Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
7c08913f28e61d4e87b5f2bfde7780e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c08913f28e61d4e87b5f2bfde7780e4.exe
Resource
win10v2004-20231222-en
General
-
Target
7c08913f28e61d4e87b5f2bfde7780e4.exe
-
Size
70KB
-
MD5
7c08913f28e61d4e87b5f2bfde7780e4
-
SHA1
4a031c30ba68cae93e15e01ed87a105d08b6e4e3
-
SHA256
13c2774c0be72fde65990a8103ff941bdd14e223e207e72dfa37c7d3238792a7
-
SHA512
66f05bd0b12f15853f49c4d6afe346a715f9e70e4a4e6af7795af16a231fce574bd58554c3931b98e087d448ac1a765301f473bd28e37b10ec236dd647f32f7b
-
SSDEEP
768:db8ysuYQGbP8V09JZfth/gVcS+2yQ0dBSsFxQIb4mnnbTu8avuaT3TwnjcrUJnd3:poAufQuPnnb63vl3TwXJndzk6H
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 rund1132.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Tencent QQ = "Rund1132.exe qq.dll,Rundll32" 7c08913f28e61d4e87b5f2bfde7780e4.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\rund1132.exe rund1132.exe File created C:\Windows\rund1132.exe 7c08913f28e61d4e87b5f2bfde7780e4.exe File opened for modification C:\Windows\rund1132.exe 7c08913f28e61d4e87b5f2bfde7780e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2724 rund1132.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 7c08913f28e61d4e87b5f2bfde7780e4.exe 2724 rund1132.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2724 2348 7c08913f28e61d4e87b5f2bfde7780e4.exe 29 PID 2348 wrote to memory of 2724 2348 7c08913f28e61d4e87b5f2bfde7780e4.exe 29 PID 2348 wrote to memory of 2724 2348 7c08913f28e61d4e87b5f2bfde7780e4.exe 29 PID 2348 wrote to memory of 2724 2348 7c08913f28e61d4e87b5f2bfde7780e4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c08913f28e61d4e87b5f2bfde7780e4.exe"C:\Users\Admin\AppData\Local\Temp\7c08913f28e61d4e87b5f2bfde7780e4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\rund1132.exeC:\Windows\rund1132.exe "KILLQQ"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5827d70413e195dc999d2ab425d8710b3
SHA1fdf84789d7c26b7b5a6cee4d5a1e518dbad29e27
SHA256429e631274b4a0b831e77da1f427f3367caf164f68aa35e814604b1ea305b412
SHA5128a7a95f37c8c8c3033bdc05f664cb41156cb3cadaf5e7fa29b9f8baf7f72defabd35e89e2d3896aa846ead992764da8ce4cfb915960e96ac214d3e8f29e58057
-
Filesize
70KB
MD57c08913f28e61d4e87b5f2bfde7780e4
SHA14a031c30ba68cae93e15e01ed87a105d08b6e4e3
SHA25613c2774c0be72fde65990a8103ff941bdd14e223e207e72dfa37c7d3238792a7
SHA51266f05bd0b12f15853f49c4d6afe346a715f9e70e4a4e6af7795af16a231fce574bd58554c3931b98e087d448ac1a765301f473bd28e37b10ec236dd647f32f7b