Analysis

  • max time kernel
    173s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:33

General

  • Target

    03d2041f4bdd0d9bcfe08b6d4e8072c8.exe

  • Size

    57KB

  • MD5

    03d2041f4bdd0d9bcfe08b6d4e8072c8

  • SHA1

    c988e3e36609ff22f7ddfbdc213a63161e8ab779

  • SHA256

    f006dfada0794c28c6d2f5fd4798e6bc1b1b6283a03c25a3f87c8fd7c205a1ba

  • SHA512

    f8d4bb4f907a37f93929c74398fd36a1904dec9db4c84068efe31c3f747f18081b07e833d2b64b6031b425b2b5840487afa64a2a9a4962b13d6e1c8b01ae5c77

  • SSDEEP

    768:9OFqliVszXTgw9kKwcFewaIdYtfqunJQ2sC40AEFEePQoWC6q93bjdpI2:AFqIVsr82Lju+P0AEFhFWCVHS2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d2041f4bdd0d9bcfe08b6d4e8072c8.exe
    "C:\Users\Admin\AppData\Local\Temp\03d2041f4bdd0d9bcfe08b6d4e8072c8.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\net.exe
      net.exe share D=D:\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 share D=D:\
        3⤵
          PID:2932
      • C:\Windows\SysWOW64\qmdc.exe
        C:\Windows\system32\qmdc.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\SysWOW64\net.exe
          net.exe share D=D:\
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 share D=D:\
            4⤵
              PID:1980

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Windows\SysWOW64\qmdc.exe

        Filesize

        57KB

        MD5

        03d2041f4bdd0d9bcfe08b6d4e8072c8

        SHA1

        c988e3e36609ff22f7ddfbdc213a63161e8ab779

        SHA256

        f006dfada0794c28c6d2f5fd4798e6bc1b1b6283a03c25a3f87c8fd7c205a1ba

        SHA512

        f8d4bb4f907a37f93929c74398fd36a1904dec9db4c84068efe31c3f747f18081b07e833d2b64b6031b425b2b5840487afa64a2a9a4962b13d6e1c8b01ae5c77

      • memory/2164-9-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-10-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-11-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-12-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-13-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-14-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-15-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-16-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-17-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-18-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-19-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-20-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-21-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-22-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB

      • memory/2840-23-0x0000000000400000-0x0000000000413000-memory.dmp

        Filesize

        76KB