Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 05:15

General

  • Target

    a31fff8fad1071fd0911b609c2111a25dff8990b3960652c26b2b5cf9a359b1d.exe

  • Size

    10.8MB

  • MD5

    742e394a64900dbe1f229f9c8722736e

  • SHA1

    5022d87144b2ddebcb00a056c0fc0de159eb4167

  • SHA256

    a31fff8fad1071fd0911b609c2111a25dff8990b3960652c26b2b5cf9a359b1d

  • SHA512

    b91dd950882a78f1faa50622b63556d4c06ebf214a19c866494df4e1f81e1495d7db6110973427af363a7588b3fe430716958d09168adf48eb0887467c5e55ce

  • SSDEEP

    196608:hl9nHyKVAHYnN9BrwQrm7ZrYUMC94jmvBZITGi:hl9HBAHYnpW7ZrYUb94jm5ZIT

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a31fff8fad1071fd0911b609c2111a25dff8990b3960652c26b2b5cf9a359b1d.exe
    "C:\Users\Admin\AppData\Local\Temp\a31fff8fad1071fd0911b609c2111a25dff8990b3960652c26b2b5cf9a359b1d.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\AppData\Local\Temp\QS-197.exe
      C:\Users\Admin\AppData\Local\Temp\QS-197.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\ÅäÖò˵¥.ini

    Filesize

    1KB

    MD5

    ee2b6938b5c7b4419c1cc258da1fec15

    SHA1

    b185d03c64257c187b69ce6721979bd356eb2e2e

    SHA256

    c281d447bf6e6906d58bde634b1078705ba7b8cd654886b8bfbd7ccbbd5ecdf0

    SHA512

    bb5372c8247bc2514b6ad41f74bbd07272a845a1f9d3725b3f11226db31902a4f7a9385a0aeddbf4836b382297e299ea4d1d6dea3c81dd26bd2986bb8432ecd7

  • C:\Windows\MultiGame.dll

    Filesize

    155KB

    MD5

    e81487a471f97460148649350f875f84

    SHA1

    e2d0287ec204e3d499b7d27988bc8a55e69d338e

    SHA256

    96e89726f45eb75958bd4c4f508ef38336da83eca64993d39c9335600525a20d

    SHA512

    9032636dd2bfb75c20deb14ad3a4e2e25e8acfa72f6830c779e759e15d7c0e0acc649bf157500917b01dd60aecd58f6ee2e055dfeea5022829cd757e5241f7d7

  • \Users\Admin\AppData\Local\Temp\QS-197.exe

    Filesize

    10.9MB

    MD5

    e3e460e727f62a0ae4bf8e30cca6c9af

    SHA1

    5eadf9282493fb662bd1e38abecb783b39166555

    SHA256

    fcc0d74d5fd6564881c395b907f574560c317bbd0ab35df980a053374deebeb0

    SHA512

    209befa81c2a164e3325cb4449d7b6c83c21d4c1f52e79fb3e02390f81f85842cdad71d96fcd688236f57e937fe0c6c17681f88fdc07a94b72e3962e9c0bdb23

  • memory/1620-115-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1620-113-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/1620-132-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1620-131-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/1620-129-0x00000000003C0000-0x00000000003FE000-memory.dmp

    Filesize

    248KB

  • memory/2400-54-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-59-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-52-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-49-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-47-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-45-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-43-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-41-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-39-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-37-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-35-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-33-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-31-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-29-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-53-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-27-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-25-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-23-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-21-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-19-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-17-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-15-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-13-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-11-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-10-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-9-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2400-55-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-56-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-57-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-58-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-51-0x0000000001BB0000-0x0000000001BEE000-memory.dmp

    Filesize

    248KB

  • memory/2400-60-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-61-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-62-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-63-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-64-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-65-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-66-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-67-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-68-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-69-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-70-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-71-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-72-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-73-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-74-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-82-0x00000000750C0000-0x00000000750EB000-memory.dmp

    Filesize

    172KB

  • memory/2400-83-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-84-0x0000000000B62000-0x00000000010CF000-memory.dmp

    Filesize

    5.4MB

  • memory/2400-85-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-99-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-100-0x00000000750C0000-0x00000000750EB000-memory.dmp

    Filesize

    172KB

  • memory/2400-101-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-102-0x00000000750C0000-0x00000000750EB000-memory.dmp

    Filesize

    172KB

  • memory/2400-106-0x00000000750C0000-0x00000000750EB000-memory.dmp

    Filesize

    172KB

  • memory/2400-3-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2400-5-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2400-174-0x0000000000B62000-0x00000000010CF000-memory.dmp

    Filesize

    5.4MB

  • memory/2400-175-0x0000000000400000-0x0000000001BA6000-memory.dmp

    Filesize

    23.6MB

  • memory/2400-0-0x0000000000B62000-0x00000000010CF000-memory.dmp

    Filesize

    5.4MB