Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-04-2024 18:04
Static task
static1
Behavioral task
behavioral1
Sample
136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe
Resource
win10v2004-20240412-en
General
-
Target
136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe
-
Size
414KB
-
MD5
df1ecb1fc2d0480ef5a0e569543d14e9
-
SHA1
8c90b5a6caab28b852cde352011752cb2761fdf9
-
SHA256
136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499
-
SHA512
4e8af41bdd90a6a2f2008be558041678608761703bbbd4f08a55ff1305464319bb96cbd53071c71f83a73ee6d1189a3a3aa3c91e69c3aae9626e3e209671aad4
-
SSDEEP
6144:GaNowv7MR+dM+A4K3Kc8Y2Yem0IuONlLfiFtDgjTUGU6J54:GaNPv7Q+72K4eYrlLQDg0xo4
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4828 u2lg.0.exe 4480 Qg_Appv5.exe 3272 u2lg.1.exe 2260 ptInst.exe 1848 ptInst.exe -
Loads dropped DLL 8 IoCs
pid Process 2260 ptInst.exe 2260 ptInst.exe 2260 ptInst.exe 2260 ptInst.exe 2260 ptInst.exe 1848 ptInst.exe 1848 ptInst.exe 1848 ptInst.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1848 set thread context of 4192 1848 ptInst.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2452 4828 WerFault.exe 78 3684 3364 WerFault.exe 77 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2lg.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2lg.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2lg.1.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4480 Qg_Appv5.exe 4480 Qg_Appv5.exe 4480 Qg_Appv5.exe 4480 Qg_Appv5.exe 2260 ptInst.exe 1848 ptInst.exe 1848 ptInst.exe 4192 cmd.exe 4192 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1848 ptInst.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe 3272 u2lg.1.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3364 wrote to memory of 4828 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 78 PID 3364 wrote to memory of 4828 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 78 PID 3364 wrote to memory of 4828 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 78 PID 3364 wrote to memory of 4480 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 84 PID 3364 wrote to memory of 4480 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 84 PID 3364 wrote to memory of 4480 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 84 PID 3364 wrote to memory of 3272 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 85 PID 3364 wrote to memory of 3272 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 85 PID 3364 wrote to memory of 3272 3364 136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe 85 PID 4480 wrote to memory of 2260 4480 Qg_Appv5.exe 90 PID 4480 wrote to memory of 2260 4480 Qg_Appv5.exe 90 PID 4480 wrote to memory of 2260 4480 Qg_Appv5.exe 90 PID 2260 wrote to memory of 1848 2260 ptInst.exe 91 PID 2260 wrote to memory of 1848 2260 ptInst.exe 91 PID 2260 wrote to memory of 1848 2260 ptInst.exe 91 PID 1848 wrote to memory of 4192 1848 ptInst.exe 92 PID 1848 wrote to memory of 4192 1848 ptInst.exe 92 PID 1848 wrote to memory of 4192 1848 ptInst.exe 92 PID 1848 wrote to memory of 4192 1848 ptInst.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe"C:\Users\Admin\AppData\Local\Temp\136aff853514ca7aba662cc26bc54cfb92d58e6477752ce3a8948ff9f1117499.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\u2lg.0.exe"C:\Users\Admin\AppData\Local\Temp\u2lg.0.exe"2⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 11363⤵
- Program crash
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2lg.1.exe"C:\Users\Admin\AppData\Local\Temp\u2lg.1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 17242⤵
- Program crash
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4828 -ip 48281⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3364 -ip 33641⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD5862bf3003dca41d88ac49a6846149623
SHA1b34f1d42dd0649d6b83f9a92124a554f48df0434
SHA25650c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c
SHA512fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969
-
Filesize
590KB
MD563206e3b4f1fa4dcfbe1f2cc5d0c4e9d
SHA1fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924
SHA2568f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885
SHA51232bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6
-
Filesize
79KB
MD58e1bbc6d6c4d207393b59853f73945ae
SHA1b66d632eae41267175bf5332d43a785dd929d79f
SHA256b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279
SHA5121b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
938KB
MD5b15bac961f62448c872e1dc6d3931016
SHA11dcb61babb08fe5db711e379cb67335357a5db82
SHA256bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
SHA512932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
Filesize
1.3MB
MD53bee67dd0e04559c8fdc7761336dee47
SHA1027ef9dca01fb928db79e57b418130165f06ed5f
SHA25657745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812
SHA51235fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
3.8MB
MD513418f74a7ce25cdd6997c9fcb718a0e
SHA1f4c880821fee72c37c882b1e8ebf100efcafe31c
SHA256a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0
SHA51259017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1
-
Filesize
1.4MB
MD57550914b27c5d17052c275f964728e14
SHA16280ba40d989f989adbaeed73e7bc29f7981d851
SHA256301ad838897489119bfb484f549040664a049744d8d72a19760529420441be43
SHA512d3f691f0838483f9cfdbc3162cfe88a6b967337ba9833b9b7070aeae854ad1a56c16cb5d889cff483649f7b5eee83f4f4a56d8d951fddf064cacf7df393f4b5f
-
Filesize
2KB
MD5d76d8cd8573d971433cc5196d46c9634
SHA13dcd5012c1c181d3c1a568581aa758b5dd41f659
SHA2564756624503c2394c6163879a62171911f89f0d3f66f2ada8fe36c72519b036e5
SHA5129fb38bb636e95048719538d6add9882f56caf66dfcd5bd9dafd59fee2c2ad3e04257fef8b51e46fe34b1a46478494e055c11a5c7a439d96f59c8d603d891b0d5
-
Filesize
270KB
MD58ed49d27b8ccab5a03e6e822694fdaa1
SHA1cf47d93e906e3f93329ceeedd061be95c4b1047b
SHA2567ee946a36cdb7fa51dae1b2fc51ab628a7c7af1a01446c0413c0fba6aaff9a77
SHA512551ca597962d6b818e31fc7a414a7dc62e981672092a12a282a6549573138e460187df8339582c6f52f204752c00047b39b6a33ccc546d194ccc8731fcf94512
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954