Analysis

  • max time kernel
    130s
  • max time network
    164s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-05-2024 01:45

General

  • Target

    qbittorrent_4.6.4_x64_setup.exe

  • Size

    34.0MB

  • MD5

    918224925563095d15dbab7c34b3bf17

  • SHA1

    33902285adf411e5824547e849a4adcfc6531114

  • SHA256

    96bac43faac2b1fa5e0bc495975b2e642af5da181e313a9c8f541912b83c0edb

  • SHA512

    4d6bd949693ea60671ddb8dc19ec87d8e02bf4888aca290318488ca696e495e13bf49161ac8f75cfff9befb72589ab2bedcd1138fa9d81c5bf071191d6344b28

  • SSDEEP

    786432:7KMXiEtPqJO5MB3/UOd64S49KmFRc85C2uWF3Dzn:7DXioy0DOd6o1HtuW5/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qbittorrent_4.6.4_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\qbittorrent_4.6.4_x64_setup.exe"
    1⤵
    • Loads dropped DLL
    PID:3524
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4504
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      224B

      MD5

      e66d36cbcfd69fdf8db6e5c649137ef1

      SHA1

      c1ce08cca33347fe58f95f78f61c31ac6501f511

      SHA256

      15376656ff62df570727bcac73caf451fbe0599729bb4bf648b5e65b3e97f5f4

      SHA512

      78a8c44885ce2f1a035a3075a50027d6eff5c1adbc4d4d134880b1aced5e5d0f70fb6ca8cb037327ec4890a392b3be84eb85c72f38d4cfac985afab64b7c81bc

    • \Users\Admin\AppData\Local\Temp\nshF1A5.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      50016010fb0d8db2bc4cd258ceb43be5

      SHA1

      44ba95ee12e69da72478cf358c93533a9c7a01dc

      SHA256

      32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

      SHA512

      ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

    • \Users\Admin\AppData\Local\Temp\nshF1A5.tmp\UAC.dll

      Filesize

      14KB

      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/4504-27-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-30-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-17-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-16-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-18-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-19-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-20-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-22-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-23-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-21-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-26-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-14-0x00007FF9A0725000-0x00007FF9A0726000-memory.dmp

      Filesize

      4KB

    • memory/4504-28-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-13-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-32-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-31-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-29-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-33-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-35-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-36-0x00007FF95CC10000-0x00007FF95CC20000-memory.dmp

      Filesize

      64KB

    • memory/4504-34-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-37-0x00007FF95CC10000-0x00007FF95CC20000-memory.dmp

      Filesize

      64KB

    • memory/4504-15-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-289-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-288-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-290-0x00007FF9A0680000-0x00007FF9A085B000-memory.dmp

      Filesize

      1.9MB

    • memory/4504-286-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB

    • memory/4504-287-0x00007FF960710000-0x00007FF960720000-memory.dmp

      Filesize

      64KB