Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12-07-2024 10:28

General

  • Target

    QQFarm.exe

  • Size

    401KB

  • MD5

    d4973e73d20cc3b14112cbfbb420d194

  • SHA1

    01238fc9c612642560a00b3f5131e133a1ec289a

  • SHA256

    01d93823c996ad8456b6d8cb99fb1eba0fcb8839a215d46a217586cbe3cd0995

  • SHA512

    0e3b838fd4350d4597cab97439d35e2584d0a3ec364dde619388956f844bc6ed85e6867dea373f4395cc79915043415fa20d6663a33e4bd3becc920e1715eb57

  • SSDEEP

    12288:uiqgX7oXKqfdkmUjDHfruw37hD6y+7y3:/qgrorWmWDHDx37Ji7y3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQFarm.exe
    "C:\Users\Admin\AppData\Local\Temp\QQFarm.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2028-0-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2028-27-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-28-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-29-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-30-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2028-31-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-32-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-33-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-34-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-35-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-36-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-37-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-38-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-39-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-40-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-41-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB

  • memory/2028-42-0x0000000000400000-0x0000000000532000-memory.dmp

    Filesize

    1.2MB