Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2024 17:29

General

  • Target

    qbittorrent_4.6.4_x64_setup.exe

  • Size

    34.0MB

  • MD5

    918224925563095d15dbab7c34b3bf17

  • SHA1

    33902285adf411e5824547e849a4adcfc6531114

  • SHA256

    96bac43faac2b1fa5e0bc495975b2e642af5da181e313a9c8f541912b83c0edb

  • SHA512

    4d6bd949693ea60671ddb8dc19ec87d8e02bf4888aca290318488ca696e495e13bf49161ac8f75cfff9befb72589ab2bedcd1138fa9d81c5bf071191d6344b28

  • SSDEEP

    786432:7KMXiEtPqJO5MB3/UOd64S49KmFRc85C2uWF3Dzn:7DXioy0DOd6o1HtuW5/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 44 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qbittorrent_4.6.4_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\qbittorrent_4.6.4_x64_setup.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Program Files\qBittorrent\qbittorrent.exe
      "C:\Program Files\qBittorrent\qbittorrent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\qBittorrent\qbittorrent.exe

    Filesize

    836KB

    MD5

    aa0128242ae53f307ce6a0fbe98e4b33

    SHA1

    c07196a67c24f79456a502e7ea708cb25d63b6d1

    SHA256

    23ff8cb87b5bbf46489d99dd0ece01b0f1a74b9a985a359a13532924731bcc4a

    SHA512

    c865184e9244714ab642c8b1cb50a49c2284d30244fc282a472665a8b027d1d3c8c9fbdb5f73838769ef3517ab7344d5bbacc9d36b4982d4755f6a825619db1e

  • C:\Program Files\qBittorrent\qbittorrent.exe

    Filesize

    9.3MB

    MD5

    5bf5c1c13eaf87756f857ccfaa8b7429

    SHA1

    5f11b8ab22ed0a9913344a9b106847dde125e427

    SHA256

    182092f1b8847b574f054b1200b0a00040dcb80958afd20ad047469b786a2fea

    SHA512

    fd855a9f50dc11943517468e547a942975fa8d12058f38eab9c956da56d13963f50c51dd76fa568d70fa9d7f993d3a1617fd746e79a54d12c4acc3560d7f7442

  • C:\Program Files\qBittorrent\qbittorrent.exe

    Filesize

    9.4MB

    MD5

    5dbceda7d2e7b4765e588c3b361e7e85

    SHA1

    93502ac9e49c8a00797cf5a1e68a3795a7c5c117

    SHA256

    f0c3b40c1a3da294f2951da1c6291f539e9723e9392084d03f570666ba42133a

    SHA512

    11ea775093e0c8f92db02396cd84dcc79a28130b9b172335cf546db181db6c8a6d7dd97ae5ad9a8ac223ab96927b42a8b85263190e0787ff2522acd1db246297

  • C:\Program Files\qBittorrent\qt.conf

    Filesize

    84B

    MD5

    af7f56a63958401da8bea1f5e419b2af

    SHA1

    f66ee8779ca6d570dea22fe34ef8600e5d3c5f38

    SHA256

    fdb8fa58a6ffc14771ca2b1ef6438061a6cba638594d76d9021b91e755d030d3

    SHA512

    02f70ca7f1291b25402989be74408eb82343ab500e15e4ac22fbc7162eb9230cd7061eaa7e34acf69962b57ed0827f51ceaf0fa63da3154b53469c7b7511d23d

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    b4faf654de4284a89eaf7d073e4e1e63

    SHA1

    8efcfd1ca648e942cbffd27af429784b7fcf514b

    SHA256

    c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3

    SHA512

    eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    50016010fb0d8db2bc4cd258ceb43be5

    SHA1

    44ba95ee12e69da72478cf358c93533a9c7a01dc

    SHA256

    32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

    SHA512

    ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\System.dll

    Filesize

    12KB

    MD5

    4add245d4ba34b04f213409bfe504c07

    SHA1

    ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

    SHA256

    9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

    SHA512

    1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\UAC.dll

    Filesize

    8KB

    MD5

    c485072f0eddd333b33a5442bf4872f4

    SHA1

    ed38b8e6ba25cdeae0425f6a1e661a2efa224f3f

    SHA256

    187f632a122722ce1a2566b041a33c656fb0202eb5d89661a3eb76105f7c51b5

    SHA512

    e13fb18d7d46defdbf90d158b8a8ccb7d47fb8389eaeebd7658ee7a45938918f3dc070967a0ffcc932e2bd2fc6792a88381f4f3674b8e33637053de80bcf90e9

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\modern-wizard.bmp

    Filesize

    25KB

    MD5

    cbe40fd2b1ec96daedc65da172d90022

    SHA1

    366c216220aa4329dff6c485fd0e9b0f4f0a7944

    SHA256

    3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

    SHA512

    62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    1d8f01a83ddd259bc339902c1d33c8f1

    SHA1

    9f7806af462c94c39e2ec6cc9c7ad05c44eba04e

    SHA256

    4b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed

    SHA512

    28bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567

  • C:\Users\Admin\AppData\Local\Temp\nso4364.tmp\nsisFirewallW.dll

    Filesize

    8KB

    MD5

    f5bf81a102de52a4add21b8a367e54e0

    SHA1

    cf1e76ffe4a3ecd4dad453112afd33624f16751c

    SHA256

    53be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2

    SHA512

    6e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256

  • C:\Users\Admin\AppData\Roaming\qBittorrent\watched_folders.json.GDNSze

    Filesize

    4B

    MD5

    5b76b0eef9af8a2300673e0553f609f9

    SHA1

    0b56d40c0630a74abec5398e01c6cd83263feddc

    SHA256

    d914176fd50bd7f565700006a31aa97b79d3ad17cee20c8e5ff2061d5cb74817

    SHA512

    cf06a50de1bf63b7052c19ad53766fa0d99a4d88db76a7cbc672e33276e3d423e4c5f5cb4a8ae188c5c0e17d93bb740eaab6f25753f0d26501c5f84aeded075d

  • memory/896-142-0x0000022C4C360000-0x0000022C4C370000-memory.dmp

    Filesize

    64KB

  • memory/896-165-0x0000022C4C360000-0x0000022C4C370000-memory.dmp

    Filesize

    64KB