Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe
Resource
win10v2004-20240802-en
General
-
Target
0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe
-
Size
10.4MB
-
MD5
ddfb1b1851b82a8faf4efc30e0920a2c
-
SHA1
5ae74181cb3070f95dae47d516fce38dabb2ca12
-
SHA256
0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5
-
SHA512
a62e00672b7108da3511696ec54a8f5641c28d50ae67c33f314d17d290de45a73f66480f067353b28db170ccb8dff3d1a2d84aa5c84eb4c4323274286e00abe2
-
SSDEEP
98304:rdcN81M9ap6prSwzbs3usPB5aEc9fiQXHZKdmll0OKOVP:rE81fXwzITaf9fNX5Kdml17t
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 QKWebGame.exe -
Loads dropped DLL 3 IoCs
pid Process 2836 QKWebGame.exe 2836 QKWebGame.exe 2836 QKWebGame.exe -
resource yara_rule behavioral1/memory/1544-0-0x0000000180000000-0x00000001801CF000-memory.dmp upx behavioral1/memory/1544-2-0x0000000180000000-0x00000001801CF000-memory.dmp upx behavioral1/memory/1544-3-0x0000000180000000-0x00000001801CF000-memory.dmp upx behavioral1/memory/1544-5-0x0000000180000000-0x00000001801CF000-memory.dmp upx behavioral1/memory/1544-4-0x0000000180000000-0x00000001801CF000-memory.dmp upx behavioral1/memory/1544-18-0x0000000180000000-0x00000001801CF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QKWebGame.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2704 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe Token: 33 1988 mmc.exe Token: SeIncBasePriorityPrivilege 1988 mmc.exe Token: 33 1988 mmc.exe Token: SeIncBasePriorityPrivilege 1988 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 mmc.exe 1988 mmc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2788 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 31 PID 1544 wrote to memory of 2788 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 31 PID 1544 wrote to memory of 2788 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 31 PID 2788 wrote to memory of 2704 2788 cmd.exe 33 PID 2788 wrote to memory of 2704 2788 cmd.exe 33 PID 2788 wrote to memory of 2704 2788 cmd.exe 33 PID 1544 wrote to memory of 2968 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 34 PID 1544 wrote to memory of 2968 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 34 PID 1544 wrote to memory of 2968 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 34 PID 1544 wrote to memory of 324 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 36 PID 1544 wrote to memory of 324 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 36 PID 1544 wrote to memory of 324 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 36 PID 324 wrote to memory of 1704 324 cmd.exe 38 PID 324 wrote to memory of 1704 324 cmd.exe 38 PID 324 wrote to memory of 1704 324 cmd.exe 38 PID 324 wrote to memory of 2548 324 cmd.exe 39 PID 324 wrote to memory of 2548 324 cmd.exe 39 PID 324 wrote to memory of 2548 324 cmd.exe 39 PID 324 wrote to memory of 2544 324 cmd.exe 40 PID 324 wrote to memory of 2544 324 cmd.exe 40 PID 324 wrote to memory of 2544 324 cmd.exe 40 PID 1544 wrote to memory of 2672 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 41 PID 1544 wrote to memory of 2672 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 41 PID 1544 wrote to memory of 2672 1544 0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe 41 PID 1988 wrote to memory of 2836 1988 mmc.exe 44 PID 1988 wrote to memory of 2836 1988 mmc.exe 44 PID 1988 wrote to memory of 2836 1988 mmc.exe 44 PID 1988 wrote to memory of 2836 1988 mmc.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe"C:\Users\Admin\AppData\Local\Temp\0f8c23fc66da3c07096326add942aeaf352f20fa108c3abfbd3dada841322ac5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2704
