Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
ad8a49824630d91ddae5ff9d5536baac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad8a49824630d91ddae5ff9d5536baac.exe
Resource
win10v2004-20240226-en
General
-
Target
ad8a49824630d91ddae5ff9d5536baac.exe
-
Size
55KB
-
MD5
ad8a49824630d91ddae5ff9d5536baac
-
SHA1
0537059762b5255eeee2eb2a1197d5aefb88d67a
-
SHA256
7d50472a10425b4ffd66e4c8911368dc90e28fd24fab60147328031c2cb2efae
-
SHA512
5b12ec78336a83370197babeb55f56e4298f8405f61d9a9cedb6f25fb4a86b9ccd4356747bbea9c9325e7fccf3cf87cd908eb092b278cb6f8f98818dedfd17e9
-
SSDEEP
1536:nABhoTo2nKSsIuvMSEzeUFZevSRmO1iP:nALMv/s1vBEzeU3evSRmtP
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys XinQQ.exe File created C:\Windows\SysWOW64\drivers\Beep.sys ad8a49824630d91ddae5ff9d5536baac.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys ad8a49824630d91ddae5ff9d5536baac.exe -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2360 XinQQ.exe -
Loads dropped DLL 4 IoCs
pid Process 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 2360 XinQQ.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\XinQQ.exe ad8a49824630d91ddae5ff9d5536baac.exe File created C:\Windows\SysWOW64\XinQQ.exe ad8a49824630d91ddae5ff9d5536baac.exe File opened for modification C:\Windows\SysWOW64\XinQQ.exe XinQQ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe 1912 ad8a49824630d91ddae5ff9d5536baac.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe Token: SeDebugPrivilege 1912 ad8a49824630d91ddae5ff9d5536baac.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2360 1912 ad8a49824630d91ddae5ff9d5536baac.exe 28 PID 1912 wrote to memory of 2360 1912 ad8a49824630d91ddae5ff9d5536baac.exe 28 PID 1912 wrote to memory of 2360 1912 ad8a49824630d91ddae5ff9d5536baac.exe 28 PID 1912 wrote to memory of 2360 1912 ad8a49824630d91ddae5ff9d5536baac.exe 28 PID 2360 wrote to memory of 2636 2360 XinQQ.exe 29 PID 2360 wrote to memory of 2636 2360 XinQQ.exe 29 PID 2360 wrote to memory of 2636 2360 XinQQ.exe 29 PID 2360 wrote to memory of 2636 2360 XinQQ.exe 29 PID 1912 wrote to memory of 2540 1912 ad8a49824630d91ddae5ff9d5536baac.exe 31 PID 1912 wrote to memory of 2540 1912 ad8a49824630d91ddae5ff9d5536baac.exe 31 PID 1912 wrote to memory of 2540 1912 ad8a49824630d91ddae5ff9d5536baac.exe 31 PID 1912 wrote to memory of 2540 1912 ad8a49824630d91ddae5ff9d5536baac.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8a49824630d91ddae5ff9d5536baac.exe"C:\Users\Admin\AppData\Local\Temp\ad8a49824630d91ddae5ff9d5536baac.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\XinQQ.exeC:\Windows\system32\XinQQ.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~wohd!.BAt3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\~lqwu!.BAt2⤵
- Deletes itself
PID:2540
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD57f911abb66e8894bc9887ffb9bc788f0
SHA1be56f8c3ea4697ff7089a123efbce1ecf76dc94d
SHA256deaf98526c950504d0058b99615c3bf7c13a82e502cbdf28faba3172ab08a775
SHA512f2f69513936a0ecfb3766b097ef45506f9f8dcd6a77fa5190872406cf6d8bf9f72f1389ddad99aa46b42ccfcf607910378760226e4de2fe6e6040debb82b49f7
-
Filesize
132B
MD5d6ab2fb510aa1bb7197af441a8a7034a
SHA1c89ce27138003865659d005ee8f329a1e1bda942
SHA256f9a6e0f59646f4d01890ce89c81e305e9a5dc5e4e9a927abdb4a2a4770c6e8fc
SHA512ffd60dbd89feddc2475cc946354dbd79d97ff85c49c998ff4ade9e6637f6b5b1301392baafe2d42e62eec724b926a8a0a1cb13b52f845d958f1acbb5cd2d21cf
-
Filesize
3KB
MD5985f9333cfedc06015fd762b3a237ef4
SHA1c0bdcd8f7390b6cf73cf0409f920b345086b08d0
SHA256a216924f0022b48ec06218c1519dfbe7c4f27bb2dc18b8055055376b42c16a79
SHA51225abba00fbfb6e70cdece60b9a899ce44e18447612e8cdea8f1499fb6ddff9a769dd68efdf060e8f3d16d6701a5f3c1768b4423846b1f5937753312d557d306d
-
Filesize
55KB
MD5ad8a49824630d91ddae5ff9d5536baac
SHA10537059762b5255eeee2eb2a1197d5aefb88d67a
SHA2567d50472a10425b4ffd66e4c8911368dc90e28fd24fab60147328031c2cb2efae
SHA5125b12ec78336a83370197babeb55f56e4298f8405f61d9a9cedb6f25fb4a86b9ccd4356747bbea9c9325e7fccf3cf87cd908eb092b278cb6f8f98818dedfd17e9