Overview
overview
7Static
static
32Q5G0@16/Q...Ex.exe
windows7-x64
32Q5G0@16/Q...Ex.exe
windows10-2004-x64
69Lb6~w1/19...nt.exe
windows7-x64
39Lb6~w1/19...nt.exe
windows10-2004-x64
6Hvd6d~18/i...sk.exe
windows7-x64
3Hvd6d~18/i...sk.exe
windows10-2004-x64
6VSQ0e@6/apache.exe
windows7-x64
3VSQ0e@6/apache.exe
windows10-2004-x64
6xkxkv/dms.exe
windows7-x64
7xkxkv/dms.exe
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2Q5G0@16/QQSetupEx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
9Lb6~w1/1905Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
9Lb6~w1/1905Client.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Hvd6d~18/iToolsAVMTask.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
VSQ0e@6/apache.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
VSQ0e@6/apache.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
xkxkv/dms.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
xkxkv/dms.exe
Resource
win10v2004-20240802-en
General
-
Target
xkxkv/dms.exe
-
Size
34KB
-
MD5
dde4e4e601e8b0e7d1621167b709adb4
-
SHA1
cf152fff93d8bfc7bcde44e41954a36600c4c599
-
SHA256
53a5ebfe5356da897d550be1017f0c7334d8d9971288abf1398661e288cd983a
-
SHA512
f9b561ea64f374fa3548a09e26a00ea07baa2fd2d328ebc3668e793c4ebd6c44e8f66f04634a8e3f87b6888f60cc4eb663d073f4384a49b8a435dcc56a6ac8a4
-
SSDEEP
768:ty7FJl5/ija+1IR14B38gBTHEfIYMqUVii78e/h:tCFJ/458uIyqU7j/h
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dms.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\dms = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xkxkv\\dms.exe" dms.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dms.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dms.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dms.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion dms.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion dms.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xkxkv\dms.exe"C:\Users\Admin\AppData\Local\Temp\xkxkv\dms.exe"1⤵
- Checks BIOS information in registry
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:764