Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 01:41
Behavioral task
behavioral1
Sample
Sql0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Sql0.exe
Resource
win10v2004-20231215-en
General
-
Target
Sql0.exe
-
Size
45KB
-
MD5
708ad1508c8e7a40520c5c8bee7f32be
-
SHA1
c17c7c8db1ec0c2d7e85d570267239ddcf5c5073
-
SHA256
b3119dc4cea05bef51d1f373b87d69bcff514f6575d4c92da4b1c557f8d8db8f
-
SHA512
a041861c43f53c6e416506c8c5d86fa56b59e60108912c4f27c8a52a268495a12041604fd3edd489e52879d73d3c97b41fabca48ac3b104c14d6995da74036d7
-
SSDEEP
768:uI0+FNeQT1ok/ILtq2FV5AY6t+ayph/bAUn26wriTJogrIyP85P85jaZV9VYnsQB:uI0eMCoHFVet+phX7lBF85EAaM1n10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 ccyqqw.exe -
resource yara_rule behavioral1/memory/2252-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2252-4-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-3-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/files/0x000a000000012255-2.dat upx behavioral1/memory/2704-5-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-6-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-8-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-10-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-12-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-13-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-15-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-16-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-17-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2704-18-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ccyqqw.exe Sql0.exe File opened for modification C:\Windows\ccyqqw.exe Sql0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ccyqqw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ccyqqw.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2252 Sql0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5708ad1508c8e7a40520c5c8bee7f32be
SHA1c17c7c8db1ec0c2d7e85d570267239ddcf5c5073
SHA256b3119dc4cea05bef51d1f373b87d69bcff514f6575d4c92da4b1c557f8d8db8f
SHA512a041861c43f53c6e416506c8c5d86fa56b59e60108912c4f27c8a52a268495a12041604fd3edd489e52879d73d3c97b41fabca48ac3b104c14d6995da74036d7