Analysis
-
max time kernel
4s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe
Resource
win7-20240903-en
Errors
General
-
Target
9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe
-
Size
2.1MB
-
MD5
c5034b6775785e1028cd88bbe0668d17
-
SHA1
1accb10339dbd6c90b310260a87d2116049f4f9d
-
SHA256
9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884
-
SHA512
72d37d963d6c1250aefad13da35b94d279016012198779f97027dd425194a085ddc4348eac05b593c12a4bb8bb4d9b6949a1f54d5e0a5956c2a252f0bf42d895
-
SSDEEP
49152:URbj8KejhM9uPSGGRvCYJRb5wEtdR/5s3x2BOUIKaqCCB:UhQDhM4GRxRb5wSdK1UIKaqXB
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation QL.exe -
Executes dropped EXE 1 IoCs
pid Process 3396 QL.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
resource yara_rule behavioral2/files/0x0008000000023444-8.dat upx behavioral2/memory/3396-12-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\QL.exe 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe File opened for modification C:\Windows\Fonts\QL.exe 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QL.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1812 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3396 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe 82 PID 3436 wrote to memory of 3396 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe 82 PID 3436 wrote to memory of 3396 3436 9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe 82 PID 3396 wrote to memory of 4776 3396 QL.exe 83 PID 3396 wrote to memory of 4776 3396 QL.exe 83 PID 4776 wrote to memory of 1812 4776 cmd.exe 86 PID 4776 wrote to memory of 1812 4776 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe"C:\Users\Admin\AppData\Local\Temp\9e2fcb01c49b561ff095058f1b0e8f42bb1aceb3c3149f4fdc8731085748a884.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\Fonts\QL.exeC:\Windows\Fonts\\QL.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\830B.tmp\830C.tmp\830D.bat C:\Windows\Fonts\QL.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\timeout.exeTIMEOUT /T 5 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:1812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b079a1b93512efa8f6e892bb7e7ac44e
SHA1302d570cccff30c4f3d910a7ab79fb799275b025
SHA256dc4ec9db40dd219cb792e63112e4d9ad2ad466a1cd427dfe3a0f5b7c1ffc0f6c
SHA51233a7764577b3b9c6ced0ad761176c1152afa4fc26e96d57eeeaea6bf0eef3666616ab4ddb931c1ea75b2fe2ff8a1544beb03b1eceb662fdba8e29e8996c7a5a3
-
Filesize
46KB
MD5b42b4b3ac9ad182c006dabf81b3d15ed
SHA1d6515325ef81f5f0f0e43f4693417b3e086e84f5
SHA2560095b838474e81b0e3dd411468ba9fe10947a0035df551556c1124fadf457d8c
SHA5126eacda66fe309033c4d57fbd3ffa935cc20c4969911fd48d860a2957371036d52edd29d3fb3c1b48cc8eaecf22142b2d5df5922f3a46d6d6858090237a3b6704