Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
bbdba37afd102d63b6e0fba22d214697.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbdba37afd102d63b6e0fba22d214697.exe
Resource
win10v2004-20240226-en
General
-
Target
bbdba37afd102d63b6e0fba22d214697.exe
-
Size
2.3MB
-
MD5
bbdba37afd102d63b6e0fba22d214697
-
SHA1
d29a5a196ad23d6356b8fb9544f5ff6fa9d1da7e
-
SHA256
6005dc9e82cb5035a251dbde552ef5b773ab0caa6c960ce8c285b3274a1c2386
-
SHA512
67a987bcf2b90c65ce0a2827e536d0e460e02c0b30ce8bdf4221b9d4e37965be46d447aad48e4215f4b2a2e1a00e00a47bca242db0cb5e00e863ec575a06685c
-
SSDEEP
24576:zzIDvKM4LFPQFqf0ZF0x4GjaZsyfatttoGUcAMzxjBTDsuMj/Hgbplmua:zsjKM43f0ZFZStttoGUcAMzxjBTD9oaa
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" bbdba37afd102d63b6e0fba22d214697.exe -
Modifies registry class 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMDispatch.QMRoutine" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID\ = "{EBEB87A6-E151-4054-AB45-A6E094C5334B}" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\ = "QMDispatch.QMLibrary.Inner" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BBDBA3~1.EXE" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0} bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\CLSID bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\InprocHandler32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID\ = "{241D7F03-9232-4024-8373-149860BE27C0}" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary.Inner" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ = "QMDispatch.QMVBSRoutine" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B} bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ThreadingModel = "Apartment" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\ = "QMDispatch.QMVBSRoutine" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InprocServer32 bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\ = "QMDispatch.QMLibrary" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\BBDBA3~1.EXE" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ProgID bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary.Inner" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID\ = "{EBEB87A4-E151-4054-AB45-A6E094C5334B}" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\CLSID\ = "{EBEB87A5-E151-4054-AB45-A6E094C5334B}" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID\ = "QMDispatch.QMVBSRoutine" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\ = "QMDispatch.QMFunction" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMFunction" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMDispatch.QMRoutine" bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ThreadingModel = "Apartment" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B} bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC} bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ThreadingModel = "Apartment" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\LocalServer32 bbdba37afd102d63b6e0fba22d214697.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMFunction" bbdba37afd102d63b6e0fba22d214697.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID bbdba37afd102d63b6e0fba22d214697.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 bbdba37afd102d63b6e0fba22d214697.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2388 bbdba37afd102d63b6e0fba22d214697.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe 2388 bbdba37afd102d63b6e0fba22d214697.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbdba37afd102d63b6e0fba22d214697.exe"C:\Users\Admin\AppData\Local\Temp\bbdba37afd102d63b6e0fba22d214697.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD551b59a7143976846b945aad9822792c1
SHA15d09b7fdfea1066de3466d4b808e46f9de6f7d38
SHA2562ae0b744dd24675d8d01388f55a732d1b19e140d22cf42098d2c8e2eb198c446
SHA51277333338292206c96eb407ec921e76a9dc071a3612655c2c4108a33c87149afa71bf94aff151367eeb374fe1f44a062d6a23dabdc6832b84da3be967db3a0a12
-
Filesize
45KB
MD51479c26076bb69ef920b567bbe166fb5
SHA1725b96c0aa4d3ed117ab4f9ddedc5243b1b5b489
SHA256ec4f7a4bce0407f7d04492e036b149b5db0224231b8ecbb77eb88cf94507be3a
SHA512afad589f9c512ba40149a25055ec9beba761933a64aed3b10aa4263150adcfad7b0c93e94c173a97e446117f2b4006861914944856be1bf227b04ce6704068b3
-
Filesize
41KB
MD514d118d82f4223fb57b21539548d9980
SHA1a7c86fde656261f032a6cd8093cc429181a7542c
SHA256703de629ccd285ed9c70278a4015ad110cfcde6002fcf3c59f163c785d510f26
SHA512935a3a33d6644cee9281bd26d7fe86e4f5e2f89d359414a1367a5755e6a992975d3855e7b0c3bea9a9a607b6de8bf1e853796403537cf0f185edd9f9c6ae0f83