Overview
overview
10Static
static
30691b5a648...08.exe
windows10-2004-x64
1016d27a379d...0f.exe
windows7-x64
316d27a379d...0f.exe
windows10-2004-x64
102142fb28cf...7f.exe
windows10-2004-x64
72590c6aee0...47.exe
windows7-x64
32590c6aee0...47.exe
windows10-2004-x64
102dfb67bcaf...0e.exe
windows7-x64
32dfb67bcaf...0e.exe
windows10-2004-x64
1037da8385b8...9b.exe
windows7-x64
337da8385b8...9b.exe
windows10-2004-x64
103aaf26e7fb...53.exe
windows7-x64
33aaf26e7fb...53.exe
windows10-2004-x64
1040299e478c...3e.exe
windows7-x64
340299e478c...3e.exe
windows10-2004-x64
1055b18033bb...53.exe
windows7-x64
355b18033bb...53.exe
windows10-2004-x64
1058f1ac441f...dd.exe
windows7-x64
358f1ac441f...dd.exe
windows10-2004-x64
106f9c093ac1...fd.exe
windows10-2004-x64
1088157ed09f...7d.exe
windows10-2004-x64
108e29739d0d...c3.exe
windows10-2004-x64
109a9db30ba7...e4.exe
windows10-2004-x64
10ab51d9c4b8...12.exe
windows10-2004-x64
10b9493d5cc0...9a.exe
windows7-x64
3b9493d5cc0...9a.exe
windows10-2004-x64
10d5fab2df25...eb.exe
windows10-2004-x64
10fab3fc05cf...79.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
0691b5a648eb75146ff1c98264b40a610cecafe4f5a7c2399c6ae1e3ab936d08.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
16d27a379dbe8520bda043bbfb54345238cc93370956b9d84ee176d2c0c4e90f.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
16d27a379dbe8520bda043bbfb54345238cc93370956b9d84ee176d2c0c4e90f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
2590c6aee0971ee73ddf13b31120ab5a7a7268c588bc55a8fe221b203913c447.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
2590c6aee0971ee73ddf13b31120ab5a7a7268c588bc55a8fe221b203913c447.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2dfb67bcafac71d947152f3ae70d7dd3d30e5a77ca43c4558c19f55b5f02e20e.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
2dfb67bcafac71d947152f3ae70d7dd3d30e5a77ca43c4558c19f55b5f02e20e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
37da8385b8545a46ada63ea355787a5c8f960005b8a67b59b4d5a15b68cb239b.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
37da8385b8545a46ada63ea355787a5c8f960005b8a67b59b4d5a15b68cb239b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
3aaf26e7fbf94654768907baab049ff6ada8d0d322c14bb24ab75c773e959153.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
3aaf26e7fbf94654768907baab049ff6ada8d0d322c14bb24ab75c773e959153.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
40299e478c5574c9885cb5e6bfc296fb6e5171f6db34d00a0414ecb2df18cf3e.exe
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
40299e478c5574c9885cb5e6bfc296fb6e5171f6db34d00a0414ecb2df18cf3e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
58f1ac441f84bfb9b399de0d2b5fadbd5b9a587d3eea89f1c3de6ea2ca83badd.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
58f1ac441f84bfb9b399de0d2b5fadbd5b9a587d3eea89f1c3de6ea2ca83badd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
6f9c093ac13bacf5ee4d2f6df94ed7894f1a56e23ae8944e372d28594a63a5fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
88157ed09f97ab5ca5535ead13e3569dce0a8950a32560e305aac06f62193e7d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
8e29739d0db64de82f2c1386f8ba689ab31a3b0c457102386884ac03967741c3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
9a9db30ba757d584222fa4ab88b6873356c849e54cffa8d799e5b7ffe07ec8e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
ab51d9c4b8773d3561e66fa4e023cbf994e54983899c6f7ab6be6376f7b72c12.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
