Analysis
-
max time kernel
42s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2023 15:31
Static task
static1
Behavioral task
behavioral1
Sample
b4a26290880d3fb80df39f433ebb0490.exe
Resource
win7-20231129-en
General
-
Target
b4a26290880d3fb80df39f433ebb0490.exe
-
Size
2.6MB
-
MD5
b4a26290880d3fb80df39f433ebb0490
-
SHA1
68e61782384bac82a8b2fbbac8958a1a5dd3fe5d
-
SHA256
49568dbced141895672057dc8244ce926ba027f7d04915a3a8504584f56b2c87
-
SHA512
96438799bcf1a79f992ddd11ecedb7101a0c816b1eff1db78f2c1b48239a110a08860a1ff0f36aad883332cbb3ff690a842478dd4dffb5a94f35082404ba2182
-
SSDEEP
49152:YCqoHMDzSvPB+6y3im0rc56ErvHHxjLH1yzJo9pPHq8jhWEgTi:YLosavPB9Frc56EjHxjLH1GipPN8Er
Malware Config
Extracted
bitrat
1.35
storage.nsupdate.info:8973
-
communication_password
bf771c9d082071fe80b18bb678220682
-
tor_process
tor
Signatures
-
resource yara_rule behavioral2/memory/3848-115-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-121-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-122-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-124-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-126-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-127-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-125-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-128-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-123-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-142-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-145-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3848-144-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4020 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a26290880d3fb80df39f433ebb0490.exe"C:\Users\Admin\AppData\Local\Temp\b4a26290880d3fb80df39f433ebb0490.exe"1⤵PID:4988
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\b4a26290880d3fb80df39f433ebb0490.exe"2⤵PID:4520
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QhNsxxGtGmp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF906.tmp"2⤵
- Creates scheduled task(s)
PID:4020
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QhNsxxGtGmp.exe"2⤵PID:1484
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2456
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QhNsxxGtGmp.exe"2⤵PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD50821c1e02c0b9bb8ff86e48f8c9d2e28
SHA1b5815a251f37deeb4b8ced52f3a59937e525f33e
SHA2568704d51103dcc17f13e5a5e258bd22f0e5f238dd691d55c6624583bb3d84da44
SHA5127336a2d6e20be79b9b3dd0a0ebc20c31fda94c0d9fbd499b5f2f2d067530da89e1ccc3848e7ac02d82ce051d2840fac108b763a3cf06dd86401588f0aad07e32
-
Filesize
18KB
MD527bc229296b203be28ce24c95980e4f2
SHA1164c55177a1b3a9d64fcf20120f2eb4a30e26cec
SHA25666c94f867b49d0b3d389883e56e3c07cb95a28bb3f48c72897c5b453d4484082
SHA512ce7b98f1180f1485aa247096a0081eae5110ef6c26f9f6a6235693c7dadeba018419e5e0f9bb68b3f7d2053cda941bdf053d723eacfc87c4f1c00aa935f5752b