Analysis

  • max time kernel
    0s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 08:35

General

  • Target

    QLCai.exe

  • Size

    4.3MB

  • MD5

    2b25f6a9806d2538f2e0207feac8872c

  • SHA1

    d1a04bef387032d0ebd5e35aec7583d748d48568

  • SHA256

    c38e45bcf35206fc74a3d4e6e29377156e5c31af1f3085904c216a32c6305df4

  • SHA512

    02e13d15783eb9a4d2a17365d2e6c25d2adcd83146a321167ab0477773c7e5c7796a61ad4bfb936358a921e3c9082c5bc16c257b0c6d9f79497d65e6e6c16cae

  • SSDEEP

    98304:5+a6JLjH3dutXJSTP/sAQvA3W2nm+06ZANcu5ej60RZHcZNK3:5+3Jn3wOTPlQ8tm+0OImWIZf3

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\QLCai.exe
    "C:\Users\Admin\AppData\Local\Temp\QLCai.exe"
    1⤵
    • Checks computer location settings
    PID:4732
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:653858 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\QLCai.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-3803511929-1339359695-2191195476-1000"
      2⤵
        PID:2172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

      Filesize

      92KB

      MD5

      d8a67e88d92f2f5ed1dad2a9060cdf14

      SHA1

      e526c6fa48255b1af191854529e89ba274371675

      SHA256

      cad6b07f981610cc392842af500cba889af06463cdf601f92f2ef3a67a369ef9

      SHA512

      9d3ed901ce8bae4dbb00ccbaede02c412dfb5953177ee7ec3d992b21a9dc7a87578b08f5cde2a5aca3d369c6c8f502c61b1676e4f9cbbd7e33f154ad8e8d871c

    • memory/2172-11-0x0000000000400000-0x000000000057E000-memory.dmp

      Filesize

      1.5MB

    • memory/2172-22-0x0000000000400000-0x000000000057E000-memory.dmp

      Filesize

      1.5MB