b9493d5cc0930bdb4d765895c7f96f17a60376cf6cb7c307d5ce109cdf2f739a.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
b9493d5cc0930bdb4d765895c7f96f17a60376cf6cb7c307d5ce109cdf2f739a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
d5fab2df2573b325234d7158536a2632bfebcbd8c116b7e4784114559f5702eb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
fab3fc05cf6e40858439b8dc76055605de0c9972d56484e87b85a43dc73a3079.exe
Resource
win10v2004-20240508-en
General
-
Target
2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe
-
Size
6.3MB
-
MD5
a44c2b3293d3a571dd97135f7597eabd
-
SHA1
aaf0af62fda44272763977da40e933f8899d453d
-
SHA256
2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f
-
SHA512
0a5512fdd36e48ab363c6e6a0e1b275c0285261461d265284e7f18bc46c3c5ef8f59469dfdfc19627c49be3238e0e481ba846fff713b5ea4051e15b351e3b827
-
SSDEEP
196608:cUSPkm7ChnGtmpSgSfvsqRCEgiY7N46kYmDw:cFahnGIEgSHsq88YBbkBw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3900 Q-Bert Arcade - Demo.exe -
Loads dropped DLL 1 IoCs
pid Process 3900 Q-Bert Arcade - Demo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3900 Q-Bert Arcade - Demo.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1688 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1688 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3900 Q-Bert Arcade - Demo.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3900 2208 2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe 90 PID 2208 wrote to memory of 3900 2208 2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe 90 PID 2208 wrote to memory of 3900 2208 2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe"C:\Users\Admin\AppData\Local\Temp\2142fb28cf11eb0432f24155b8ceb9e5840f95098250d6398ddef4cd637e467f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q-Bert Arcade - Demo.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Q-Bert Arcade - Demo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3900
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5d97a2a9e38c1bacd600ec875c840c204
SHA1cef27af637edf6a86b2d6fb22ecd26a4c1470035
SHA2561aa3b0d030889ce25c64c1cea26563c53c65e40e826aa42aed87162e2c1f2fd2
SHA51225ec638b8f665d95e622b889a10c614d94089a2191aad10e81e10423d9ba21aea3d424e147f67f7096c367f5ee67b548ae7bd2f76cf89a19458d9451f688a5dc
-
Filesize
1.9MB
MD586e39e9161c3d930d93822f1563c280d
SHA1f5944df4142983714a6d9955e6e393d9876c1e11
SHA2560b28546be22c71834501f7d7185ede5d79742457331c7ee09efc14490dd64f5f
SHA5120a3e311c4fd5c2194a8807469e47156af35502e10aeb8a3f64a01ff802cd8669c7e668cc87b593b182fd830a126d002b5d5d7b6c77991158bffdb0b5b997f6b3
-
Filesize
7.2MB
MD528acd2a9b35fa842b9bf2ac8a89ff0fd
SHA1a203833b4782eff70caa86a96e6da5c17de9f1b0
SHA25628da176cdb4a605e54f0d1590ab8284e52f689c9cd599184ae211ba48519ac93
SHA512382c179bb9910ff62855ec873eb168c2f6cbb2a4a1a50b009a4fb43b37b2692e42611a644f8d4a693e93ff91277bb8dfdeeac5fc8a901b86e8eae3389a56717e
-
Filesize
98B
MD5bee7ae2731d086e856e07a7b8b918588
SHA1f622603e47359d27cce4e807bcf3fee717ee1450
SHA256fd5b77e901c09b15ba323aa004619a4b7a5ebed04ffe89f849875462a07b1e4f
SHA5123b57c963a1301e73c2454991766cb511f29c5f2ca082cb915491a551dba76d64789483165018943e2f3a874e12885c8cf0788cc7530e5913b944ce90a627f593
-
Filesize
1KB
MD5118f4f4575ce667bd88f2057f2c0b525
SHA1aa1d179b2f5eb59d83bcf114cdbeffcc0d4a7c4d
SHA2569dd817cc5e767fd4ef6547a1936d6f2b295564a4b89be558e5bb7a619bb8503b
SHA5126fd169429a3e64c6d688c2bad0f639fca56249a5d72a0d556ed014700ac14c7f58a7d0ae2584a27f01a42279223c18389e8c0e0679b8f4a96fb548bf397f5f9d