Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
Resource
win10v2004-20240226-en
General
-
Target
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
-
Size
1.2MB
-
MD5
f2ee7bf59b3d4b3b97de028e9019fdb6
-
SHA1
123d905cbd55fa087ec83e0d29c5d222739c7cff
-
SHA256
e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f
-
SHA512
1c223deea000758738ccea760c0689cd30a01908b7138715ffb5fbf6994cbb93149da79610c90ab4fc68893be47961d4cfbdf46d89673f192fd6ec48bbe91438
-
SSDEEP
24576:jTbBv5rUDWxz4N1/TmgyBKWIwjmL6THBvWFGa6mPcyGJzQmrD4Fr:9BtgTmEpwRdnoGBQ2Dc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 2652 qtkk.msc 3112 RegSvcs.exe 4592 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\L89BO89GX85MG81WC77SL70ZQ68IN85PZ90MZ88BR74LE79YF72EX88AY86AS86DB84MU82AH84TH68MY70VP86FV75OZ83PT69XO79TY65SF82DU83YH83AI88UP69EQ67DX76PV85FL77ZF74VE87YZ74ZX80IM84GS86PA75VF77UW84B = "C:\\Users\\Admin\\AppData\\Roaming\\cmfi\\QTKKMS~1.EXE C:\\Users\\Admin\\AppData\\Roaming\\cmfi\\fqgpn.msc" qtkk.msc -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 3112 2652 qtkk.msc 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 412 3112 WerFault.exe 105 -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4500 ipconfig.exe 5004 ipconfig.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\Local Settings e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc 2652 qtkk.msc -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3608 1536 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 91 PID 1536 wrote to memory of 3608 1536 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 91 PID 1536 wrote to memory of 3608 1536 e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe 91 PID 3608 wrote to memory of 3348 3608 WScript.exe 97 PID 3608 wrote to memory of 3348 3608 WScript.exe 97 PID 3608 wrote to memory of 3348 3608 WScript.exe 97 PID 3608 wrote to memory of 3332 3608 WScript.exe 99 PID 3608 wrote to memory of 3332 3608 WScript.exe 99 PID 3608 wrote to memory of 3332 3608 WScript.exe 99 PID 3348 wrote to memory of 4500 3348 cmd.exe 101 PID 3348 wrote to memory of 4500 3348 cmd.exe 101 PID 3348 wrote to memory of 4500 3348 cmd.exe 101 PID 3332 wrote to memory of 2652 3332 cmd.exe 102 PID 3332 wrote to memory of 2652 3332 cmd.exe 102 PID 3332 wrote to memory of 2652 3332 cmd.exe 102 PID 2652 wrote to memory of 4592 2652 qtkk.msc 104 PID 2652 wrote to memory of 4592 2652 qtkk.msc 104 PID 2652 wrote to memory of 4592 2652 qtkk.msc 104 PID 2652 wrote to memory of 3112 2652 qtkk.msc 105 PID 2652 wrote to memory of 3112 2652 qtkk.msc 105 PID 2652 wrote to memory of 3112 2652 qtkk.msc 105 PID 2652 wrote to memory of 3112 2652 qtkk.msc 105 PID 3608 wrote to memory of 3144 3608 WScript.exe 109 PID 3608 wrote to memory of 3144 3608 WScript.exe 109 PID 3608 wrote to memory of 3144 3608 WScript.exe 109 PID 3144 wrote to memory of 5004 3144 cmd.exe 112 PID 3144 wrote to memory of 5004 3144 cmd.exe 112 PID 3144 wrote to memory of 5004 3144 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe"C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiox.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c qtkk.msc fqgpn.msc3⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qtkk.mscqtkk.msc fqgpn.msc4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Executes dropped EXE
PID:3112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 806⤵
- Program crash
PID:412
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
PID:5004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3112 -ip 31121⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554B
MD586c042d5b9888b95ed539904c124c026
SHA12eee0fda1944ab3cd233d7dd8da31d50a58148b3
SHA25694ae1530f7a9f7621fdc0603dc88739338ccb3844f5c5fb93117b250991035b9
SHA5122e81f65da77d23a39b46901e74b3a9bd1d02a064ca1f5c8c60391088d5bcb681abc1b823040f5de697f4d40fc6e4a01f3c96e6b0c1a4d54e1073975738932b07
-
Filesize
652B
MD5155e9e6c9c9cfca2df8d469349c7e43f
SHA1c9f117630ffe172b051a8fb4dd9ad9af295ad34e
SHA2561ed9fbf531664f07dc73d664d77dcc34a61e21eb032d4385c83bd4d1a411a227
SHA512075d2ab2ec549ff8935e9401e6501aa611dacdc1b4d6baa3844c0f7945108feeb47d00c9f25075b81c9648771c4a146e772c03ea462d1cc8e27e6ae2fb348cdb
-
Filesize
609B
MD5a4e45c9d53798abecdbf78924f846fcc
SHA1747b2709eec81499a427a8bed5607d6ac449e606
SHA25613ab239b9274f3da0b80121a4298696c1ed26dd3bdf784043d781ed43e0fede2
SHA51293ef0b425f8f90e67fdf3e93510f5f27cea8db20e54eabb0f027a20aa59c1442568ae99c2e846405c0988a564955dbf650c632ea3a54dc312e388396bd318e19
-
Filesize
551B
MD5004c88acbb1c7b4f6cae4396bf690047
SHA1c69badee5d78ebd7ce3b46f6530c7a3be49cf0a4
SHA25689dd0ca941f5f7589df36a25faa7a8086c8cf08a6fb68bf139bc5341328b7071
SHA5121f96a46e3abbb149b571ac147e7d04cf0649566a96f2a4f1f48fac18ac92c6ae7eb89e8d7d2937cf901b939959ea9ba00507877fcb80643f4d2b9c43408dc64a
-
Filesize
519B
MD54732adfcfeb08efa3796f0e0a6beb651
SHA1003e3e7deccda3a1cbcd3e826d46a0a879fa74d2
SHA256e32013e2c075779d8efbfff3de13d529f1e4de3439c77933d7514c8a6077a3d5
SHA51208e05297468844702d008932cb1ac096d32aa9c2a310629dab91b725759a802bed57789ed4d4d9756343c35a05296d925aea1fff3fa2f1638fa903be510b6e5b
-
Filesize
3.4MB
MD5046bb1378b54366e52f7cf528c1587fa
SHA15afa355a75bc9c74f09dd6bcdbe0951e29e3a111
SHA256b3734be9b007ad5b73d81ea4a1e96cb56a50bad55331e56201bd455bac595269
SHA512012d7acc2a2bb76cca9550220b004e284baca76959b515c8b2b9b74c32198f80f2a4ea2b6dcfcf8da661b981510fa7e92413088194c4510302b46973bb93669d
-
Filesize
100KB
MD528f77c4cf999293bc05dd147b68d26f9
SHA1f631f278b6d094f3134ac847c4ececb6ef1bc2a9
SHA25619d6088b4dc015ebad2e90ee194770a965cbc5718925efbf07540585595f0b8a
