Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe
Resource
win10v2004-20240426-en
General
-
Target
861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe
-
Size
408KB
-
MD5
209f3f1fde4077051c1b4a3049676413
-
SHA1
20fcfcc0e44c6f8def6db540fe109773d140bcb7
-
SHA256
861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26
-
SHA512
0c31af526e3975381d4dbbebf8e30400e5fde3bdf41268da6db0f8c0b376280fa4d057b51f2802ecfe458d0e3d79c240703b5948b6bef0eefc639f0e3a5120f0
-
SSDEEP
12288:4jauDReWHjpeM4ujEW8uqnjtPskA1Q1vUP25J7w4QmsPzL:4DDDjpe696njtUkA1vP25J7w4QmsPzL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
qixyf.exepid process 3012 qixyf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
qixyf.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\qixyf.exe" qixyf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exedescription pid process target process PID 4152 wrote to memory of 3012 4152 861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe qixyf.exe PID 4152 wrote to memory of 3012 4152 861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe qixyf.exe PID 4152 wrote to memory of 3012 4152 861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe qixyf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe"C:\Users\Admin\AppData\Local\Temp\861bea15084d958c41721284bf4f463fa812fce526ee9400d169ad222d0e4c26.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\ProgramData\qixyf.exe"C:\ProgramData\qixyf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5585c8add50b9632159664de9b966faad
SHA1c0c77131b8d2de21754ec32c4a0e95dd761649db
SHA256e287a3f587e377049ab46ae6ecdf079b3f7f926419743ff3375b22d3fba37f2c
SHA51239bef43d89f6a1a8cc9c664853919154202b81529990605d50180f809e118a5fdc7f398f107adea9230fada3d64fe404991176eccfd0166d325cda98e533fbb3
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD538173a3b498b607cab231e5b3f431aa4
SHA1f8f24269ea20b909d3b45ac8299a99c8ae2e2d6a
SHA256658039d9d1e9bd6023b439e83956395da5f4dea705045b1eb1d9e3e2bd671420
SHA512771dc78b4e62a88641c7b7fa9398a7e6375f76ddfb4f3b6e699b379ea184bb288f0923e0dad86a8e74be551c76f037a9897c5cbb2f45138030665eb15a108561