Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe
Resource
win10v2004-20240226-en
General
-
Target
65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe
-
Size
197KB
-
MD5
12814973ee19dc452317d00bcc8800bd
-
SHA1
6df52babeaac2ddd1b432e1525f07e7597fe6f23
-
SHA256
65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074
-
SHA512
7f4cbdca7aac9bc083026d348c236644d66bdfa2b438427ac9aa020298bef7ec3db1bcb51d8673bc0895b71b4fdab6c5a22fc70367c650d2a2cc7ec476856ccc
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOR:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1716 qqwhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\qqwhost.exe 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe File opened for modification C:\Windows\Debug\qqwhost.exe 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 qqwhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz qqwhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2364 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2584 2364 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe 29 PID 2364 wrote to memory of 2584 2364 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe 29 PID 2364 wrote to memory of 2584 2364 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe 29 PID 2364 wrote to memory of 2584 2364 65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe"C:\Users\Admin\AppData\Local\Temp\65d184a6d3b5bb349ab75ef222bbcce7b4322164d32af96b5d5b76e6e1520074.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\65D184~1.EXE > nul2⤵
- Deletes itself
PID:2584
-
-
C:\Windows\Debug\qqwhost.exeC:\Windows\Debug\qqwhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5be7d836bda672cdaac3e67c493c79977
SHA15ba26286b29251583dfd881c16d99321f3ef0444
SHA25647c8cccb70689b6b8ab8df3a52b9d22cd45db5c66bc15967f8696faf5845b41b
SHA51263b86e44f384f7112c6394941e75e306927df14befa127b70e1ac69b5f88362509fc761aca13648e6b4b0e3f830f901b53a2f67c8d452bcef4ea62b076a86fbd