SHA51211f71cbb4c322ee39129f413fe18321cfa722f105b254787727a946babafda761770448fe01857a440baac60f7f10a2131818bee082ae1b68f8c42de706e2cac
-
Filesize
510B
MD5667648a92aa7efb24d20ae28913c7180
SHA152e0f9b641b6a156fde55afc821e9cb60ba97feb
SHA256ce25f276017281d828da734a213402eb7fba49cf8e88ce6e3c608d7bd972410a
SHA5128b2c14b12803126e4be056315624bb298d4fcfd62182243713ab586e64f19ec4a6b46b1548bba24133c6041d922a573757e02e68bccf8350fe9d57a7ef80b3f5
-
Filesize
531B
MD500292b28f6b528601fc3abbc5c9d1b68
SHA126fbf9ca8eba6ac0fff1fea60e2ab47d780c5067
SHA25666e57effac847b52ce48c1992ed03e4a01283e6ce51fa608ce584755a048e2c9
SHA5127fb2b3e08929a3cb5aaeb7ba8b90fdd05c0266c7e85456d6c6dededaacadbe1fe8493af576cb7855c42f28a00fab2c6c2ec2377509a32bcd9b392c81b6215801
-
Filesize
676B
MD5774d846b359f0ab76231a99b90faf0f4
SHA1a96d0e11c4c3b938c6285d8cd2db543706bb0539
SHA256c2f0cdd6b87f4a122b662233300170e4336e2f2800cc6adb0db24099d74a8901
SHA512abacef367cb39f56beb809573b8ca928bf4c9d2e711d7a42a0aaf80d75725320fb3809c10870ff5b993cd2b40730f15089dcbdba6121eb389eeda0d768c93ef6
-
Filesize
507B
MD593788607c5622f4c425b9b480475a663
SHA11ae29c007bcc85c8744e1236f4d532006943e6e5
SHA2567b0ab8e990afc2a1b0378102d584ad82973b1bcc301aaac218abb5b5762dd9a9
SHA512fbbdd9bc3c74d1bef0c40c98f5b0eadd2e8ff98bd6f84a35bf20e7ea9cb5ba69b48b7f360b9f27f2d7ea9a2f6dc4a80769cdc5a49f7d71d5898f2d169d243f7b
-
Filesize
602B
MD519bc8ae4258ccf4fd6b17e0f91650508
SHA1cf7ffbcc198ec0421d46f4690ba6ca06b3e1e8f1
SHA256896678afa147540658e5fbd1b344d122f5897e5ff23a9df18317658f1772110d
SHA51273e06661ed14932083d93f3be85a78a3ca862d35aff0a82283344bd18244b6f26f63bed1b8ec0632ab95d03411c1b717ee7940291c15395cf452c7a744152485
-
Filesize
550B
MD5189288c470a0646f22ff0b387d95a46c
SHA192b139c73eea73c907ee2efe1f223cdc87cdb93e
SHA2569c6172bd136c76e6ba72e219ba0f18147435fe854e9d5831ae3118c5c0015851
SHA512147dc6e7808b291b9536b40086bb1ebb1d470d842ebd5908dfd1d4fd547325dbb81447feeb53bd4d59cdd01a6e110c287f413dfb721ba7fb4530cb68bf5fd4e7
-
Filesize
593B
MD5dbfc374f445e6281244b407fcf12e81c
SHA1b77402e1e01145f919124450b3f64fbe161b524f
SHA256cb7894828e7e8bdb62f1486b6e92bea3547f7ba01160908d478689ebd32ebda2
SHA51208afec0d49e213e7c1afd50709e7c7b0f1ce0c67d13524ad3c8bf1b35b8866ea400ee762c0540b629504b99e737763c0fb95aa890486b3e61fe61aedf09510fe
-
Filesize
536B
MD5f6198d81d2d907cfb14dde22b0b3f226
SHA1bf609be3e39da42fd294a24ef5fb6cb39933e030
SHA2560ce88ba8afbf060d793c95315557eb3027cade6dd4ef368511a71f2136aa2ff5
SHA5128b031fbdd9692726bbbfb81c8d1e9ea21b6c106ea917f21806fa7232a3cd39ca76915e884e45ceb58d14c0a227c2b82bbe572570da0a501de3b4eaaf233886ae
-
Filesize
925KB
MD5eeaa0f5d82e56659c80fa84d588bf870
SHA1a1aea1de9c42e1ef8c186ef6246dd318040e66de
SHA2563fce07bd7e220e97a1b141da155444f95aba7b5e4325f6a5edb262c025c1e5a9
SHA51220b4d8d117419a511cde61ec37c488fcf86d8d6e9174da2496cd71843e8c7f0dd5b7707e59e8404018f0c7074fef610a48f68e274fa250e05ae89e474ceb8247
