Analysis
-
max time kernel
173s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
03d2041f4bdd0d9bcfe08b6d4e8072c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03d2041f4bdd0d9bcfe08b6d4e8072c8.exe
Resource
win10v2004-20231215-en
General
-
Target
03d2041f4bdd0d9bcfe08b6d4e8072c8.exe
-
Size
57KB
-
MD5
03d2041f4bdd0d9bcfe08b6d4e8072c8
-
SHA1
c988e3e36609ff22f7ddfbdc213a63161e8ab779
-
SHA256
f006dfada0794c28c6d2f5fd4798e6bc1b1b6283a03c25a3f87c8fd7c205a1ba
-
SHA512
f8d4bb4f907a37f93929c74398fd36a1904dec9db4c84068efe31c3f747f18081b07e833d2b64b6031b425b2b5840487afa64a2a9a4962b13d6e1c8b01ae5c77
-
SSDEEP
768:9OFqliVszXTgw9kKwcFewaIdYtfqunJQ2sC40AEFEePQoWC6q93bjdpI2:AFqIVsr82Lju+P0AEFhFWCVHS2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2840 qmdc.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\explorer2 = "C:\\Windows\\SysWOW64\\qmdc.exe" qmdc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\qmdc.exe 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe File opened for modification C:\Windows\SysWOW64\qmdc.exe 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2704 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 27 PID 2164 wrote to memory of 2704 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 27 PID 2164 wrote to memory of 2704 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 27 PID 2164 wrote to memory of 2704 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 27 PID 2164 wrote to memory of 2840 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 29 PID 2164 wrote to memory of 2840 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 29 PID 2164 wrote to memory of 2840 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 29 PID 2164 wrote to memory of 2840 2164 03d2041f4bdd0d9bcfe08b6d4e8072c8.exe 29 PID 2840 wrote to memory of 1884 2840 qmdc.exe 30 PID 2840 wrote to memory of 1884 2840 qmdc.exe 30 PID 2840 wrote to memory of 1884 2840 qmdc.exe 30 PID 2840 wrote to memory of 1884 2840 qmdc.exe 30 PID 2704 wrote to memory of 2932 2704 net.exe 33 PID 2704 wrote to memory of 2932 2704 net.exe 33 PID 2704 wrote to memory of 2932 2704 net.exe 33 PID 2704 wrote to memory of 2932 2704 net.exe 33 PID 1884 wrote to memory of 1980 1884 net.exe 32 PID 1884 wrote to memory of 1980 1884 net.exe 32 PID 1884 wrote to memory of 1980 1884 net.exe 32 PID 1884 wrote to memory of 1980 1884 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d2041f4bdd0d9bcfe08b6d4e8072c8.exe"C:\Users\Admin\AppData\Local\Temp\03d2041f4bdd0d9bcfe08b6d4e8072c8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\net.exenet.exe share D=D:\2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share D=D:\3⤵PID:2932
-
-
-
C:\Windows\SysWOW64\qmdc.exeC:\Windows\system32\qmdc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net.exenet.exe share D=D:\3⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share D=D:\4⤵PID:1980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD503d2041f4bdd0d9bcfe08b6d4e8072c8
SHA1c988e3e36609ff22f7ddfbdc213a63161e8ab779
SHA256f006dfada0794c28c6d2f5fd4798e6bc1b1b6283a03c25a3f87c8fd7c205a1ba
SHA512f8d4bb4f907a37f93929c74398fd36a1904dec9db4c84068efe31c3f747f18081b07e833d2b64b6031b425b2b5840487afa64a2a9a4962b13d6e1c8b01ae5c77