Resubmissions

29/08/2024, 14:14

240829-rkefeswbqd 3

29/08/2024, 11:59

240829-n5v25azfpa 1

Analysis

  • max time kernel
    1799s
  • max time network
    1575s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 14:14

General

  • Target

    libQt6WebEngineCore.so.6.6.3

  • Size

    458.7MB

  • MD5

    92fbcc360575e9da0a223585a328422c

  • SHA1

    2ec7abeb25a02feb5c54c37a3d757e5cb221646b

  • SHA256

    d2c80bac382b2ba284d2bcc098b74eafd778501ab6d4ed7857c859563a11473b

  • SHA512

    865ba09def84b7be4b897a95a790035f3b8b0636aa6e0394d08f0f92505bbab54b11ca017b6d527653fed8597541a7bedd81571916bcb185a890fb0610c96716

  • SSDEEP

    6291456:qKFBmwTVKQZLv2MG6UXeWYSYlzx6YFwmdcp9vrt7frcW6G/CGWWV:qsbBPZLv2h6UXeWYSCzXSmda336G

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\libQt6WebEngineCore.so.6.6.3
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\libQt6WebEngineCore.so.6.6.3
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\libQt6WebEngineCore.so.6.6.3"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    6a5cd01d296277750c53aa2e73cffbb8

    SHA1

    5f1ea81593fea04a5605a372366a630a17e72cbd

    SHA256

    d62b1b06da84442f0ad5eedb73c713fa29ac9a8742daf54816ef14c901671fab

    SHA512

    b35f502e624f02b64395a4c678cde9c30b664ccd79972e3ff82c2360bb7a37d20ef7c564b0e5aa3e6df17fd3e0c20792b71699a15b65259fc5c650ec7e84805b