Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
74d95eb5febfe1709f52bb31396f2e44.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
74d95eb5febfe1709f52bb31396f2e44.exe
Resource
win10v2004-20231222-en
General
-
Target
74d95eb5febfe1709f52bb31396f2e44.exe
-
Size
345KB
-
MD5
74d95eb5febfe1709f52bb31396f2e44
-
SHA1
4c5eabd409d14a86300f867c96f95bc75ee9c96b
-
SHA256
e8933217625e12a0415b5a55c655fd6b8adb47cbf5d736e9b86dd794591ca12e
-
SHA512
8819e73e3b1646ce311b8532d2765cc64c2ccb888c374cdbf373ddc7bfbf1f9c4715dce4af1e5932ec55265e8efac54285c82c3047104faf2ce9c001f3e6a3b9
-
SSDEEP
6144:R4MYTVm+f4lCEV5Pk9Ioaa0vWlH4PGv86TJJAI7aa/0LnApF:R+4l/jMq9a6Wfv86TJJAIOa0nAX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3056 pcqumy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\288A6CE9 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pcqumy.exe" 74d95eb5febfe1709f52bb31396f2e44.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: pcqumy.exe File opened (read-only) \??\B: pcqumy.exe File opened (read-only) \??\K: pcqumy.exe File opened (read-only) \??\L: pcqumy.exe File opened (read-only) \??\V: pcqumy.exe File opened (read-only) \??\Z: pcqumy.exe File opened (read-only) \??\E: pcqumy.exe File opened (read-only) \??\Q: pcqumy.exe File opened (read-only) \??\R: pcqumy.exe File opened (read-only) \??\S: pcqumy.exe File opened (read-only) \??\P: pcqumy.exe File opened (read-only) \??\T: pcqumy.exe File opened (read-only) \??\U: pcqumy.exe File opened (read-only) \??\H: pcqumy.exe File opened (read-only) \??\I: pcqumy.exe File opened (read-only) \??\M: pcqumy.exe File opened (read-only) \??\N: pcqumy.exe File opened (read-only) \??\X: pcqumy.exe File opened (read-only) \??\Y: pcqumy.exe File opened (read-only) \??\G: pcqumy.exe File opened (read-only) \??\J: pcqumy.exe File opened (read-only) \??\O: pcqumy.exe File opened (read-only) \??\W: pcqumy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\AA594164 = "3915784022" pcqumy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74d95eb5febfe1709f52bb31396f2e44.exe"C:\Users\Admin\AppData\Local\Temp\74d95eb5febfe1709f52bb31396f2e44.exe"1⤵
- Adds Run key to start application
PID:2360
-
C:\Users\Admin\AppData\Local\Temp\pcqumy.exeC:\Users\Admin\AppData\Local\Temp\pcqumy.exe -svc1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies Internet Explorer settings
PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD574d95eb5febfe1709f52bb31396f2e44
SHA14c5eabd409d14a86300f867c96f95bc75ee9c96b
SHA256e8933217625e12a0415b5a55c655fd6b8adb47cbf5d736e9b86dd794591ca12e
SHA5128819e73e3b1646ce311b8532d2765cc64c2ccb888c374cdbf373ddc7bfbf1f9c4715dce4af1e5932ec55265e8efac54285c82c3047104faf2ce9c001f3e6a3b9