Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:58

General

  • Target

    RFQ QUG24-2003700542XXX.exe

  • Size

    735KB

  • MD5

    67e8394308a06ffee627c77b7d3d16ea

  • SHA1

    e0d9daad8296d2f757cc442d1d1f1302d7aec13b

  • SHA256

    631e9daaee241678334ffae4db8bae66a2781fac9bacb73676ee248917deae3f

  • SHA512

    2081ce36d917c75157c9c2be12dfee62ea7ffee18c809eee51c7415e5ef9b1868398f2d95412b71a7d2e5d1d24570513d6a5f242f67a30744ef9ca6a401bf48a

  • SSDEEP

    12288:IWEY5/l9s22BEEzFatnMwpOl555EQK+AlkKr0HBZR6ZUlo8if:gA/l9s3BEWwpOz55/K+Alk0IeUloP

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ QUG24-2003700542XXX.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ QUG24-2003700542XXX.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mZpTaf.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3020
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mZpTaf" /XML "C:\Users\Admin\AppData\Local\Temp\tmpAED5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\RFQ QUG24-2003700542XXX.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ QUG24-2003700542XXX.exe"
      2⤵
        PID:2732

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    Scheduled Task/Job

    1
    T1053

    Persistence

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Scheduled Task/Job

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpAED5.tmp
      Filesize

      1KB

      MD5

      0022c86fd8f76dc506e033e2a80b430a

      SHA1

      faa77e76c025f3c6749ff141656d7f65c94b59d7

      SHA256

      d4dc52edab06e14e0caf53129ea07f39ee25a2d35613440292bfb48fecd5f3f7

      SHA512

      f5ce2c9f1e2f42b8c201f6de0b383e30e87f78fa85711c5e8cf7cdcc26ebc6b799b15ddbc00d86611293c397a1bc1731b99bec9696325d20f0f662ecf0386396

    • memory/2168-3-0x0000000000A40000-0x0000000000A5C000-memory.dmp
      Filesize

      112KB

    • memory/2168-2-0x000007FEF5060000-0x000007FEF5A4C000-memory.dmp
      Filesize

      9.9MB

    • memory/2168-1-0x000000013FB40000-0x000000013FBFC000-memory.dmp
      Filesize

      752KB

    • memory/2168-0-0x000007FEF5063000-0x000007FEF5064000-memory.dmp
      Filesize

      4KB

    • memory/2168-4-0x0000000000770000-0x0000000000784000-memory.dmp
      Filesize

      80KB

    • memory/2168-5-0x000000001BF30000-0x000000001BFB0000-memory.dmp
      Filesize

      512KB

    • memory/2168-16-0x000007FEF5060000-0x000007FEF5A4C000-memory.dmp
      Filesize

      9.9MB

    • memory/2732-15-0x000007FFFFFDC000-0x000007FFFFFDD000-memory.dmp
      Filesize

      4KB

    • memory/3020-17-0x000000001B310000-0x000000001B5F2000-memory.dmp
      Filesize

      2.9MB

    • memory/3020-18-0x0000000001E10000-0x0000000001E18000-memory.dmp
      Filesize

      32KB