Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
ca0a8ae7371de2711f63ea1ee28e48bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca0a8ae7371de2711f63ea1ee28e48bb.exe
Resource
win10v2004-20240226-en
General
-
Target
ca0a8ae7371de2711f63ea1ee28e48bb.exe
-
Size
433KB
-
MD5
ca0a8ae7371de2711f63ea1ee28e48bb
-
SHA1
c1010adf2881666b1db1d31f92e3a62ae2d7f5b4
-
SHA256
c33cb022e1c8762d3152e4d65150d7639be6e365e2ed2f100bc779c55f02dc91
-
SHA512
865aaa7fa0cfc083ab2e508437a761024f7f23db6ca32fe2695a1933a3a84dccf62ce18cc3c2d73d71033687ccd5ea30afdc7911c6daa6ed584b150212531299
-
SSDEEP
6144:MTykDONo0jv7IoPfeq1ZzxRJbL7f5LAh36rSLL64j7W4SPHREa0KmmnahTBhY:MLry/neyx7f/A64j7PSfREK69hY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4044 qor.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\baps\qor.exe ca0a8ae7371de2711f63ea1ee28e48bb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4044 4008 ca0a8ae7371de2711f63ea1ee28e48bb.exe 88 PID 4008 wrote to memory of 4044 4008 ca0a8ae7371de2711f63ea1ee28e48bb.exe 88 PID 4008 wrote to memory of 4044 4008 ca0a8ae7371de2711f63ea1ee28e48bb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca0a8ae7371de2711f63ea1ee28e48bb.exe"C:\Users\Admin\AppData\Local\Temp\ca0a8ae7371de2711f63ea1ee28e48bb.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\baps\qor.exe"C:\Program Files (x86)\baps\qor.exe"2⤵
- Executes dropped EXE
PID:4044
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183KB
MD56d8a906acd6deb7b0a909449c7dde4c9
SHA1c7f2190eaba97a2a9ba474e0aaa18dffec442b21
SHA2565b42fb58bec4ec83afbe68b0a20b08df351aa05d1d6abf8349ab45fbf6dcdb81
SHA512ebcbd9e11688b902d5526c489f18e09f6f9372743a6a65ae1df7fee76517180fabadd3b64edacfd0abce826adc6a1d1da09c577b1a3f2a3448551bb3630b6211
-
Filesize
222KB
MD51e127ac80c92e453eb11549afc80100d
SHA1e58882a9c863ef15c0ee8e7c520ed01903558d9a
SHA256659d32db6696efa1a4e234def818acde94cb818ab517a1cbb43d00b6ee712758
SHA512801bc7491ba624c5ad01c0b477223892b4c6bc7893fb0d7c77ca6ce2a8596a44a880328d09e70554ca6e08fdbb464f91adbcb98ecee88e51a4f4e191aabae0f8