-
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" -f C:\Users\Public\Pictures\Ca02g.xml2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2968
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Roaming\g0Cw6.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v ConsentPromptBehaviorAdmin /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:1704
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2548
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v PromptOnSecureDesktop /t reg_dword /d 0 /F3⤵
- UAC bypass
PID:2544
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c copy /b C:\Users\Public\Pictures\1tBze\d8X1C~f1\p+C:\Users\Public\Pictures\1tBze\d8X1C~f1\w C:\Users\Public\Pictures\1tBze\d8X1C~f1\DuiLib_u.dll2⤵PID:2672
-
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Public\Pictures\1tBze\d8X1C~f1\QKWebGame.exe"C:\Users\Public\Pictures\1tBze\d8X1C~f1\QKWebGame.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392B
MD530d6eb22d6aeec10347239b17b023bf4
SHA1e2a6f86d66c699f6e0ff1ac4e140af4a2a4637d1
SHA256659df6b190a0b92fc34e3a4457b4a8d11a26a4caf55de64dfe79eb1276181f08
SHA512500872c3f2f3f801ec51717690873194675cb7f32cc4a862c09d90c18638d364d49b0e04c32323f52734e5c806e3503a63ac755c7019d762786a72840123df76
-
Filesize
1.8MB
MD5e16f0b62de12aaff7a24a315d690c900
SHA19c948f3047a98dd6145ad02f53d9f838d314b128
SHA2565afb82b21dd4bf9ae78616508fccf764aefb924b730170f3feb991a9fcd69185
SHA512e0e99e3f78a91830d831419d9699908a9d71488d4b0ff8a21554079e0ee66c2f84a8901252de508f93d93a9789a983cb7641486c678cbf418f5a255af0cc2b4f
-
Filesize
179KB
MD537cdfe167ddf3907517f4ff2fc77cc55
SHA1e05eab66aa7c9b01454992bc6cbabb65d3bf9a2c
SHA2567cfca7e5ca6a753a9fb9657327870d0ac2e7c80a9b621a53c624e08e0e57c10c
SHA512705e7b3049a2b065e95cd23420bcb45a6ffc9120c3e4725aa913464d4a5e0c14c44877ae90c67ea443c166ca772b1300a3ca9f054e5795315bdcf300993899a3
-
Filesize
281KB
MD548bbd491254798b9c54870e9ff2d828c
SHA159f1bb621348d88dd00af7832c4bb59751af9272
SHA256b805a1d6509c7b272f4d8085a651021dd49699f846c65b853c5d01ddd11d4cc8
SHA51292cb432036de54396a53faeaa709948108a3db2eae396644ffe6f34aa7b83ce283739eb764d7e0d88b79c6a4699429daf29c17315ad289d20c3c54570f3db924
-
Filesize
944KB
MD5fe6c0f5cc5d3f845c2bfe96495cfa19c
SHA16233c9cc0e19b7c4cf5ad128b334b0499d51a391
SHA25663a3021096d01789d833433f923951b3ce5e1fa26f18d91006c5255b4d743d39
SHA51244372bee926598a1cd26c03b2bb178d510c857039127b8d99da7e86c1d215cb462126288c2db897f9d1a032205d56bb023be219505aed02917b235343e50d508
-
Filesize
944KB
MD583da137e013e8c46af0040db9fc48144
SHA10b17156c4aa3ddab4b7c2f5cbcaa99e621427f08
SHA2561315ba541596c3ed1ee7276ca185f53197c5443d44f5a2a680ca30803e7d4175
SHA512a3cc114a86a862e2f0716f2b3fc326908c165a30e376d1c8aac09e7232e56d94a90d18d996bee576aab5b1ee17052d832ad3ca52a0cff54980891e56b2b320ad
-
Filesize
138KB
MD5b9b83dbbce575e349911a0d2e9adc0ac
SHA17b30d05cb495da9790d2eb2566ca5e587d52c10e
SHA2560a57f3ef7a95b7de7d355dce93765a86103e56ce580957ef04c00e8fdaa7cf6b
SHA512e66378a5e80b318476cfc4d124139d34ab95e3e317f66c4bac64bc2616c3d123c05502552f6262a1a08e9b42992d0bb777d45150c22cace337d571c1b966e906
-
Filesize
222KB
MD5c9b9a4107b653130ef74406e7f758482
SHA151bdee3a32f45f48a7974f810070bade3f15b8d3
SHA25655c1fb9d0785b8f73b6e87bc6e5ea09c0ced8581cc37db004893f3e5150d7031
SHA512caf5a8af356d7bd147bd0ec38a9c8c9c9b2fcaaa2fa139522bd005b1bb64df06f837acc7577148457a754e2671e56f140850c6970b076eb2bdf99f4776d69621