Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe
Resource
win10v2004-20240730-en
General
-
Target
6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe
-
Size
624KB
-
MD5
81e2b22d58f6ee8cfeec87824c722f55
-
SHA1
b2af8ce22e8b11e79b5a518cda61a50036cd8175
-
SHA256
6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a
-
SHA512
d51cd9d51eac39710d992efdfb027fe68b027cebf255ffa82df95d3a87b2aa121ee04ca059eb5e4ac1df7ef02b328f0e4e68476bdc64a17cfefb59e35f2cfc18
-
SSDEEP
12288:P1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0tmJTN2msCQhrWvZ+tVMy1d7Jb:P1/aGLDCM4D8ayGMwJTNa0vZ3yb7B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2380 qlqlp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3881032017-2947584075-2120384563-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\qlqlp.exe" qlqlp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qlqlp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3648 wrote to memory of 2380 3648 6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe 84 PID 3648 wrote to memory of 2380 3648 6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe 84 PID 3648 wrote to memory of 2380 3648 6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe"C:\Users\Admin\AppData\Local\Temp\6f289253d4adb92d784b4704bc1dc7314c9df72d47445b687f1cf889658ea55a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\ProgramData\qlqlp.exe"C:\ProgramData\qlqlp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624KB
MD52c574ee6ce93b3e89f52606be05fb682
SHA1d49e114d9bdfacd23b96958619924bb14f83fec8
SHA256c42cf89d15889649a5733af9c58ae89125b9789f92c88903cd0784098ce71bdb
SHA512b8faf9831bff3938b2e235157c53194fecad7daa1c52b2663116b7c158a59f49878061b8fd810c896c3907246908b0e9b554e75ef18695571c7d390a35582406
-
Filesize
255KB
MD53b199066399b355a1567696853b81067
SHA1fc6141e5285acc40a362420ee5779b90b16aea64
SHA256b79fa16bcf19176850f07c841a98aefb3f149bf9004dcd70f71fdc980e3fec1d
SHA51248d87eed230ab65fdd4e00e528ca334123d1fd41a315b3428dbad35158083057bd92a091fdf77982a756851ac22fb8f18e7edcaf0e7625c938a2412ac5e24198
-
Filesize
369KB
MD5fe43c41e0079604b5e86102d8166d17f
SHA1e27c651356342b994d2eff2ae7b2ea488998d33d
SHA256d2cb2a5ada33d7ab4c1821ff59898f10a27d623e3b08c709164589d4626e9879
SHA512c2636dfe6854080c0ea116566016f4cc351003a3093525c9e5fcb047fa042cfb9065d024623aa7aaf1520744e5761993c5d68634876bf15bcabca3c6d62cf6df