Analysis
-
max time kernel
149s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
qqsmg.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
qqsmg.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
飓风破解中心-首页.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
飓风破解中心-首页.url
Resource
win10v2004-20231222-en
General
-
Target
qqsmg.exe
-
Size
3.4MB
-
MD5
41a1ddf5e2507c3445a5572f3c6eb4fa
-
SHA1
2ba47d70605fe29992ecfd6f54b7efa005f0f42f
-
SHA256
764817516e65a8b61a3ebb279fa904a9f40a24e2ecf286da0abac2a85cecead3
-
SHA512
adaa6290c11cc571138ee062d880bd1c77e3f1caecf44e1e3bd02c2f27713ad52c22b02a1dc3091b17d3cfe124503f21dac7b4a08defcd55bffde845b167db80
-
SSDEEP
49152:yiHOtOP3IM/fLjlji1568/b6W3saaaRHVI/q3PLrkPe2snOPiH42YHIxx4Euh41Y:yiJnl2L68/b6W3PXeijrkPe26Yb+ZxI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5080 is-KOEN1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 5080 4952 qqsmg.exe 21 PID 4952 wrote to memory of 5080 4952 qqsmg.exe 21 PID 4952 wrote to memory of 5080 4952 qqsmg.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\qqsmg.exe"C:\Users\Admin\AppData\Local\Temp\qqsmg.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\is-2U8KT.tmp\is-KOEN1.tmp"C:\Users\Admin\AppData\Local\Temp\is-2U8KT.tmp\is-KOEN1.tmp" /SL4 $6006C "C:\Users\Admin\AppData\Local\Temp\qqsmg.exe" 3342283 522242⤵
- Executes dropped EXE
PID:5080
-