Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
Resource
win10v2004-20240226-en
General
-
Target
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
-
Size
1.2MB
-
MD5
f2ee7bf59b3d4b3b97de028e9019fdb6
-
SHA1
123d905cbd55fa087ec83e0d29c5d222739c7cff
-
SHA256
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f
-
SHA512
1c223deea000758738ccea760c0689cd30a01908b7138715ffb5fbf6994cbb93149da79610c90ab4fc68893be47961d4cfbdf46d89673f192fd6ec48bbe91438
-
SSDEEP
24576:jTbBv5rUDWxz4N1/TmgyBKWIwjmL6THBvWFGa6mPcyGJzQmrD4Fr:9BtgTmEpwRdnoGBQ2Dc
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2420 qtkk.msc 1628 RegSvcs.exe 808 RegSvcs.exe -
Loads dropped DLL 3 IoCs
pid Process 2680 cmd.exe 2420 qtkk.msc 2420 qtkk.msc -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\L89BO89GX85MG81WC77SL70ZQ68IN85PZ90MZ88BR74LE79YF72EX88AY86AS86DB84MU82AH84TH68MY70VP86FV75OZ83PT69XO79TY65SF82DU83YH83AI88UP69EQ67DX76PV85FL77ZF74VE87YZ74ZX80IM84GS86PA75VF77UW84B = "C:\\Users\\Admin\\AppData\\Roaming\\cmfi\\QTKKMS~1.EXE C:\\Users\\Admin\\AppData\\Roaming\\cmfi\\fqgpn.msc" qtkk.msc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 1628 2420 qtkk.msc 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2648 ipconfig.exe 1304 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2420 qtkk.msc 2420 qtkk.msc 2420 qtkk.msc 2420 qtkk.msc 2420 qtkk.msc 2420 qtkk.msc -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2568 2968 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 28 PID 2968 wrote to memory of 2568 2968 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 28 PID 2968 wrote to memory of 2568 2968 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 28 PID 2968 wrote to memory of 2568 2968 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 28 PID 2568 wrote to memory of 2444 2568 WScript.exe 29 PID 2568 wrote to memory of 2444 2568 WScript.exe 29 PID 2568 wrote to memory of 2444 2568 WScript.exe 29 PID 2568 wrote to memory of 2444 2568 WScript.exe 29 PID 2568 wrote to memory of 2680 2568 WScript.exe 31 PID 2568 wrote to memory of 2680 2568 WScript.exe 31 PID 2568 wrote to memory of 2680 2568 WScript.exe 31 PID 2568 wrote to memory of 2680 2568 WScript.exe 31 PID 2444 wrote to memory of 2648 2444 cmd.exe 33 PID 2444 wrote to memory of 2648 2444 cmd.exe 33 PID 2444 wrote to memory of 2648 2444 cmd.exe 33 PID 2444 wrote to memory of 2648 2444 cmd.exe 33 PID 2680 wrote to memory of 2420 2680 cmd.exe 34 PID 2680 wrote to memory of 2420 2680 cmd.exe 34 PID 2680 wrote to memory of 2420 2680 cmd.exe 34 PID 2680 wrote to memory of 2420 2680 cmd.exe 34 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 808 2420 qtkk.msc 35 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2420 wrote to memory of 1628 2420 qtkk.msc 36 PID 2568 wrote to memory of 1552 2568 WScript.exe 37 PID 2568 wrote to memory of 1552 2568 WScript.exe 37 PID 2568 wrote to memory of 1552 2568 WScript.exe 37 PID 2568 wrote to memory of 1552 2568 WScript.exe 37 PID 1552 wrote to memory of 1304 1552 cmd.exe 39 PID 1552 wrote to memory of 1304 1552 cmd.exe 39 PID 1552 wrote to memory of 1304 1552 cmd.exe 39 PID 1552 wrote to memory of 1304 1552 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe"C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiox.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qtkk.msc fqgpn.msc3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qtkk.mscqtkk.msc fqgpn.msc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:808