-
Filesize
236KB
MD5edf00179aa2e9159b343e2fc65f3b7ea
SHA18acd6719c9487031368dee5b6cf297cd9e65098f
SHA2564486b548806394233cc109069b9e100ee0fb59f09b3b228f6d100242e555569c
SHA512a5b0b5d522bbcf30a445f1cf913a6888b57ac8201b47cfc248c8d0561e8c343e728ba8dcfe82dab917de818a3fc6adffb39e48ebc6ddfc7bd1b2252b4cbe4567
-
Filesize
540B
MD541f179c9089dda4b795f0927b469fc55
SHA152f73561d15ac460f916194d481c56baf77ba7e7
SHA256128659866a56fea6ac28efab3060ca3b57ebd9040d17efb77d1ffead15768e9c
SHA5128531c176b0ddb9594387d4bd3309a098c283304a7620a6f4611e964e784c0a88a1366c3fc20046e58c7c583e68b259f1a5fdc59ae547b0e64b04905af2746616
-
Filesize
32KB
MD54e5dc6cf1d8fef6577a7d919102e0d04
SHA1d3dc1afcedba20ecd45f9c061a63bd721ee6fb66
SHA256849dca0780c70e59a8ee3fa65e5fd82fe7c4af17e26fa17d3726cfefea0913ef
SHA5123c861ee898cdb0d75457ab759a56d36b531a1c9dec517ccd4cb29b6e48cd030d97de23461b39b8c704a90490ea51f277e6b19ff30d12c797b7d909b4073e1430
-
Filesize
32KB
MD5899da02f2f451eb750e19c7573777da8
SHA1841bca52252bdc878384111540a7720873852817
SHA25699b7c8b93c190cea265eba8cd89e8fbd2bf1978a594b2be4e01541448c7e0dfe
SHA5129f977a73efeaace72e6d803e65ae7167f53ca2c00aed782c107d1e6db61853afa24cdaa7300b2671c5e0b5a1051d7513eff9f0b48c51032100e25b5cfd3a4d2f
-
Filesize
633B
MD59fc96e13d5734ad8a61e48866e066298
SHA1170173a972c2c2c5208f50a5c1e1bd936c1e0a66
SHA256b0de14752bd5816010c2d226f84ab348e8098fcbd3078420dc91b5687b764631
SHA512a9c90fc3f9c5c5bcd916d2294559e62487e366e1cd491c183d85c94f3ec1cab101604796d58571bd76692b2c02ad4c45729e639217907a6ec4c4fc91a25ac78c
-
Filesize
616B
MD509ecfa1b22bcd9b1c5b4d259ba5564d9
SHA1788cc65540b8ef6733fe68a7baa64e8d8f968994
SHA256b6b4ac62c8ba6349cfc8a92998c91b8aca6058fe82b53cc110e854123cd422dd
SHA51230a034d639393861403b2fe451ae0f355a231a1ff5dfcfbee3b009acba5e3a3c133159b1c10ecd5e59e69ae8c65ab833be1312c3af70201fdc939d3a1d6310a1
-
Filesize
77KB
MD5950060ab1ef594511bd273fab2c569d5
SHA11c7f883da063e4f8220389ef09a08ef97517cd28
SHA256c11621cf6ecc82b31277acfbb7f0f2634e09539003a889dbc3ec086dc7ee83bc
SHA51255eb8f174bcedf9824026c82776d0801c8bc4a24d0f49bf9e67f70a3d8eb9281d987b51ecdbd8058a72ccce255fa084cd27459591e3ce3605d46cf4495759b6b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
31KB
MD59bcd3baa5b71bfdffe66578a23665363
SHA166d048778944d28ad8adcb7eff5a3875844a0118
SHA256134e4224c8ef6d796a0877e3a8085a7f51f47e7c936d7d8bafd94bda00d99154
SHA512325c6299b60ba7380db2de290b8ebf15e07027b4344acb75ce6c1bebf51038225fb20953e42b65eb3e71dcdeb893c4ef5393a5f654caf3eeaf250ca3803f5f75
-
Filesize
46KB
MD59f5e20ba5f52e0a91be62196183a8c95
SHA184d629f3ef6892a76170cc7250efaaee4995acc7
SHA2568363f18916218adc5838a3a643aa79e2ed3c9f3d095725d39e95c8e1f442a542
SHA512e38cb801cf5dc2309e4785462f0e2618d1fe08d7c436d172296c8af40a6527dff52bbdb4eb9a8eb1c7d260b5a986410da5bbc04b5968f4ec0b78553c83646a6b