Overview
overview
7Static
static
32Q5G0@16/Q...Ex.exe
windows7-x64
32Q5G0@16/Q...Ex.exe
windows10-2004-x64
69Lb6~w1/19...nt.exe
windows7-x64
39Lb6~w1/19...nt.exe
windows10-2004-x64
6Hvd6d~18/i...sk.exe
windows7-x64
3Hvd6d~18/i...sk.exe
windows10-2004-x64
6VSQ0e@6/apache.exe
windows7-x64
3VSQ0e@6/apache.exe
windows10-2004-x64
6xkxkv/dms.exe
windows7-x64
7xkxkv/dms.exe
windows10-2004-x64
7Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
9Lb6~w1/1905Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9Lb6~w1/1905Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VSQ0e@6/apache.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VSQ0e@6/apache.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xkxkv/dms.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xkxkv/dms.exe
Resource
win10v2004-20240802-en
General
-
Target
9Lb6~w1/1905Client.exe
-
Size
2.3MB
-
MD5
385cffc081a9a27fca690306981db564
-
SHA1
eb4c6e5caadc8acb467203ee0fc0d2215b8ac9e8
-
SHA256
5c5187f6b470d75114bdce4a681b339ed8af77f254d11702576c1c350dc67753
-
SHA512
785dc0a6838cde0bf464edc619b1959cc8bc691c931dec2eecb75c42b149efdf280bbf602cfd83da1df4dc82098cb912cc7618efc6d7f8fb9a7aa37552cc6a41
-
SSDEEP
49152:DegP6/jA7MNLYcVzknTiSvqAMBZKwz4MvlTeoTxIIqPRDlpZNJgMOwUxivP9Xcg4:DeQ7MNLjVcThqAMBZKwz4MvlTeblPRDk
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 1905Client.exe File opened (read-only) \??\T: 1905Client.exe File opened (read-only) \??\Z: 1905Client.exe File opened (read-only) \??\X: 1905Client.exe File opened (read-only) \??\B: 1905Client.exe File opened (read-only) \??\E: 1905Client.exe File opened (read-only) \??\M: 1905Client.exe File opened (read-only) \??\N: 1905Client.exe File opened (read-only) \??\R: 1905Client.exe File opened (read-only) \??\S: 1905Client.exe File opened (read-only) \??\U: 1905Client.exe File opened (read-only) \??\G: 1905Client.exe File opened (read-only) \??\O: 1905Client.exe File opened (read-only) \??\Y: 1905Client.exe File opened (read-only) \??\W: 1905Client.exe File opened (read-only) \??\H: 1905Client.exe File opened (read-only) \??\I: 1905Client.exe File opened (read-only) \??\J: 1905Client.exe File opened (read-only) \??\K: 1905Client.exe File opened (read-only) \??\P: 1905Client.exe File opened (read-only) \??\Q: 1905Client.exe File opened (read-only) \??\V: 1905Client.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1905Client.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1905Client.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1905Client.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2588 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4328 1905Client.exe 4328 1905Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4328 1905Client.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4328 wrote to memory of 452 4328 1905Client.exe 85 PID 4328 wrote to memory of 452 4328 1905Client.exe 85 PID 4328 wrote to memory of 452 4328 1905Client.exe 85 PID 452 wrote to memory of 2588 452 cmd.exe 87 PID 452 wrote to memory of 2588 452 cmd.exe 87 PID 452 wrote to memory of 2588 452 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9Lb6~w1\1905Client.exe"C:\Users\Admin\AppData\Local\Temp\9Lb6~w1\1905Client.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2588
-
-