Analysis

  • max time kernel
    84s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 08:43

General

  • Target

    7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe

  • Size

    208KB

  • MD5

    abbf6c51c8e1027ded8f900637bc9fb0

  • SHA1

    ade0c59a250ce4e334d5a223948ec99bad9bb825

  • SHA256

    7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774d

  • SHA512

    43e7f26d442b20120d970721ac8d985f023429cabc5847203decd3fe8bdceef742adb7bd2617bc71d116a500ff233225aa4337c638428dd33820f22d19afb987

  • SSDEEP

    3072:BzyIihv0tQIhWdXrd0shF51R1rYKtzShiUnUbbrJ1Z1jZEPfrLVK4NLthEjQT6W:rmv0tQKWMsZNWi6obVdZ4f3VKQEjE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe
    "C:\Users\Admin\AppData\Local\Temp\7d29e632c1a7a1857d35764889a78b09f0d2ee7fab16862aaa4f7b83362e774dN.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\LQKV.exe.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\windows\LQKV.exe
        C:\windows\LQKV.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\LQKV.exe

    Filesize

    208KB

    MD5

    a8121f7be3848569d2f20f98604bbcb8

    SHA1

    0e065dbd69d7bd887bd4e66ca35db76b5fcacb89

    SHA256

    1aab3ea70b4d3698409c9befbdef22850342b8b381179a637b4262fc89cd4197

    SHA512

    fd462172b2c20b3697132de728f48dbd33c08a55020f21559b8511855b4fa8ebbd57e886a40467f97f648250ae04f91229366cd463b0cdd7257fedb930e5ea46

  • C:\Windows\LQKV.exe.bat

    Filesize

    54B

    MD5

    96582c7e196e2e71ab96625bb7430607

    SHA1

    6dc201fa862f75a82527b7296df207367b2c5ff8

    SHA256

    a64c8d5869f134f1fb19e0c5616f986308cf2860e3ae5764782395caf3718a40

    SHA512

    dcc338e752d4c1caeb5ffa2fd4d07c18f0e4c9655649998810afa0379901866be4cfa0cc5e8ad479d7d8c64548aadd9a4fa01dbfeb06b2f34bd76b8bc81148d1

  • memory/816-0-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/816-12-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2872-16-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/2872-17-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB