Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
bqwvzl40.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
bqwvzl40.exe
Resource
win10v2004-20240226-en
General
-
Target
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
-
Size
82KB
-
MD5
cc44bfc67c96b1216c1a2fb03a4b2aa8
-
SHA1
0a6cfdd880c3bae43b1eee5673ec80859ceec22d
-
SHA256
3e4d2943ab33ddc0ee332623962027bb68ae3a956227622428b9579f11192c94
-
SHA512
aeaa919dfdcfd26cd3aceb40b4de0ff1e66aa3101c6052371dadf21966c0632665094202be208fb644e80e9fa541d010c5f4fe38c6fe94c286408bc462f843ee
-
SSDEEP
1536:KpgpHzb9dZVX9fHMvG0D3XJlMPtBgdhKZvAznOzxqdpX7ne6rfMawjlCE:IgXdZt9P6D3XJlMPtBYpzOzx4be6zCjJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2636 bqwvzl40.exe 2868 bqwvzl40.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 2636 bqwvzl40.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\bqwvzl40 = "C:\\Users\\Admin\\AppData\\Roaming\\bqwvzl40.exe" cc44bfc67c96b1216c1a2fb03a4b2aa8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2636 2756 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 28 PID 2756 wrote to memory of 2636 2756 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 28 PID 2756 wrote to memory of 2636 2756 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 28 PID 2756 wrote to memory of 2636 2756 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 28 PID 2636 wrote to memory of 2868 2636 bqwvzl40.exe 29 PID 2636 wrote to memory of 2868 2636 bqwvzl40.exe 29 PID 2636 wrote to memory of 2868 2636 bqwvzl40.exe 29 PID 2636 wrote to memory of 2868 2636 bqwvzl40.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe"C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\bqwvzl40.exe"C:\Users\Admin\AppData\Roaming\bqwvzl40.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\bqwvzl40.exeC:\Users\Admin\AppData\Roaming\bqwvzl40.exe --Restart3⤵
- Executes dropped EXE
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50e14a49865b35f083738ed90e36bb16b
SHA197ac5f852e994e1836c5f3d78df743f4dd4e6c28
SHA2561c59a0eeca0104e735b3cd93aad92c8dbdcbba8928cad8ae66dbaa09227cce55
SHA5129376cad2ae6499d3f2335c837d9b60f9c943266b9fdff73d9e8662fe771b70de6ae5851aaaa0eb362c04c7427d3fbd3c64f82210cb7527e25c57a36a84f8e435