Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 02:44
Behavioral task
behavioral1
Sample
d591e67ebd5433c9deeb27066da4bce0N.exe
Resource
win7-20240708-en
General
-
Target
d591e67ebd5433c9deeb27066da4bce0N.exe
-
Size
468KB
-
MD5
d591e67ebd5433c9deeb27066da4bce0
-
SHA1
cd721be82f3d80daf925e9f5d8244c237f3aed95
-
SHA256
442fd96236342f9e061551efecbbed0ab015ffafb750ccb02f98891813b22a60
-
SHA512
5c05ff6567c34fd7159509d1a18db1e68dca501ce4c3a0c8f11a984821bb79738391017b140f57b9c8e052409bf9c500e60cd703c77f4e10a62d8d2aa1135cd7
-
SSDEEP
6144:QR5YGq/6VOAFdljBt4vvB8oQUQ+NCIRlavBe:K0h8BYaRU9CQgv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3080 Qhoqaa.exe -
resource yara_rule behavioral2/memory/1824-0-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral2/files/0x000a00000002334f-10.dat upx behavioral2/memory/3080-13-0x0000000000400000-0x0000000000477000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d591e67ebd5433c9deeb27066da4bce0N.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job d591e67ebd5433c9deeb27066da4bce0N.exe File created C:\Windows\Qhoqaa.exe d591e67ebd5433c9deeb27066da4bce0N.exe File opened for modification C:\Windows\Qhoqaa.exe d591e67ebd5433c9deeb27066da4bce0N.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qhoqaa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qhoqaa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 111996 3080 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d591e67ebd5433c9deeb27066da4bce0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qhoqaa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\Main Qhoqaa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe 3080 Qhoqaa.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1824 d591e67ebd5433c9deeb27066da4bce0N.exe 3080 Qhoqaa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 3080 1824 d591e67ebd5433c9deeb27066da4bce0N.exe 88 PID 1824 wrote to memory of 3080 1824 d591e67ebd5433c9deeb27066da4bce0N.exe 88 PID 1824 wrote to memory of 3080 1824 d591e67ebd5433c9deeb27066da4bce0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d591e67ebd5433c9deeb27066da4bce0N.exe"C:\Users\Admin\AppData\Local\Temp\d591e67ebd5433c9deeb27066da4bce0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\Qhoqaa.exeC:\Windows\Qhoqaa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 9443⤵
- Program crash
PID:111996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3080 -ip 30801⤵PID:111964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5d591e67ebd5433c9deeb27066da4bce0
SHA1cd721be82f3d80daf925e9f5d8244c237f3aed95
SHA256442fd96236342f9e061551efecbbed0ab015ffafb750ccb02f98891813b22a60
SHA5125c05ff6567c34fd7159509d1a18db1e68dca501ce4c3a0c8f11a984821bb79738391017b140f57b9c8e052409bf9c500e60cd703c77f4e10a62d8d2aa1135cd7
-
Filesize
364B
MD569e795581f1fabb531871b9d438809e1
SHA1bed8755e8afe9661aa8b0f5da221a3f2eca217d0
SHA2560f45e2942d705b3cbf2f2b79efd599d7b548513af44f3ed310e7d7325c64659a
SHA512a38607c4b1b196f811a2aa95d19bc80f4541c356985654972d59353e8c037982c46a2fcacae27690bdb3230b451b993ed2fc068d8986274837ee223afae64015