Overview
overview
7Static
static
1WPLOCKER.COM.url
windows7-x64
6WPLOCKER.COM.url
windows10-2004-x64
3qalam/asse...ml5.js
windows7-x64
1qalam/asse...ml5.js
windows10-2004-x64
1qalam/asse...end.js
windows7-x64
1qalam/asse...end.js
windows10-2004-x64
1qalam/asse...00.ttf
windows7-x64
3qalam/asse...00.ttf
windows10-2004-x64
7qalam/asse....woff2
windows7-x64
3qalam/asse....woff2
windows10-2004-x64
3qalam/asse...00.ttf
windows7-x64
3qalam/asse...00.ttf
windows10-2004-x64
7qalam/asse....woff2
windows7-x64
3qalam/asse....woff2
windows10-2004-x64
3qalam/asse...00.ps1
windows7-x64
1qalam/asse...00.ps1
windows10-2004-x64
1qalam/incl...umb.js
windows7-x64
1qalam/incl...umb.js
windows10-2004-x64
1qalam/incl...on.ps1
windows7-x64
1qalam/incl...on.ps1
windows10-2004-x64
1qalam/lang...am.pot
windows7-x64
1qalam/lang...am.pot
windows10-2004-x64
1wp-post-mo...min.js
windows7-x64
1wp-post-mo...min.js
windows10-2004-x64
1wp-post-mo...min.js
windows7-x64
1wp-post-mo...min.js
windows10-2004-x64
1wp-post-mo...min.js
windows7-x64
1wp-post-mo...min.js
windows10-2004-x64
1wp-post-mo...end.js
windows7-x64
1wp-post-mo...end.js
windows10-2004-x64
1wp-post-mo...min.js
windows7-x64
1wp-post-mo...min.js
windows10-2004-x64
1Analysis
-
max time kernel
86s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
WPLOCKER.COM.url
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
WPLOCKER.COM.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
qalam/assets/js/html5.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
qalam/assets/js/html5.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
qalam/assets/js/qalam.frontend.js
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
qalam/assets/js/qalam.frontend.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
qalam/assets/webfonts/fa-brands-400.ttf
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
qalam/assets/webfonts/fa-brands-400.ttf
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
qalam/assets/webfonts/fa-brands-400.woff2
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
qalam/assets/webfonts/fa-brands-400.woff2
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
qalam/assets/webfonts/fa-regular-400.ttf
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
qalam/assets/webfonts/fa-regular-400.ttf
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
qalam/assets/webfonts/fa-regular-400.woff2
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
qalam/assets/webfonts/fa-regular-400.woff2
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
qalam/assets/webfonts/fa-solid-900.ps1
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
qalam/assets/webfonts/fa-solid-900.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
qalam/includes/bfi_thumb.js
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
qalam/includes/bfi_thumb.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
qalam/includes/class-tgm-plugin-activation.ps1
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
qalam/includes/class-tgm-plugin-activation.ps1
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
qalam/languages/qalam.pot
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
qalam/languages/qalam.pot
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
wp-post-modules-el/assets/js/jquery.easing.min.js
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
wp-post-modules-el/assets/js/jquery.easing.min.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral25
Sample
wp-post-modules-el/assets/js/jquery.marquee.min.js
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
wp-post-modules-el/assets/js/jquery.marquee.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
wp-post-modules-el/assets/js/owl.carousel.min.js
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
wp-post-modules-el/assets/js/owl.carousel.min.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
wp-post-modules-el/assets/js/wppm-el.frontend.js
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
wp-post-modules-el/assets/js/wppm-el.frontend.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral31
Sample
wp-post-modules-el/assets/js/wppm-el.frontend.min.js
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
wp-post-modules-el/assets/js/wppm-el.frontend.min.js
Resource
win10v2004-20231222-en
General
-
Target
qalam/languages/qalam.pot
-
Size
33KB
-
MD5
8b9aa544fd43bd1af4c306ae04b2645d
-
SHA1
ee35c0f4b56da059b64087f505937ef5c949e2db
-
SHA256
b1fe8519112cad19ea3828e3e49d3d6442e7821151c1119c5f526538f71f1dcf
-
SHA512
d031619cd8595e73613965e05641f6a29769bbb3a3c529f84221cca5fc0829a10de2075fb3210a12148a24826aa87478b6e5fe743b70684b3b41a14304e966f6
-
SSDEEP
192:r3w/5NHl3lSFFlkcUCQZKV++3pBRlZPd/AOFZjm+kLl3oICf9RYCak+pi+j4JA+n:r3wib6BZoVPvZ9IChCpzjmNpyTe
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 3776 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
POWERPNT.EXEpid process 3776 POWERPNT.EXE 3776 POWERPNT.EXE 3776 POWERPNT.EXE 3776 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\qalam\languages\qalam.pot" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3776