Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
0546a54f8496b237676fc4d76a118be6.exe
Resource
win7-20231215-en
General
-
Target
0546a54f8496b237676fc4d76a118be6.exe
-
Size
560KB
-
MD5
0546a54f8496b237676fc4d76a118be6
-
SHA1
e40ab389fc60b78f22cb40be854e1a0cedbc9e44
-
SHA256
10bea2ef88b743fbea832b3061db6a3738c6e62443073abebdd64867e624fad0
-
SHA512
95444e63888284a447f59882046d8906ccec0a56d971fa612c85d1d0a6b17905b60d1e6a2041c8d922c06853a89fb8e60e6cb94bfd412d6336221ce1ccc731a0
-
SSDEEP
12288:2lSaGklFSnYZQjKh4U+jSdeX5eK9cpcUBp:2pD4YZMJO6kK9chr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5072 qhc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy qhc.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini qhc.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol qhc.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI qhc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3120 wrote to memory of 5072 3120 0546a54f8496b237676fc4d76a118be6.exe 21 PID 3120 wrote to memory of 5072 3120 0546a54f8496b237676fc4d76a118be6.exe 21 PID 3120 wrote to memory of 5072 3120 0546a54f8496b237676fc4d76a118be6.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\0546a54f8496b237676fc4d76a118be6.exe"C:\Users\Admin\AppData\Local\Temp\0546a54f8496b237676fc4d76a118be6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\57bc6571\qhc.exe"C:\Users\Admin\AppData\Local\Temp/57bc6571/qhc.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5072
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5cc50921afdb646bdc854abc7df07a09e
SHA17ba97552c9123ecbd00ab627b3cbbcf5be1f13f5
SHA25600eb1e2da9c2a5e9d4d0b9cd107385abee8b09a44846be4fb534618cd741551c
SHA5124ec8ed57d25168bd93073c1f3c732c2976a46d4b37d2b33746198970c2ff4b56f31cd58d2ed05a12e343ec19c5a60ba3c36408a3956de2a78678dfb564aeb1a6
-
Filesize
740B
MD59215381d271d8b5d79ae43412e30e21b
SHA17241a2058eb758a382d1882878b5e7388973628b
SHA256fa0aa10c58608c35677066d79d64102edd6c06ff5979a5078ce9445ae41b5640
SHA51284321cc167550d099a09148966b202e56256968ae3720d5f9264328bdc909962f8a03d417f95f91cb8e79fc7933612c68a301af4afb55067ecf0ed2701df17c8
-
Filesize
409KB
MD5ef38514253e4dafb6823f236bc47bb5f
SHA1458a7dcb3c85cbe3c93eb7876fa0e6cd7e07f0f6
SHA2564c1f4446576780b1d9ebd6f3cb653375aacfe3fd37e542ab4d4f3616db82475e
SHA512853b8a5467d9c3800334807c0c0d558d4b42d201bb19927d10ab391d1ddad93abbbed8612f8d243362cfa2e0cb53f81610f68040db7ba554886b06fc6befe43f
-
Filesize
91KB
MD5004f3092630b29341cd0ace06f879780
SHA1a41c9ee439f6b36dd0b2046860252497e8c00acd
SHA256511d93d6bfe3cc8e211e372b6eed2867dcae6971ace90be12aa371b8e1c69d01
SHA512186349ad4be4b55027276ac942d48a2f69b4156a13d298f900c4a013aaf3bb9d3f6a48c4dd3c0a73b499fd7c575d9b156eaeac43f5c3c8d9942bbadaf04283ec