Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
Resource
win10v2004-20240226-en
General
-
Target
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
-
Size
480KB
-
MD5
0e8e2d4b749d4393e69c7bb41d6b4bd9
-
SHA1
707963d461396225e0e7c150dce14938c6be3c24
-
SHA256
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1
-
SHA512
1e674f48442f1de3b0f053acd9a19eb2d3fcfb892d393315d9a96f654edb7533789f92bcd6cdd404212485c4e4cbd44c35a0155f734b8909430eab4918eba77a
-
SSDEEP
12288:4jauDReWGJVdiObOUCfAcJFg3ThL+NqQlcHNzZP0HK9:4DDKJdKf8/Qlctz50HK9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1656 rqdous.exe -
Loads dropped DLL 2 IoCs
pid Process 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\rqdous.exe" rqdous.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1656 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 28 PID 2232 wrote to memory of 1656 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 28 PID 2232 wrote to memory of 1656 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 28 PID 2232 wrote to memory of 1656 2232 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe"C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\ProgramData\rqdous.exe"C:\ProgramData\rqdous.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5264a999e1db049dd06c5a5993399d359
SHA1dd119c549eec8d7bea72f844ff1ec79eb7a8fca0
SHA256f38085efaf6db563ebd18896d2bbca6e0931b67ca33eba69e211ff7083acae46
SHA51292e1e21ce9a321b259660b0bb138cf70461772319a498667e6792a9e15364f00322467821dbe87f24ebd4b562454d51621437b66c850dee4c8514722b201d1df
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
343KB
MD5f02ef839331e5413b5317c876fc5131d
SHA1a8053b8bdc16008b73cf0e57b6af04862274b684
SHA2562c8dbd22f4ffc1a554182d1d7240958c79e981145e85719631543c403092dfc6
SHA512e373438b08a39f06100919b8dbe3035e0e72a82bb5af431c3bfc8cfbb64d30e652eb3ecf072e44d3b0a5508449751078d2beb7ce79139bdeb87b3bb3a9ff63ee