Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:54
Behavioral task
behavioral1
Sample
10776f2ad5cd6156fc01dd142fb131aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10776f2ad5cd6156fc01dd142fb131aa.exe
Resource
win10v2004-20231215-en
General
-
Target
10776f2ad5cd6156fc01dd142fb131aa.exe
-
Size
13KB
-
MD5
10776f2ad5cd6156fc01dd142fb131aa
-
SHA1
55948461ca43061781d000109aef386b25368082
-
SHA256
2cf74ef4b229b7cfa24eae3332e2d931c376e6356de66ef36f53fdd4213fc4b0
-
SHA512
22e97fb5d2ad7990a640cee953fa04bc19253596ddf8f4007105368aac9c8851322947a3fe66d53086b32746d57882947af43b59079a7121eefc0b25194df91a
-
SSDEEP
192:MPAbqPwwXPGM9ArsRJ+P6vpebqJ17cPbM7UxuFwA3ApuD:MP9PwwfF6QRJ+P6xX7cPg7UxXlp2
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 qonenxk.exe -
Loads dropped DLL 2 IoCs
pid Process 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 1744 10776f2ad5cd6156fc01dd142fb131aa.exe -
resource yara_rule behavioral1/memory/1744-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000014213-3.dat upx behavioral1/memory/2644-12-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1744-11-0x0000000000030000-0x000000000003F000-memory.dmp upx behavioral1/memory/1744-4-0x0000000000030000-0x000000000003F000-memory.dmp upx behavioral1/memory/1744-20-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\qonenx.dll 10776f2ad5cd6156fc01dd142fb131aa.exe File created C:\Windows\SysWOW64\qonenxk.exe 10776f2ad5cd6156fc01dd142fb131aa.exe File opened for modification C:\Windows\SysWOW64\qonenxk.exe 10776f2ad5cd6156fc01dd142fb131aa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2644 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 26 PID 1744 wrote to memory of 2644 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 26 PID 1744 wrote to memory of 2644 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 26 PID 1744 wrote to memory of 2644 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 26 PID 1744 wrote to memory of 2804 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 30 PID 1744 wrote to memory of 2804 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 30 PID 1744 wrote to memory of 2804 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 30 PID 1744 wrote to memory of 2804 1744 10776f2ad5cd6156fc01dd142fb131aa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\10776f2ad5cd6156fc01dd142fb131aa.exe"C:\Users\Admin\AppData\Local\Temp\10776f2ad5cd6156fc01dd142fb131aa.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\qonenxk.exeC:\Windows\system32\qonenxk.exe ˜‰2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\10776f2ad5cd6156fc01dd142fb131aa.exe.bat2⤵
- Deletes itself
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD508f7b6d47caad0c3e5bad4c2746e53ec
SHA16b899af7c15ab8aa22d69c968dca168e3960c76d
SHA256dc86617595ad764598ca923370a4333017513d6f14751b2e9e08d74c5b4e11c4
SHA512b2b5ba7327c48357081832c7fe757ebd5ee82a5a5dc5dc2fab9388eef444b5ca8342f3155b398a68202bb64e6f055e9d10bd81b891d75f23d1feb419ff91393e
-
Filesize
13KB
MD510776f2ad5cd6156fc01dd142fb131aa
SHA155948461ca43061781d000109aef386b25368082
SHA2562cf74ef4b229b7cfa24eae3332e2d931c376e6356de66ef36f53fdd4213fc4b0
SHA51222e97fb5d2ad7990a640cee953fa04bc19253596ddf8f4007105368aac9c8851322947a3fe66d53086b32746d57882947af43b59079a7121eefc0b25194df91a