Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 09:39
Behavioral task
behavioral1
Sample
b86bcfbb39d8d5925750b4255f104661.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b86bcfbb39d8d5925750b4255f104661.exe
Resource
win10v2004-20240226-en
General
-
Target
b86bcfbb39d8d5925750b4255f104661.exe
-
Size
15KB
-
MD5
b86bcfbb39d8d5925750b4255f104661
-
SHA1
f4b7661e3c914d2a4458def16757bb02bdc29373
-
SHA256
7bb292b78264b9e35eeea664767422b373bf40fab25893172195fd65dc8e7bd5
-
SHA512
70a95c56187d052ac3cd12d3646b98769d28e0ea5c8dcc850283117b43fba0d782ac22f9dc94ae8e8c015e9e65525770474e28473771e7ca17c5825cbfb85d80
-
SSDEEP
384:G5g3PLUTLk/FG5ddtacu3firPHqP3IS9dg+cluZv9+A:+g3PLR/FDnPqPKP3If+cc1
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2456 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 qanhllaok.exe -
Loads dropped DLL 2 IoCs
pid Process 1712 b86bcfbb39d8d5925750b4255f104661.exe 1712 b86bcfbb39d8d5925750b4255f104661.exe -
resource yara_rule behavioral1/memory/1712-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000b000000014e3d-3.dat upx behavioral1/memory/1712-4-0x0000000000230000-0x0000000000240000-memory.dmp upx behavioral1/memory/2668-11-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1712-12-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2668-13-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\qanhllao.dll b86bcfbb39d8d5925750b4255f104661.exe File created C:\Windows\SysWOW64\qanhllaok.exe b86bcfbb39d8d5925750b4255f104661.exe File opened for modification C:\Windows\SysWOW64\qanhllaok.exe b86bcfbb39d8d5925750b4255f104661.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2668 1712 b86bcfbb39d8d5925750b4255f104661.exe 28 PID 1712 wrote to memory of 2668 1712 b86bcfbb39d8d5925750b4255f104661.exe 28 PID 1712 wrote to memory of 2668 1712 b86bcfbb39d8d5925750b4255f104661.exe 28 PID 1712 wrote to memory of 2668 1712 b86bcfbb39d8d5925750b4255f104661.exe 28 PID 1712 wrote to memory of 2456 1712 b86bcfbb39d8d5925750b4255f104661.exe 31 PID 1712 wrote to memory of 2456 1712 b86bcfbb39d8d5925750b4255f104661.exe 31 PID 1712 wrote to memory of 2456 1712 b86bcfbb39d8d5925750b4255f104661.exe 31 PID 1712 wrote to memory of 2456 1712 b86bcfbb39d8d5925750b4255f104661.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe"C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\qanhllaok.exeC:\Windows\system32\qanhllaok.exe ˜‰2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe.bat2⤵
- Deletes itself
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD59c4aec83b2402748f400a5aeabd1a259
SHA190b05fe042143b2fbb5e8facdf7da29ec02e1903
SHA2568ec7717d058f9d27124e5aa2d782744edd60a5117153790b6b134c559d5986b2
SHA512f2c86dd7ac4366d20a9c8a82e58077abf294349cbd287ca4ee7b268ed05b35424c08d02af27c9ab7736adeed0afd4e6c9c31126910f91fe72e8f696f602d8b11
-
Filesize
15KB
MD5b86bcfbb39d8d5925750b4255f104661
SHA1f4b7661e3c914d2a4458def16757bb02bdc29373
SHA2567bb292b78264b9e35eeea664767422b373bf40fab25893172195fd65dc8e7bd5
SHA51270a95c56187d052ac3cd12d3646b98769d28e0ea5c8dcc850283117b43fba0d782ac22f9dc94ae8e8c015e9e65525770474e28473771e7ca17c5825cbfb85d80