Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 10:58

General

  • Target

    QuickUpgrade.exe

  • Size

    421KB

  • MD5

    8050d4606a492a8c9d9613152f9abf76

  • SHA1

    cf26af41c84fb12310e3459dfc919e1e139d7d62

  • SHA256

    485e6b46d8cea429a923728fd25f4f61cf3cea3f9a441afb616a4b3aa247e461

  • SHA512

    318b52292ed83888b2d130df0376ee6bf095fa0931f7f94e8f95e4cc49af331ead8da284aa99f4bad6a9c0cdaac6e5b4fab2a89f1eb96ea577d8a19fa872efa6

  • SSDEEP

    3072:IO/MhH3DRb2Dg3gNgdIQ3WruEEtPoAWY07Dk4VQzPLyQKlQ2k7HoZ7WK7TBaR0pr:JI39bkgwa3WSZtQAb0ntxQ27WG4RCv/

Score
6/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe
    "C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:304
      • C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Users\Admin\AppData\Local\Temp\processlasso.exe
          /postupdate
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1152
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {380B3501-8131-4E96-B92D-A651F75CE494} S-1-5-21-1385883288-3042840365-2734249351-1000:RPXOCQRF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe
      C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe ----------------------------------------------------------------
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da96d3d4904329c5f5e0ca02a18ca2d3

    SHA1

    5cab97235b4eabc57f6d00478e16cc919164e0e0

    SHA256

    da77df09ef6831cf0d91f9bf37a5bb103847ac790d276233f5a952a572fc7df1

    SHA512

    3cf3c14f8e6cb16ee1a29aea398752785f56dd3b094c53f8179a7d07d0a1a059943ae1133c3d32316c82d54e6fb537c4950e07aef6c7b3fb01f4daf15ec693a1

  • C:\Users\Admin\AppData\Local\Temp\CabB3F6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe.Replacement

    Filesize

    422KB

    MD5

    fa64f6ca0506e75ff04d1041cf57e540

    SHA1

    1b1a1f28db59a49b913e70fdf7c2f4a1f765ea69

    SHA256

    4b8c496606f49767a0e368acb95fb7eee92f423227b99e826b0b9997fa00217b

    SHA512

    37484b840ec1c4e67000a5354045adc52b0a9a439a360979be9cd07f9e398f4037da656bd1016f5787b915e0548da12b27c0d93afd16473d2b4b8e1e1b21362d

  • C:\Users\Admin\AppData\Local\Temp\TarB4A4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe

    Filesize

    2.6MB

    MD5

    f3ec871cf4deedd0df35b19a88a5ba99

    SHA1

    a117915167299a6a61ff13a07302c18e1ffbcc06

    SHA256

    944f32418d26ae9f4b955422410c924940fb597f0feac8dba7663c270fcf9462

    SHA512

    4815c6e33781b32296f3874d032362719ebff1c83c5d9452dec2ae24b155093633ab9005061e42a0aa9baa8dbcff1fd6a0f1e06152035285d60b1c046c6a6db1

  • C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe

    Filesize

    141KB

    MD5

    94a60f039968f05035b5d6a28c81bbd8

    SHA1

    f815496d02429d586b72955b2b64532fcf524e50

    SHA256

    a32dab9b1fb3da1ca56a1fca2262de12eb61e53ecb134a3c4d3549f7ce154808

    SHA512

    86c1d90c4e550d51e58ec6cf971865961db88eac26edcc566f5b29cd350d67db1d6cf21a5f8852aa6c85383b7c350f8259eacad48e5dc90caf6159b851fe7a47

  • C:\Users\Admin\AppData\Local\Temp\pl_rsrc_english.dll

    Filesize

    1.9MB

    MD5

    870e780dbc822d555fb32c9a29829aff

    SHA1

    f067406bdc3185a9b04f66002c21d881ecb5ba61

    SHA256

    5d38250c54b31c8861932dc29c926265ca450514865d6a96336d94b9e3fd41c3

    SHA512

    a1849cf29c60d9127e649e1b9df7cba972ed0adb6583d7d68e446918e1e94d8703d0def534ea1c8699cd3727338ff528601a05e616e1283168758e0fde79d7a8

  • \Users\Admin\AppData\Local\Temp\PostUpdate.exe

    Filesize

    615KB

    MD5

    dedc52876c60294151f79ba3ec62a1d2

    SHA1

    a7fe9b9e6ec8ce524d6d37ba351dd89e387961f1

    SHA256

    b9e375a220cfa31c35563381818adb488321ea8365940825a9d4f1ee303cb1ca

    SHA512

    40c897425ff794a82a81ac3c6c4de50a2eda1c9b0cfe7e8241efdc9dbee0ddcced12c8c5be03acd8862ba7ca710856b5d43feeecae69c0e3fbd39db1fbf5c9f7

  • \Users\Admin\AppData\Local\Temp\ProcessLasso.exe

    Filesize

    1.6MB

    MD5

    c37112a7b09342e0b7c60d07ca0080b8

    SHA1

    ef0b0acd2ddf00da9fe1dd075210b761c3bdadb5

    SHA256

    f3a6b930505d4f2bceab83305958263ed24916c625f37d58958f9f37f78d948b

    SHA512

    8932e9e2232600a09f160323f7eb857633f674fcfc783648b9726a78e355ad77e68d7572a344c2ccc9ede844a1161234370ea6fa2a67ab911247c934ef947819

  • \Users\Admin\AppData\Local\Temp\pl_rsrc_temp.dll

    Filesize

    1.9MB

    MD5

    6624738e851815fe0e04e375ee221d9f

    SHA1

    01f37c1b6f63cc1812794ea0541be77a739a6bf8

    SHA256

    d9a1bdae9b17d9f1385b07c8fb196c66ba5c6046f00f86651dd457ebcc1201c6

    SHA512

    2c4e176ae541317aeb411f4c084a510e22963854d1615532a9193c03329f93a3d04d474aa6050facd1c51e84a6fdcb581fc305bd2f5c9ddc58066170e1294a4f