Overview
overview
7Static
static
32Q5G0@16/Q...Ex.exe
windows7-x64
32Q5G0@16/Q...Ex.exe
windows10-2004-x64
69Lb6~w1/19...nt.exe
windows7-x64
39Lb6~w1/19...nt.exe
windows10-2004-x64
6Hvd6d~18/i...sk.exe
windows7-x64
3Hvd6d~18/i...sk.exe
windows10-2004-x64
6VSQ0e@6/apache.exe
windows7-x64
3VSQ0e@6/apache.exe
windows10-2004-x64
6xkxkv/dms.exe
windows7-x64
7xkxkv/dms.exe
windows10-2004-x64
7Analysis
-
max time kernel
98s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
9Lb6~w1/1905Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9Lb6~w1/1905Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VSQ0e@6/apache.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VSQ0e@6/apache.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xkxkv/dms.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xkxkv/dms.exe
Resource
win10v2004-20240802-en
General
-
Target
VSQ0e@6/apache.exe
-
Size
20KB
-
MD5
eb4e26ad3a0e681c2faabbacb0691a34
-
SHA1
55781c8ed0dc76e4edfb91ee01267783ed2434f5
-
SHA256
f2acdf171e603203f422ba64bfe2644a8e125657c96dd626cfd323e9f87c88d1
-
SHA512
d177bfd6433207e2dcec3a05749a28693b891674b5f6c0dd9438bc75b5e6ee7c13d483ecd5bda9d8097f105d7976cbcf16612c53c8df6932f8d3aafb4435562f
-
SSDEEP
384:Cvwf3dXEAwtPMukyZUEgbmO7jRUyb0yu8/sqtVG:XflE3tPv5ZmjRUSufqnG
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: apache.exe File opened (read-only) \??\H: apache.exe File opened (read-only) \??\L: apache.exe File opened (read-only) \??\N: apache.exe File opened (read-only) \??\O: apache.exe File opened (read-only) \??\M: apache.exe File opened (read-only) \??\R: apache.exe File opened (read-only) \??\T: apache.exe File opened (read-only) \??\W: apache.exe File opened (read-only) \??\E: apache.exe File opened (read-only) \??\G: apache.exe File opened (read-only) \??\I: apache.exe File opened (read-only) \??\K: apache.exe File opened (read-only) \??\S: apache.exe File opened (read-only) \??\U: apache.exe File opened (read-only) \??\V: apache.exe File opened (read-only) \??\Y: apache.exe File opened (read-only) \??\Z: apache.exe File opened (read-only) \??\B: apache.exe File opened (read-only) \??\J: apache.exe File opened (read-only) \??\P: apache.exe File opened (read-only) \??\Q: apache.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apache.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 apache.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz apache.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2240 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4816 apache.exe 4816 apache.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4816 apache.exe Token: SeDebugPrivilege 4816 apache.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2408 4816 apache.exe 87 PID 4816 wrote to memory of 2408 4816 apache.exe 87 PID 4816 wrote to memory of 2408 4816 apache.exe 87 PID 2408 wrote to memory of 2240 2408 cmd.exe 88 PID 2408 wrote to memory of 2240 2408 cmd.exe 88 PID 2408 wrote to memory of 2240 2408 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\VSQ0e@6\apache.exe"C:\Users\Admin\AppData\Local\Temp\VSQ0e@6\apache.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2240
-
-