Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe
Resource
win10v2004-20240419-en
General
-
Target
e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe
-
Size
154KB
-
MD5
a89cc2ef25103e1271a23b6e02d8524a
-
SHA1
bccebf4e5c610fcce1bb619b853df3b213506f1c
-
SHA256
e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd
-
SHA512
ec3d775a39dcd1c95f35fc59890651290b59be596a2a61d04bbe3c6a1de68633827b0ea4a72c973a10a1138bd0094fa91c17b0a1a103249ba508c5df619fd6fa
-
SSDEEP
3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000b000000023bb3-15.dat acprotect -
Deletes itself 1 IoCs
pid Process 4984 nnteo.exe -
Executes dropped EXE 2 IoCs
pid Process 4984 nnteo.exe 1884 dztz.exe -
Loads dropped DLL 1 IoCs
pid Process 1884 dztz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Linycpy = "c:\\Program Files\\qotcl\\dztz.exe \"c:\\Program Files\\qotcl\\dztza.dll\",SetHandle" dztz.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: dztz.exe File opened (read-only) \??\u: dztz.exe File opened (read-only) \??\v: dztz.exe File opened (read-only) \??\e: dztz.exe File opened (read-only) \??\g: dztz.exe File opened (read-only) \??\o: dztz.exe File opened (read-only) \??\p: dztz.exe File opened (read-only) \??\q: dztz.exe File opened (read-only) \??\h: dztz.exe File opened (read-only) \??\n: dztz.exe File opened (read-only) \??\r: dztz.exe File opened (read-only) \??\x: dztz.exe File opened (read-only) \??\z: dztz.exe File opened (read-only) \??\a: dztz.exe File opened (read-only) \??\j: dztz.exe File opened (read-only) \??\l: dztz.exe File opened (read-only) \??\m: dztz.exe File opened (read-only) \??\w: dztz.exe File opened (read-only) \??\b: dztz.exe File opened (read-only) \??\i: dztz.exe File opened (read-only) \??\k: dztz.exe File opened (read-only) \??\t: dztz.exe File opened (read-only) \??\y: dztz.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 dztz.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification \??\c:\Program Files\qotcl nnteo.exe File created \??\c:\Program Files\qotcl\dztza.dll nnteo.exe File created \??\c:\Program Files\qotcl\dztz.exe nnteo.exe File opened for modification \??\c:\Program Files\qotcl\dztz.exe nnteo.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dztz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dztz.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4340 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1884 dztz.exe 1884 dztz.exe 1884 dztz.exe 1884 dztz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1884 dztz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe 4984 nnteo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3416 2096 e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe 86 PID 2096 wrote to memory of 3416 2096 e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe 86 PID 2096 wrote to memory of 3416 2096 e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe 86 PID 3416 wrote to memory of 4340 3416 cmd.exe 88 PID 3416 wrote to memory of 4340 3416 cmd.exe 88 PID 3416 wrote to memory of 4340 3416 cmd.exe 88 PID 3416 wrote to memory of 4984 3416 cmd.exe 91 PID 3416 wrote to memory of 4984 3416 cmd.exe 91 PID 3416 wrote to memory of 4984 3416 cmd.exe 91 PID 4984 wrote to memory of 1884 4984 nnteo.exe 92 PID 4984 wrote to memory of 1884 4984 nnteo.exe 92 PID 4984 wrote to memory of 1884 4984 nnteo.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe"C:\Users\Admin\AppData\Local\Temp\e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\nnteo.exe "C:\Users\Admin\AppData\Local\Temp\e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\nnteo.exeC:\Users\Admin\AppData\Local\Temp\\nnteo.exe "C:\Users\Admin\AppData\Local\Temp\e6249d52c6c9d0826a4675f65f40bcf04783407ae19d8245bb895290dc759ebd.exe"3⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\Program Files\qotcl\dztz.exe"c:\Program Files\qotcl\dztz.exe" "c:\Program Files\qotcl\dztza.dll",SetHandle C:\Users\Admin\AppData\Local\Temp\nnteo.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
128KB
MD5454f9daf48fa32edc00ab661b8b33d9d
SHA1def910a901259915877fce7a8e1b8df156a05a0c
SHA25658118ae5ce5a985bc4e798baffbfe29ecb310c9c0aaa2a6c0b8abf6fa59cd3f2
SHA512d6b6615b33588dcc320a4c83331e8e61e74b5cfc252907365180476e1660093c19f292e5cf981cf1b395a99e36b63e36a56db56168718554385e5cd39f65046e
-
Filesize
154KB
MD59129234c1fdff20d6fbe06968a7f0654
SHA10f61fea590c119bc2b896491fccffc044f645de6
SHA2563d0a871741a46ec35f45572a61de821f49f11fa0d29494b6317b2b4dec943e11
SHA5125b07bf7072daae43244dcded158fefaeafc1cbccb7889b42eaa19c74a6f05dc275bdda2a9c0010e5e0cbbbd223b55fa3cc1a994ad636c9f9845658416f25ea4d