fe
SHA1f84542474b8583f4371749282e5cc4d52661c222
SHA25670a11669bb8ad1099fd7fba9da92e1a75124bef0d16a01fd10dcdc45e9582092
SHA512a8bf75fd4f38e4c8dee5e6f2527062c5be21f5a8bae4ea561f4aa28139d65a6f215afb212f1e4857ee482e16e813fc0d63ef8ec43ec94d5f8a722489e89e154d
-
Filesize
910KB
MD5d79258c5189103d69502eac786addb04
SHA1f34b33681cfe8ce649218173a7f58b237821c1ef
SHA25657d89a52061d70d87e40281f1196d53273f87860c4d707d667a8c7d9573da675
SHA512da797f4dd1ad628aa4e8004b2e00b7c278facbc57a313f56b70dc8fcfbdb0050ea8b025b3475098223cce96ea53537d678273656d46c2d33d81b496d90da34b2