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:1628
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
PID:1304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554B
MD586c042d5b9888b95ed539904c124c026
SHA12eee0fda1944ab3cd233d7dd8da31d50a58148b3
SHA25694ae1530f7a9f7621fdc0603dc88739338ccb3844f5c5fb93117b250991035b9
SHA5122e81f65da77d23a39b46901e74b3a9bd1d02a064ca1f5c8c60391088d5bcb681abc1b823040f5de697f4d40fc6e4a01f3c96e6b0c1a4d54e1073975738932b07
-
Filesize
652B
MD5155e9e6c9c9cfca2df8d469349c7e43f
SHA1c9f117630ffe172b051a8fb4dd9ad9af295ad34e
SHA2561ed9fbf531664f07dc73d664d77dcc34a61e21eb032d4385c83bd4d1a411a227
SHA512075d2ab2ec549ff8935e9401e6501aa611dacdc1b4d6baa3844c0f7945108feeb47d00c9f25075b81c9648771c4a146e772c03ea462d1cc8e27e6ae2fb348cdb
-
Filesize
609B
MD5a4e45c9d53798abecdbf78924f846fcc
SHA1747b2709eec81499a427a8bed5607d6ac449e606
SHA25613ab239b9274f3da0b80121a4298696c1ed26dd3bdf784043d781ed43e0fede2
SHA51293ef0b425f8f90e67fdf3e93510f5f27cea8db20e54eabb0f027a20aa59c1442568ae99c2e846405c0988a564955dbf650c632ea3a54dc312e388396bd318e19
-
Filesize
551B
MD5004c88acbb1c7b4f6cae4396bf690047
SHA1c69badee5d78ebd7ce3b46f6530c7a3be49cf0a4
SHA25689dd0ca941f5f7589df36a25faa7a8086c8cf08a6fb68bf139bc5341328b7071
SHA5121f96a46e3abbb149b571ac147e7d04cf0649566a96f2a4f1f48fac18ac92c6ae7eb89e8d7d2937cf901b939959ea9ba00507877fcb80643f4d2b9c43408dc64a
-
Filesize
519B
MD54732adfcfeb08efa3796f0e0a6beb651
SHA1003e3e7deccda3a1cbcd3e826d46a0a879fa74d2
SHA256e32013e2c075779d8efbfff3de13d529f1e4de3439c77933d7514c8a6077a3d5
SHA51208e05297468844702d008932cb1ac096d32aa9c2a310629dab91b725759a802bed57789ed4d4d9756343c35a05296d925aea1fff3fa2f1638fa903be510b6e5b
-
Filesize
3.5MB
MD57224af09c24ddefb26f388489b9dfb57
SHA1352c3771d2dc6ef69029d74aed54e446cff2f90e
SHA256687603bef4dc93a3f845226c65b4446a63bd2e2db8955cfe792cd88d31df6413
SHA5125d3fc3e4738961fd0e8fe18b9a7c9e3ed71d16260cb44a84213eded458baf64083534c7cbcc0ba5d59d568e9fdbd8cbb01a3f58b0412d49efd1f16fa34174eac
-
Filesize
527KB
MD51cd4ad19e2bfebebb3ea9e35ec2f84d1
SHA1774212321e204c04f2de5d8e7e6686e8bc2efeea
SHA2562b8576857650065a8365eab3772fe9000710584507660b9eb6d00e1162f9ec66
SHA5128be2ac9df393664c0e1e0d9ec22b40e07db3c78ac6230a9afe3ae9c63b90a5e0c60a26c919232899be538155486e9dea1b9a9073945c43c30aa94bb0195cb53e
-
Filesize
510B
MD5667648a92aa7efb24d20ae28913c7180
SHA152e0f9b641b6a156fde55afc821e9cb60ba97feb
SHA256ce25f276017281d828da734a213402eb7fba49cf8e88ce6e3c608d7bd972410a
SHA5128b2c14b12803126e4be056315624bb298d4fcfd62182243713ab586e64f19ec4a6b46b1548bba24133c6041d922a573757e02e68bccf8350fe9d57a7ef80b3f5
-
Filesize
531B
MD500292b28f6b528601fc3abbc5c9d1b68
SHA126fbf9ca8eba6ac0fff1fea60e2ab47d780c5067
SHA25666e57effac847b52ce48c1992ed03e4a01283e6ce51fa608ce584755a048e2c9
SHA5127fb2b3e08929a3cb5aaeb7ba8b90fdd05c0266c7e85456d6c6dededaacadbe1fe8493af576cb7855c42f28a00fab2c6c2ec2377509a32bcd9b392c81b6215801
-
Filesize
676B
MD5774d846b359f0ab76231a99b90faf0f4
SHA1a96d0e11c4c3b938c6285d8cd2db543706bb0539
SHA256c2f0cdd6b87f4a122b662233300170e4336e2f2800cc6adb0db24099d74a8901
SHA512abacef367cb39f56beb809573b8ca928bf4c9d2e711d7a42a0aaf80d75725320fb3809c10870ff5b993cd2b40730f15089dcbdba6121eb389eeda0d768c93ef6
-
Filesize
507B
MD593788607c5622f4c425b9b480475a663
SHA11ae29c007bcc85c8744e1236f4d532006943e6e5
SHA2567b0ab8e990afc2a1b0378102d584ad82973b1bcc301aaac218abb5b5762dd9a9
SHA512fbbdd9bc3c74d1bef0c40c98f5b0eadd2e8ff98bd6f84a35bf20e7ea9cb5ba69b48b7f360b9f27f2d7ea9a2f6dc4a80769cdc5a49f7d71d5898f2d169d243f7b
