Analysis

  • max time kernel
    158s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 18:19

General

  • Target

    QQ大家来找茬外挂加强版V2.03.exe

  • Size

    601KB

  • MD5

    27cea473b56c0fecebc4d4756fb64d5b

  • SHA1

    bfd04ca59e2a8e1f938ef9b3eb72e0f8e7e553c2

  • SHA256

    8270751e48530dcf26bd4626472cc2ecf239b35764e780cb492a580c9214c280

  • SHA512

    41fff7006ef008e7e8f3fd8f667b6ce24972aa1e49ecc5cdbe2e3a0875aab614d9757e79ed25f2f13ecce53ff3cab0f2e366bb5d5f93f161c85ef7da30c31c3f

  • SSDEEP

    12288:t/jw08DCjKsuZ59obRC56BSDaqeKCXzlAQGFPdLM2AXOIwPm9:ZTjuj9obRC5oSDaPzlh49AqS

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQ大家来找茬外挂加强版V2.03.exe
    "C:\Users\Admin\AppData\Local\Temp\QQ大家来找茬外挂加强版V2.03.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://qqgame.qq.com/download.html
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8fa646f8,0x7ffd8fa64708,0x7ffd8fa64718
        3⤵
          PID:1068
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
          3⤵
            PID:3596
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1560
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
            3⤵
              PID:1308
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              3⤵
                PID:1320
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                3⤵
                  PID:4776
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1688140453106952930,4668330951307517191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1
                  3⤵
                    PID:4728
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2732
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:972

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          efc9c7501d0a6db520763baad1e05ce8

                          SHA1

                          60b5e190124b54ff7234bb2e36071d9c8db8545f

                          SHA256

                          7af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a

                          SHA512

                          bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          111B

                          MD5

                          285252a2f6327d41eab203dc2f402c67

                          SHA1

                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                          SHA256

                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                          SHA512

                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          778b1ad2ea73213a8c21d6c354c6863f

                          SHA1

                          7760ab6173185a9051002f9ca5a750947c8e88ed

                          SHA256

                          a2ca53e0c148e2aeb282f86eeaab6d2f1db2254a2cc1e0df822aecdd70776aea

                          SHA512

                          89a6d0b1be7638eefd359652281cf53944826101d21e5aec1294546459175bce3ff81de336e3b2cb22a0da5f9d1b9e48c1151403cb7f85fabceac8fe6b4f2b09

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          4c55c3ed58082a2b8b6a6909050c5e07

                          SHA1

                          fbc9d7686db73f69cdd47bbd036a5a2c5b999963

                          SHA256

                          b67ae1b8482a513229cb24786d4454852838024891958ae642635e651a1595b7

                          SHA512

                          321ddf556761667db9985fd519f2d8ba6ef46795ec4ac027298ecd6f8126e189bafd009b3837d81c66d214214a88b8f41bc337332726286b3292cdf1d4ecd224

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          121510c1483c9de9fdb590c20526ec0a

                          SHA1

                          96443a812fe4d3c522cfdbc9c95155e11939f4e2

                          SHA256

                          cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c

                          SHA512

                          b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c686074c-3ead-4282-aa28-71503ad67b50.tmp

                          Filesize

                          111B

                          MD5

                          807419ca9a4734feaf8d8563a003b048

                          SHA1

                          a723c7d60a65886ffa068711f1e900ccc85922a6

                          SHA256

                          aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                          SHA512

                          f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          2dc0b99004b8603e4eb7eb2e6381c50a

                          SHA1

                          886519ce8d1df60ea09ee0e531ad97171e80551a

                          SHA256

                          f56a49120828506c6706fc389c9697814491e4b9407a9f7da9e19fb5c8800f15

                          SHA512

                          22029a58547121c9e1eb570d6ea74ce36222865e554b872d6dae93f3881ec46b87859a5eba11704cf86778aa492237ebf85570cfffe70ee8a961ffa09a6a5dd2

                        • memory/5012-8-0x0000000000720000-0x0000000000721000-memory.dmp

                          Filesize

                          4KB

                        • memory/5012-7-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-30-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-6-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-0-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-5-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-4-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5012-3-0x0000000000720000-0x0000000000721000-memory.dmp

                          Filesize

                          4KB

                        • memory/5012-1-0x0000000000400000-0x0000000000509000-memory.dmp

                          Filesize

                          1.0MB