Overview
overview
7Static
static
32Q5G0@16/Q...Ex.exe
windows7-x64
32Q5G0@16/Q...Ex.exe
windows10-2004-x64
69Lb6~w1/19...nt.exe
windows7-x64
39Lb6~w1/19...nt.exe
windows10-2004-x64
6Hvd6d~18/i...sk.exe
windows7-x64
3Hvd6d~18/i...sk.exe
windows10-2004-x64
6VSQ0e@6/apache.exe
windows7-x64
3VSQ0e@6/apache.exe
windows10-2004-x64
6xkxkv/dms.exe
windows7-x64
7xkxkv/dms.exe
windows10-2004-x64
7Analysis
-
max time kernel
96s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
9Lb6~w1/1905Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9Lb6~w1/1905Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VSQ0e@6/apache.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VSQ0e@6/apache.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xkxkv/dms.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xkxkv/dms.exe
Resource
win10v2004-20240802-en
General
-
Target
Hvd6d~18/iToolsAVMTask.exe
-
Size
446KB
-
MD5
e4d5dd31c405c19c69180d4e2206bab5
-
SHA1
1f01c589d383f361b4bb442476592f03ce10d173
-
SHA256
b78c80aad5b20278e54b64f74dc8f98ab573d48b133d1a9178c53e57d8e5258f
-
SHA512
35f46c8d33fa761e91169138f38beec5e51d735b23e4ca3894e7b0daf4c687a7f22029a2c8b80d1c46cefd5c2e7697f74646eedb8aa3161efc4fd142485562ff
-
SSDEEP
6144:hYgPVIgDuWLucpXqg0GDZujr3HcMUFyRaWbma+uoYmb:hPVIwuWLurTGDA+Mi
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: iToolsAVMTask.exe File opened (read-only) \??\R: iToolsAVMTask.exe File opened (read-only) \??\X: iToolsAVMTask.exe File opened (read-only) \??\L: iToolsAVMTask.exe File opened (read-only) \??\M: iToolsAVMTask.exe File opened (read-only) \??\O: iToolsAVMTask.exe File opened (read-only) \??\P: iToolsAVMTask.exe File opened (read-only) \??\V: iToolsAVMTask.exe File opened (read-only) \??\B: iToolsAVMTask.exe File opened (read-only) \??\G: iToolsAVMTask.exe File opened (read-only) \??\I: iToolsAVMTask.exe File opened (read-only) \??\W: iToolsAVMTask.exe File opened (read-only) \??\S: iToolsAVMTask.exe File opened (read-only) \??\U: iToolsAVMTask.exe File opened (read-only) \??\Z: iToolsAVMTask.exe File opened (read-only) \??\J: iToolsAVMTask.exe File opened (read-only) \??\N: iToolsAVMTask.exe File opened (read-only) \??\Q: iToolsAVMTask.exe File opened (read-only) \??\Y: iToolsAVMTask.exe File opened (read-only) \??\H: iToolsAVMTask.exe File opened (read-only) \??\K: iToolsAVMTask.exe File opened (read-only) \??\T: iToolsAVMTask.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iToolsAVMTask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 iToolsAVMTask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz iToolsAVMTask.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2856 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 iToolsAVMTask.exe 1092 iToolsAVMTask.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1092 iToolsAVMTask.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1092 iToolsAVMTask.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1092 wrote to memory of 2264 1092 iToolsAVMTask.exe 86 PID 1092 wrote to memory of 2264 1092 iToolsAVMTask.exe 86 PID 1092 wrote to memory of 2264 1092 iToolsAVMTask.exe 86 PID 2264 wrote to memory of 2856 2264 cmd.exe 88 PID 2264 wrote to memory of 2856 2264 cmd.exe 88 PID 2264 wrote to memory of 2856 2264 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hvd6d~18\iToolsAVMTask.exe"C:\Users\Admin\AppData\Local\Temp\Hvd6d~18\iToolsAVMTask.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2856
-
-