-
Filesize
602B
MD519bc8ae4258ccf4fd6b17e0f91650508
SHA1cf7ffbcc198ec0421d46f4690ba6ca06b3e1e8f1
SHA256896678afa147540658e5fbd1b344d122f5897e5ff23a9df18317658f1772110d
SHA51273e06661ed14932083d93f3be85a78a3ca862d35aff0a82283344bd18244b6f26f63bed1b8ec0632ab95d03411c1b717ee7940291c15395cf452c7a744152485
-
Filesize
550B
MD5189288c470a0646f22ff0b387d95a46c
SHA192b139c73eea73c907ee2efe1f223cdc87cdb93e
SHA2569c6172bd136c76e6ba72e219ba0f18147435fe854e9d5831ae3118c5c0015851
SHA512147dc6e7808b291b9536b40086bb1ebb1d470d842ebd5908dfd1d4fd547325dbb81447feeb53bd4d59cdd01a6e110c287f413dfb721ba7fb4530cb68bf5fd4e7
-
Filesize
593B
MD5dbfc374f445e6281244b407fcf12e81c
SHA1b77402e1e01145f919124450b3f64fbe161b524f
SHA256cb7894828e7e8bdb62f1486b6e92bea3547f7ba01160908d478689ebd32ebda2
SHA51208afec0d49e213e7c1afd50709e7c7b0f1ce0c67d13524ad3c8bf1b35b8866ea400ee762c0540b629504b99e737763c0fb95aa890486b3e61fe61aedf09510fe
-
Filesize
536B
MD5f6198d81d2d907cfb14dde22b0b3f226
SHA1bf609be3e39da42fd294a24ef5fb6cb39933e030
SHA2560ce88ba8afbf060d793c95315557eb3027cade6dd4ef368511a71f2136aa2ff5
SHA5128b031fbdd9692726bbbfb81c8d1e9ea21b6c106ea917f21806fa7232a3cd39ca76915e884e45ceb58d14c0a227c2b82bbe572570da0a501de3b4eaaf233886ae
-
Filesize
925KB
MD5eeaa0f5d82e56659c80fa84d588bf870
SHA1a1aea1de9c42e1ef8c186ef6246dd318040e66de
SHA2563fce07bd7e220e97a1b141da155444f95aba7b5e4325f6a5edb262c025c1e5a9
SHA51220b4d8d117419a511cde61ec37c488fcf86d8d6e9174da2496cd71843e8c7f0dd5b7707e59e8404018f0c7074fef610a48f68e274fa250e05ae89e474ceb8247
-
Filesize
540B
MD541f179c9089dda4b795f0927b469fc55
SHA152f73561d15ac460f916194d481c56baf77ba7e7
SHA256128659866a56fea6ac28efab3060ca3b57ebd9040d17efb77d1ffead15768e9c
SHA5128531c176b0ddb9594387d4bd3309a098c283304a7620a6f4611e964e784c0a88a1366c3fc20046e58c7c583e68b259f1a5fdc59ae547b0e64b04905af2746616
-
Filesize
32KB
MD54e5dc6cf1d8fef6577a7d919102e0d04
SHA1d3dc1afcedba20ecd45f9c061a63bd721ee6fb66
SHA256849dca0780c70e59a8ee3fa65e5fd82fe7c4af17e26fa17d3726cfefea0913ef
SHA5123c861ee898cdb0d75457ab759a56d36b531a1c9dec517ccd4cb29b6e48cd030d97de23461b39b8c704a90490ea51f277e6b19ff30d12c797b7d909b4073e1430
-
Filesize
32KB
MD5899da02f2f451eb750e19c7573777da8
SHA1841bca52252bdc878384111540a7720873852817
SHA25699b7c8b93c190cea265eba8cd89e8fbd2bf1978a594b2be4e01541448c7e0dfe
SHA5129f977a73efeaace72e6d803e65ae7167f53ca2c00aed782c107d1e6db61853afa24cdaa7300b2671c5e0b5a1051d7513eff9f0b48c51032100e25b5cfd3a4d2f
-
Filesize
633B
MD59fc96e13d5734ad8a61e48866e066298
SHA1170173a972c2c2c5208f50a5c1e1bd936c1e0a66
SHA256b0de14752bd5816010c2d226f84ab348e8098fcbd3078420dc91b5687b764631
SHA512a9c90fc3f9c5c5bcd916d2294559e62487e366e1cd491c183d85c94f3ec1cab101604796d58571bd76692b2c02ad4c45729e639217907a6ec4c4fc91a25ac78c
-
Filesize
616B
MD509ecfa1b22bcd9b1c5b4d259ba5564d9
SHA1788cc65540b8ef6733fe68a7baa64e8d8f968994
SHA256b6b4ac62c8ba6349cfc8a92998c91b8aca6058fe82b53cc110e854123cd422dd
SHA51230a034d639393861403b2fe451ae0f355a231a1ff5dfcfbee3b009acba5e3a3c133159b1c10ecd5e59e69ae8c65ab833be1312c3af70201fdc939d3a1d6310a1
-
Filesize
77KB
MD5950060ab1ef594511bd273fab2c569d5
SHA11c7f883da063e4f8220389ef09a08ef97517cd28
SHA256c11621cf6ecc82b31277acfbb7f0f2634e09539003a889dbc3ec086dc7ee83bc
SHA51255eb8f174bcedf9824026c82776d0801c8bc4a24d0f49bf9e67f70a3d8eb9281d987b51ecdbd8058a72ccce255fa084cd27459591e3ce3605d46cf4495759b6b
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215