Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 21:02

General

  • Target

    c6d96522d4ec2f190d783083513be193.exe

  • Size

    260KB

  • MD5

    c6d96522d4ec2f190d783083513be193

  • SHA1

    630c4e72a384a12ae4ca79558679080749310041

  • SHA256

    3c9a3cf11c17e7d446098180be000f0e06c9c4509bcb1499047c2ca7ba723d69

  • SHA512

    cadc28bf9f0e13d177e1ea63e48fbe45d5aa360942437ccde1733b9d0f14708865667b91241b403f0191efb7b4fb26c216835a31dfac8553d33bc5fa53155808

  • SSDEEP

    6144:x4HSAtOUUp7WQn6mr1R4bKLnXejKloO6JU1J7QnpRZ7Ta9kzU2/pn:xkSAt4p6Qn6mr1R4bKLnXaKaO6O1JApv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d96522d4ec2f190d783083513be193.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d96522d4ec2f190d783083513be193.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Users\Admin\qkdiis.exe
      "C:\Users\Admin\qkdiis.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qkdiis.exe

    Filesize

    260KB

    MD5

    36e563d675de34487d26540e6c356aa0

    SHA1

    6b512ab909eaaaa35b5acfacc943211833ffe544

    SHA256

    523a57c37b66b50212b947ee46f28d5a5e024b97f03b0856d63eadbe66669168

    SHA512

    611c4d959e3db28aab699ba47e7bf532dc8e0997ad4ff283249da81fbb4361d3744a543f5fffc6409f1f9d0dcb907a2859cb3dc0cdfd1e56eae8ce73bf6f675d