Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe
Resource
win10v2004-20240802-en
General
-
Target
65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe
-
Size
108KB
-
MD5
5db518612e13245fac7a88720bbc5c61
-
SHA1
8b9be1fee6d9de410539e8a201dfc23137ecc9a0
-
SHA256
65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3
-
SHA512
72024b0a2203820aa6126e9e5695aa3744092c48852b3758bade1341907e27d71b7c0e1999a04c5b821c1ead87ab6f7f43b3e3bd2c9bca1206b7eae29373eec9
-
SSDEEP
3072:i+Oa8AFGusZI5e+Mp+BC3K5eqU+BC3K5eqYro+rW:NIAFG3IaDK70K7qq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3036 qxyyhdc.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\qxyyhdc.exe 65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qxyyhdc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3036 qxyyhdc.exe 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3036 qxyyhdc.exe Token: SeDebugPrivilege 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2708 wrote to memory of 3036 2708 taskeng.exe 30 PID 2708 wrote to memory of 3036 2708 taskeng.exe 30 PID 2708 wrote to memory of 3036 2708 taskeng.exe 30 PID 2708 wrote to memory of 3036 2708 taskeng.exe 30 PID 3036 wrote to memory of 1204 3036 qxyyhdc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe"C:\Users\Admin\AppData\Local\Temp\65f6bf8c2d7990c88d7a4917d182448f5a098ec0bf0497854f8b96015201ffe3.exe"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {904F5E17-CE38-4542-92C7-3A05C5F7BAAB} S-1-5-21-3502430532-24693940-2469786940-1000:PSBQWFYT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\PROGRA~3\Mozilla\qxyyhdc.exeC:\PROGRA~3\Mozilla\qxyyhdc.exe -tljcocn2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5346ea2a581e63da3658f5c8bb4aad2d3
SHA18d1afaaad20a7e32b37a76ae6e7ef7117a410588
SHA25665227ea789d47b68b096a00ea29355e5e343bb22362fd86eb45f68a892ca4b02
SHA51284f3802b505d668eb40934b68b6b3d71f1d458f8ed376ef47d5dfabeaaa3db531fbdc26649d4e9688974bbb4b6c44d050cfc5a07fc111b679ad20a4cbea28af3