Analysis
-
max time kernel
149s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe
Resource
win10v2004-20240426-en
General
-
Target
7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe
-
Size
408KB
-
MD5
b31529cb377581e6e40073028e7ce4f0
-
SHA1
d4319d86dd4ed3e971a4c8db24bbb1febe8a5ac7
-
SHA256
7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab
-
SHA512
6498721907f0ada65b0a9cdab8707bde672df3c61e351d15748e9f6ef49f0f101ce4661fd0b190d0fc85961fc91afe9d433ad21a5939061a96ea068ec8770771
-
SSDEEP
6144:4jlYKRF/LReWAsUyV06X0cTeb26trtjcwJLue2TAk:4jauDReWVTp6VtFuegV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cpqgd.exepid process 212 cpqgd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cpqgd.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\cpqgd.exe" cpqgd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exedescription pid process target process PID 464 wrote to memory of 212 464 7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe cpqgd.exe PID 464 wrote to memory of 212 464 7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe cpqgd.exe PID 464 wrote to memory of 212 464 7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe cpqgd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe"C:\Users\Admin\AppData\Local\Temp\7562f4773262ce50ac9d779028493d9308641878a263b936b4364d0816228dab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\ProgramData\cpqgd.exe"C:\ProgramData\cpqgd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD547dda1ca86a3253a2cf2cf48cd9c9103
SHA161a2a64c2970ad167d746973e89bd8950c4b0882
SHA2564a4078eaefa43cc90fd6162af11e4cc3227532c81259c47acde9064d5efc1b18
SHA5123db45cab921af4bbde3d4609cc6430e8bc29556b83a522ec7f72eba242efda1357a898a53805b2d3f1fa5e616c6e0881cebd1404c7457608fd2df5a70f2e75c5
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD514e817c8b663868286a9e3843586d8d0
SHA18e3518c4b0f26b127262663c6c08e03603a17b2c
SHA256fbdecf230d246108cb6bd904d174fcbeea0a46dcee85633fab06390b732cfa19
SHA51239e6142a870a56ad847c40063695a815d27a421a832ddf672bf7b5a211bef218c0d621e95948dfb2e04e239106f88980b26d4ed5f9348c11c12d2171ea2937fc