Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 01:41

General

  • Target

    Sql0.exe

  • Size

    45KB

  • MD5

    708ad1508c8e7a40520c5c8bee7f32be

  • SHA1

    c17c7c8db1ec0c2d7e85d570267239ddcf5c5073

  • SHA256

    b3119dc4cea05bef51d1f373b87d69bcff514f6575d4c92da4b1c557f8d8db8f

  • SHA512

    a041861c43f53c6e416506c8c5d86fa56b59e60108912c4f27c8a52a268495a12041604fd3edd489e52879d73d3c97b41fabca48ac3b104c14d6995da74036d7

  • SSDEEP

    768:uI0+FNeQT1ok/ILtq2FV5AY6t+ayph/bAUn26wriTJogrIyP85P85jaZV9VYnsQB:uI0eMCoHFVet+phX7lBF85EAaM1n10

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Sql0.exe
    "C:\Users\Admin\AppData\Local\Temp\Sql0.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    PID:2252
  • C:\Windows\ccyqqw.exe
    C:\Windows\ccyqqw.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\ccyqqw.exe

          Filesize

          45KB

          MD5

          708ad1508c8e7a40520c5c8bee7f32be

          SHA1

          c17c7c8db1ec0c2d7e85d570267239ddcf5c5073

          SHA256

          b3119dc4cea05bef51d1f373b87d69bcff514f6575d4c92da4b1c557f8d8db8f

          SHA512

          a041861c43f53c6e416506c8c5d86fa56b59e60108912c4f27c8a52a268495a12041604fd3edd489e52879d73d3c97b41fabca48ac3b104c14d6995da74036d7

        • memory/2252-4-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2252-0-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-8-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-5-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-6-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-3-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-10-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-12-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-13-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-15-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-16-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-17-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2704-18-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB