Overview
overview
10Static
static
10QQRobots 6...ts.exe
windows7-x64
3QQRobots 6...ts.exe
windows10-2004-x64
3QQRobots 6...pi.dll
windows7-x64
3QQRobots 6...pi.dll
windows10-2004-x64
3QQRobots 6...ct.exe
windows7-x64
3QQRobots 6...ct.exe
windows10-2004-x64
3˵.html
windows7-x64
3˵.html
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 17:54
Behavioral task
behavioral1
Sample
QQRobots 6.7 Build 13327 Release 2/QQRobots.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
QQRobots 6.7 Build 13327 Release 2/QQRobots.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
QQRobots 6.7 Build 13327 Release 2/QQRobotsApi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
QQRobots 6.7 Build 13327 Release 2/QQRobotsApi.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
QQRobots 6.7 Build 13327 Release 2/RobotProtect.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
QQRobots 6.7 Build 13327 Release 2/RobotProtect.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
˵.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
˵.html
Resource
win10v2004-20240802-en
General
-
Target
QQRobots 6.7 Build 13327 Release 2/QQRobotsApi.dll
-
Size
136KB
-
MD5
82b09f4c96794bf177956b9242ae8f57
-
SHA1
2ee1c4f2cd02806ed472ad0194b6c83be94858ff
-
SHA256
510aeb7ef1b4a3600d7c22918e267060e1feb332e6703973e70b68a935ded819
-
SHA512
a273c53238be03851c70e5fc9926e440ce2774901e413d88a70de1b3abbfbbc901baa610c057c7cc930e7a0e7ec871e1fff2f749450ce7a8b3de74db4fce6e0e
-
SSDEEP
1536:0HF7QFOsgOPbTQoQzwZsWCC+rdDQs04TglePNI2efpu6tCr0pS99b:0HFUh3Qt+CvxDDTg4NmrtSn9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31 PID 1728 wrote to memory of 1792 1728 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\QQRobots 6.7 Build 13327 Release 2\QQRobotsApi.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\QQRobots 6.7 Build 13327 Release 2\QQRobotsApi.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:1792
-