Overview
overview
10Static
static
10ida.exe
windows7-x64
7ida.exe
windows10-2004-x64
7ida64.exe
windows7-x64
7ida64.exe
windows10-2004-x64
7idat64.exe
windows7-x64
1idat64.exe
windows10-2004-x64
1qwingraph.exe
windows7-x64
1qwingraph.exe
windows10-2004-x64
1unins000.exe
windows7-x64
7unins000.exe
windows10-2004-x64
7vcredist_x64.exe
windows7-x64
7vcredist_x64.exe
windows10-2004-x64
7Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 12:28
Behavioral task
behavioral1
Sample
ida.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ida.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ida64.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ida64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
idat64.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
idat64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
qwingraph.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
qwingraph.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
unins000.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
unins000.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
vcredist_x64.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
vcredist_x64.exe
Resource
win10v2004-20231222-en
General
-
Target
unins000.exe
-
Size
705KB
-
MD5
2316bcc1094ec10c20760abcc3caa8d5
-
SHA1
c7f30c9fb2ccfb33dd963d14e4084d18f8a879b7
-
SHA256
56724658c2f142d3d3aa06e100b2a2c5ffd94b3472c02022bff9ebbaa30fdf4e
-
SHA512
d9310086ee13f322da752c8bd925812ab1ce99c94ff363e4870917aac4c663097226ca8b736ec03d97b6749fdf0c425776bfb0dfc3407c860eed00ba3d448f5d
-
SSDEEP
12288:jQhCh1/aLmSKrPD37zzH2A6QGgx/bsQeq9KgERkVfzrrNV4blc4/Nat/yxyRS:jQYh1yLmSKrPD37zzH2A6QD/InqggE20
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1028 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 1028 _iu14D2N.tmp -
Loads dropped DLL 1 IoCs
pid Process 2340 unins000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28 PID 2340 wrote to memory of 1028 2340 unins000.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\unins000.exe"C:\Users\Admin\AppData\Local\Temp\unins000.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\unins000.exe" /FIRSTPHASEWND=$701F42⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD52316bcc1094ec10c20760abcc3caa8d5
SHA1c7f30c9fb2ccfb33dd963d14e4084d18f8a879b7
SHA25656724658c2f142d3d3aa06e100b2a2c5ffd94b3472c02022bff9ebbaa30fdf4e
SHA512d9310086ee13f322da752c8bd925812ab1ce99c94ff363e4870917aac4c663097226ca8b736ec03d97b6749fdf0c425776bfb0dfc3407c860eed00ba3d448f5d