Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe
Resource
win10v2004-20240802-en
General
-
Target
7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe
-
Size
208KB
-
MD5
abbf6c51c8e1027ded8f900637bc9fb0
-
SHA1
ade0c59a250ce4e334d5a223948ec99bad9bb825
-
SHA256
7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774d
-
SHA512
43e7f26d442b20120d970721ac8d985f023429cabc5847203decd3fe8bdceef742adb7bd2617bc71d116a500ff233225aa4337c638428dd33820f22d19afb987
-
SSDEEP
3072:BzyIihv0tQIhWdXrd0shF51R1rYKtzShiUnUbbrJ1Z1jZEPfrLVK4NLthEjQT6W:rmv0tQKWMsZNWi6obVdZ4f3VKQEjE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 LQKV.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\LQKV.exe 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe File opened for modification C:\windows\LQKV.exe 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe File created C:\windows\LQKV.exe.bat 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LQKV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 2872 LQKV.exe 2872 LQKV.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 2872 LQKV.exe 2872 LQKV.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 2668 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 31 PID 816 wrote to memory of 2668 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 31 PID 816 wrote to memory of 2668 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 31 PID 816 wrote to memory of 2668 816 7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe 31 PID 2668 wrote to memory of 2872 2668 cmd.exe 33 PID 2668 wrote to memory of 2872 2668 cmd.exe 33 PID 2668 wrote to memory of 2872 2668 cmd.exe 33 PID 2668 wrote to memory of 2872 2668 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe"C:\Users\Admin\AppData\Local\Temp\7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\LQKV.exe.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\windows\LQKV.exeC:\windows\LQKV.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5a8121f7be3848569d2f20f98604bbcb8
SHA10e065dbd69d7bd887bd4e66ca35db76b5fcacb89
SHA2561aab3ea70b4d3698409c9befbdef22850342b8b381179a637b4262fc89cd4197
SHA512fd462172b2c20b3697132de728f48dbd33c08a55020f21559b8511855b4fa8ebbd57e886a40467f97f648250ae04f91229366cd463b0cdd7257fedb930e5ea46
-
Filesize
54B
MD596582c7e196e2e71ab96625bb7430607
SHA16dc201fa862f75a82527b7296df207367b2c5ff8
SHA256a64c8d5869f134f1fb19e0c5616f986308cf2860e3ae5764782395caf3718a40
SHA512dcc338e752d4c1caeb5ffa2fd4d07c18f0e4c9655649998810afa0379901866be4cfa0cc5e8ad479d7d8c64548aadd9a4fa01dbfeb06b2f34bd76b8bc81148d1