Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
24981658666a4f40f07f37bfb48d1372.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24981658666a4f40f07f37bfb48d1372.exe
Resource
win10v2004-20240508-en
General
-
Target
24981658666a4f40f07f37bfb48d1372.exe
-
Size
36KB
-
MD5
24981658666a4f40f07f37bfb48d1372
-
SHA1
b740cf3e57f6af17eaba6ba2459cb5cd734e7e48
-
SHA256
7b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77
-
SHA512
66b10a942bac9424b162ea9d596947e001222a1c58d00d52ce6b9481af2bb8fb11e55d14f6e0ca4f8edd0d8d7094484bb787ec167d0ec13dc7beda946cd273f9
-
SSDEEP
768:SkqlrK5isV2AKTVV15bRjeK3gRJg6Dm/u5HfqyaVwsaVwCx:xKIYApC6C/4//aVwsaVwCx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 Systemqqw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Systemqqw.exe 24981658666a4f40f07f37bfb48d1372.exe File opened for modification C:\Windows\Systemqqw.exe 24981658666a4f40f07f37bfb48d1372.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Systemqqw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Systemqqw.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2080 24981658666a4f40f07f37bfb48d1372.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24981658666a4f40f07f37bfb48d1372.exe"C:\Users\Admin\AppData\Local\Temp\24981658666a4f40f07f37bfb48d1372.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
PID:2080
-
C:\Windows\Systemqqw.exeC:\Windows\Systemqqw.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD524981658666a4f40f07f37bfb48d1372
SHA1b740cf3e57f6af17eaba6ba2459cb5cd734e7e48
SHA2567b84f0641444a8e39e14f6a9f3f9363ee142acbe6fcb6dcd046d0ae2c463cf77
SHA51266b10a942bac9424b162ea9d596947e001222a1c58d00d52ce6b9481af2bb8fb11e55d14f6e0ca4f8edd0d8d7094484bb787ec167d0ec13dc7beda946cd273f9