Overview
overview
10Static
static
10ida.exe
windows7-x64
7ida.exe
windows10-2004-x64
7ida64.exe
windows7-x64
7ida64.exe
windows10-2004-x64
7idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7vcredist_x64.exe
windows7-x64
7vcredist_x64.exe
windows10-2004-x64
7Analysis
-
max time kernel
136s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 12:28
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
idat64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
idat64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
qwingraph.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
qwingraph.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
vcredist_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
vcredist_x64.exe
Resource
win10v2004-20231222-en
General
-
Target
unins000.exe
-
Size
705KB
-
MD5
2316bcc1094ec10c20760abcc3caa8d5
-
SHA1
c7f30c9fb2ccfb33dd963d14e4084d18f8a879b7
-
SHA256
56724658c2f142d3d3aa06e100b2a2c5ffd94b3472c02022bff9ebbaa30fdf4e
-
SHA512
d9310086ee13f322da752c8bd925812ab1ce99c94ff363e4870917aac4c663097226ca8b736ec03d97b6749fdf0c425776bfb0dfc3407c860eed00ba3d448f5d
-
SSDEEP
12288:jQhCh1/aLmSKrPD37zzH2A6QGgx/bsQeq9KgERkVfzrrNV4blc4/Nat/yxyRS:jQYh1yLmSKrPD37zzH2A6QD/InqggE20
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3572 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 3572 _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3572 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3572 2040 unins000.exe 87 PID 2040 wrote to memory of 3572 2040 unins000.exe 87 PID 2040 wrote to memory of 3572 2040 unins000.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\unins000.exe"C:\Users\Admin\AppData\Local\Temp\unins000.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\unins000.exe" /FIRSTPHASEWND=$500642⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD52316bcc1094ec10c20760abcc3caa8d5
SHA1c7f30c9fb2ccfb33dd963d14e4084d18f8a879b7
SHA25656724658c2f142d3d3aa06e100b2a2c5ffd94b3472c02022bff9ebbaa30fdf4e
SHA512d9310086ee13f322da752c8bd925812ab1ce99c94ff363e4870917aac4c663097226ca8b736ec03d97b6749fdf0c425776bfb0dfc3407c860eed00ba3d448f5d