Overview
overview
7Static
static
3qbittorren...up.exe
windows7-x64
7qbittorren...up.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...lW.dll
windows7-x64
3$PLUGINSDI...lW.dll
windows10-2004-x64
3qbittorrent.exe
windows7-x64
1qbittorrent.exe
windows10-2004-x64
1qbittorrent.pdb
windows7-x64
3qbittorrent.pdb
windows10-2004-x64
3qt.conf
windows7-x64
3qt.conf
windows10-2004-x64
3translations/qt_gl.qm
windows7-x64
3translations/qt_gl.qm
windows10-2004-x64
3translations/qt_lt.qm
windows7-x64
3translations/qt_lt.qm
windows10-2004-x64
3translatio..._PT.qm
windows7-x64
3translatio..._PT.qm
windows10-2004-x64
3translations/qt_sl.qm
windows7-x64
3translations/qt_sl.qm
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-04-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
qbittorrent_4.6.4_x64_setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
qbittorrent_4.6.4_x64_setup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsisFirewallW.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsisFirewallW.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
qbittorrent.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
qbittorrent.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
qbittorrent.pdb
Resource
win7-20240319-en
Behavioral task
behavioral22
Sample
qbittorrent.pdb
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
qt.conf
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
qt.conf
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
translations/qt_gl.qm
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
translations/qt_gl.qm
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
translations/qt_lt.qm
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
translations/qt_lt.qm
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
translations/qt_pt_PT.qm
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
translations/qt_pt_PT.qm
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
translations/qt_sl.qm
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
translations/qt_sl.qm
Resource
win10v2004-20240226-en
General
-
Target
qt.conf
-
Size
84B
-
MD5
af7f56a63958401da8bea1f5e419b2af
-
SHA1
f66ee8779ca6d570dea22fe34ef8600e5d3c5f38
-
SHA256
fdb8fa58a6ffc14771ca2b1ef6438061a6cba638594d76d9021b91e755d030d3
-
SHA512
02f70ca7f1291b25402989be74408eb82343ab500e15e4ac22fbc7162eb9230cd7061eaa7e34acf69962b57ed0827f51ceaf0fa63da3154b53469c7b7511d23d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.conf rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.conf\ = "conf_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\conf_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2668 AcroRd32.exe 2668 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3036 1928 cmd.exe 29 PID 1928 wrote to memory of 3036 1928 cmd.exe 29 PID 1928 wrote to memory of 3036 1928 cmd.exe 29 PID 3036 wrote to memory of 2668 3036 rundll32.exe 30 PID 3036 wrote to memory of 2668 3036 rundll32.exe 30 PID 3036 wrote to memory of 2668 3036 rundll32.exe 30 PID 3036 wrote to memory of 2668 3036 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\qt.conf1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\qt.conf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\qt.conf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fe7664b6f531a43489727fa44f2e1360
SHA1853fb2a0735aa8543fa3895377c10e89416c42dc
SHA25610dd9a269f9ab4aaa73f79b0916351e4d80c0c4531f87186e5df68b9acea31da
SHA51231e871b37caf7103388e99b941db6e752fe961f6f64f50571e3ae29f33ce031a94aa52277dbba57a2ee883cad7e1511126c233a341aa0a2dc3733dd2248f5263