Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 09:39
Behavioral task
behavioral1
Sample
b86bcfbb39d8d5925750b4255f104661.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b86bcfbb39d8d5925750b4255f104661.exe
Resource
win10v2004-20240226-en
General
-
Target
b86bcfbb39d8d5925750b4255f104661.exe
-
Size
15KB
-
MD5
b86bcfbb39d8d5925750b4255f104661
-
SHA1
f4b7661e3c914d2a4458def16757bb02bdc29373
-
SHA256
7bb292b78264b9e35eeea664767422b373bf40fab25893172195fd65dc8e7bd5
-
SHA512
70a95c56187d052ac3cd12d3646b98769d28e0ea5c8dcc850283117b43fba0d782ac22f9dc94ae8e8c015e9e65525770474e28473771e7ca17c5825cbfb85d80
-
SSDEEP
384:G5g3PLUTLk/FG5ddtacu3firPHqP3IS9dg+cluZv9+A:+g3PLR/FDnPqPKP3If+cc1
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1988 qanhllaok.exe -
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x000800000002320b-4.dat upx behavioral2/memory/4744-6-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/1988-7-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\qanhllao.dll b86bcfbb39d8d5925750b4255f104661.exe File created C:\Windows\SysWOW64\qanhllaok.exe b86bcfbb39d8d5925750b4255f104661.exe File opened for modification C:\Windows\SysWOW64\qanhllaok.exe b86bcfbb39d8d5925750b4255f104661.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1988 4744 b86bcfbb39d8d5925750b4255f104661.exe 87 PID 4744 wrote to memory of 1988 4744 b86bcfbb39d8d5925750b4255f104661.exe 87 PID 4744 wrote to memory of 1988 4744 b86bcfbb39d8d5925750b4255f104661.exe 87 PID 4744 wrote to memory of 3232 4744 b86bcfbb39d8d5925750b4255f104661.exe 100 PID 4744 wrote to memory of 3232 4744 b86bcfbb39d8d5925750b4255f104661.exe 100 PID 4744 wrote to memory of 3232 4744 b86bcfbb39d8d5925750b4255f104661.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe"C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\qanhllaok.exeC:\Windows\system32\qanhllaok.exe ˜‰2⤵
- Executes dropped EXE
PID:1988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b86bcfbb39d8d5925750b4255f104661.exe.bat2⤵PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD59c4aec83b2402748f400a5aeabd1a259
SHA190b05fe042143b2fbb5e8facdf7da29ec02e1903
SHA2568ec7717d058f9d27124e5aa2d782744edd60a5117153790b6b134c559d5986b2
SHA512f2c86dd7ac4366d20a9c8a82e58077abf294349cbd287ca4ee7b268ed05b35424c08d02af27c9ab7736adeed0afd4e6c9c31126910f91fe72e8f696f602d8b11
-
Filesize
15KB
MD5b86bcfbb39d8d5925750b4255f104661
SHA1f4b7661e3c914d2a4458def16757bb02bdc29373
SHA2567bb292b78264b9e35eeea664767422b373bf40fab25893172195fd65dc8e7bd5
SHA51270a95c56187d052ac3cd12d3646b98769d28e0ea5c8dcc850283117b43fba0d782ac22f9dc94ae8e8c015e9e65525770474e28473771e7ca17c5825cbfb85d80