Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
lpk.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
lpk.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
数据库【MSDE】管理工具.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
数据库【MSDE】管理工具.exe
Resource
win10v2004-20240508-en
General
-
Target
lpk.dll
-
Size
46KB
-
MD5
a192aeb6b7d6a933f9ec48febd55044d
-
SHA1
013c43417a9372b62e417b93163277bdaa646a65
-
SHA256
76fec10f245e0bc51ece5ce324571d285a0f4efd7752fff262094b7c8889e030
-
SHA512
d0326e09b10ce1b7f9f6c30a0636a6489324254a5bd775920552a6aac74f18027178b2e53f062ceaf8164cee25c2fbc5836ac75fa4229588d4040d9f35c7f671
-
SSDEEP
768:hojY9Pbi9eebwtwGYNrihCp2+UGj0W3eE1Y2ahjQQyzkojY9Po:0m0eebwtwLp27GjV3P1YdUQyzVmg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1232 hrl5340.tmp 2968 qcgxsm.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 qcgxsm.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\qcgxsm.exe hrl5340.tmp File opened for modification C:\Windows\SysWOW64\qcgxsm.exe hrl5340.tmp File created C:\Windows\SysWOW64\hra33.dll qcgxsm.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1232 hrl5340.tmp 1232 hrl5340.tmp 2968 qcgxsm.exe 2968 qcgxsm.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1472 4800 rundll32.exe 82 PID 4800 wrote to memory of 1472 4800 rundll32.exe 82 PID 4800 wrote to memory of 1472 4800 rundll32.exe 82 PID 1472 wrote to memory of 1232 1472 rundll32.exe 83 PID 1472 wrote to memory of 1232 1472 rundll32.exe 83 PID 1472 wrote to memory of 1232 1472 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\lpk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\hrl5340.tmpC:\Users\Admin\AppData\Local\Temp\hrl5340.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
-
C:\Windows\SysWOW64\qcgxsm.exeC:\Windows\SysWOW64\qcgxsm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD520a14acd4b3752293e4d612ffd8e7ca0
SHA15e60626bc8f9b572f4049b0e76f3de76e35d65f7
SHA256ac279658d287f2249aca285c4ae3b3669bb4cd0e710cdd15a4afd73d13a25b29
SHA512a79f68b4400b9f77f38bcdcd2261f19f71852f0ecad9855b4736af52d36a0655bc39824c634823928bb149c3e24eb2a6b1a6142707532f67ad90595fae395ef4
-
Filesize
7KB
MD57147ff24579a477a1a34696926e573f1
SHA19127ea8d813ecd5788b3f97777931ec79b7760e9
SHA256fd08dcb016611316c849d48312ba6dc7d4de75d1a81c1d475a13bb5a1ba07267
SHA512077b68376679c30d2dbae460ed59f5131c177bdd7574af1c2660ed97ae242b1401816d012af321c278be065b49bc9eab395e008b1b9a2447aa27b694bbed1d5d