Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
submitted
22/08/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe
Resource
win10v2004-20240802-en
General
-
Target
85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe
-
Size
79KB
-
MD5
e79e170cb8d348526bbd4528a8ca1c1b
-
SHA1
05bab8cf82cc50ac29dbc91800a16a17174e7935
-
SHA256
85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0
-
SHA512
da26bd3fd96e2f51e7ce6e7633f9d466839ce3c10f8c6ebd72200852d27f3b3a0ee3663b7b1fb21707d05d0869fc7d8015dee1af41c17ec16111f2c7440707e1
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOhjzJG:GhfxHNIreQm+HiKjzJG
Malware Config
Extracted
qqpass
http://www.zigui.org/article.php?id=103822
-
url
http://www.mxm9191.com/myrunner_up.exe
-
user_agent
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Signatures
-
Qqpass family
-
Executes dropped EXE 1 IoCs
pid Process 5092 rundll32.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe File created C:\Windows\SysWOW64\¢«.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe File created C:\Windows\system\rundll32.exe 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1724353364" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1724353364" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5092 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 5092 rundll32.exe 5092 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1516 wrote to memory of 5092 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 87 PID 1516 wrote to memory of 5092 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 87 PID 1516 wrote to memory of 5092 1516 85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe"C:\Users\Admin\AppData\Local\Temp\85ed987a1a9b21f1f74cdf4b06dd3ae3963da53d2a36fe25194b24756c63d7b0.exe"1⤵
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5de6bd6c1d486bf5357413f6b4ba4d68b
SHA1acc77abbe1b62b0925c3614d88f09c7546a49be9
SHA2567fae968336a1a72596c5daba92749c9fe8ef42c31cc234fc84d6a2cac3d7f893
SHA5126f4ddae4080ffec90d409cbfd354f09493348a43d9e89fda0579f476e7b36212436a048f3d0ae81b9e3c46909cefaf5b9118b7de238ca7ee5ecdb7fad01270e1
-
Filesize
74KB
MD519965f201b4b2d0b45a001a26c7d03e0
SHA1cff8b9db4dc41ffb1efb8969c22d6d6c202c39a3
SHA256bc0779a24ca9d11b6bb8925f0161eacfc2b93ca0765ab295c7af7f7c459a6a8b
SHA512a5153b396a9752abf5eedffa3012dec6125cabe546b6800282396de74422b00d6a00bd74f3223388e075e23f8cc9195b030aa9b289cb69d48592d886d324df6d