Analysis

  • max time kernel
    111s
  • max time network
    112s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/10/2024, 20:13

General

  • Target

    https://www.fosshub.com/qBittorrent.html?dwl=qbittorrent_5.0.0_x64_setup.exe#

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://www.fosshub.com/qBittorrent.html?dwl=qbittorrent_5.0.0_x64_setup.exe#"
    1⤵
      PID:2820
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4428
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\qbittorrent_5.0.0_x64_setup.exe
        "C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\qbittorrent_5.0.0_x64_setup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:700
        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\qbittorrent_5.0.0_x64_setup.exe
          C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\qbittorrent_5.0.0_x64_setup.exe /UAC:202AE /NCRC
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4476
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2124
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2472
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:1768
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:296

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

              Filesize

              4KB

              MD5

              1bfe591a4fe3d91b03cdf26eaacd8f89

              SHA1

              719c37c320f518ac168c86723724891950911cea

              SHA256

              9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

              SHA512

              02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

              Filesize

              74KB

              MD5

              d4fc49dc14f63895d997fa4940f24378

              SHA1

              3efb1437a7c5e46034147cbbc8db017c69d02c31

              SHA256

              853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

              SHA512

              cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\L52HB6S1\f[2].txt

              Filesize

              182KB

              MD5

              cbebf47bccc846d4057028e810599728

              SHA1

              d1c0919d9f90f78ec6ba78d26f7810639c42ab8a

              SHA256

              fdb37909e4a487c86b9ae6c51afa5b63a29b2f33b8947b7e07debcf3259b7e3b

              SHA512

              73a8dc9fe69ce21d1daae6a01e9ee25fef2860ebd28bc70ba922598e6fb988c0668c9fb451cb425720ed09b3ae913ba181025afae7c61d029bcc306aeebf5b0a

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\4ZVYXN44\www.fosshub[1].xml

              Filesize

              4KB

              MD5

              cc1078f0db70bce8d52c3164ded812fa

              SHA1

              225b410c67cc5053592593308e42995feb10aeb4

              SHA256

              310c5fef743f0c75dc2d85b4b8ac4daced240d938feab4c1e3e7d61c6c575081

              SHA512

              19d77729f2218c444732f1bab1326ff214b3c44e0914a14cfb3c3f6766fd44f0d77a6b2517276f6ab2961e38d0459f4fc60ea06725c02af8a40ec7503cc5f7a1

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\C55BHVKB\suggestions[1].en-US

              Filesize

              17KB

              MD5

              5a34cb996293fde2cb7a4ac89587393a

              SHA1

              3c96c993500690d1a77873cd62bc639b3a10653f

              SHA256

              c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

              SHA512

              e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\DIHW250H\favicon-32x32[1].png

              Filesize

              697B

              MD5

              7524dbcd4080f3251c9387b4a4cff455

              SHA1

              576a56ddb85d86f278016b27ac83f511dc36b82e

              SHA256

              55d2dcff47f9d8d2dacb9a17f076cb662fb555dd6848c9b0a8a6524c00ae7a50

              SHA512

              88d0013594d58ac0bc9a6c54d5a35ac1952548c938c35ff10fb1f24a5fa6e9cc23eaae5fe24ffabde99a6791d76036739baca2fd37be2d4856f24d8b828214e0

            • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads\qbittorrent_5.0.0_x64_setup.exe.56j636g.partial

              Filesize

              37.5MB

              MD5

              bef1037fb5f78d34dd95e353699db74a

              SHA1

              7c29e428056fe381afe1f741e04464bb4db4ce88

              SHA256

              f48ea5324636766d96c27132b31368a304373535cc1fbc400d5d8d4b30fe1693

              SHA512

              56defd53e6b07f65db7dd85ffff9164358d4a4eeb613c737a82c4ea976f9a5c502b91c389bbdd56fa83db05424bde9c91d2494f7ab541d546d3f3ba8c41e9ea4

            • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\HQ1Q1KH7\qbittorrent_5.0.0_x64_setup[1].exe

              Filesize

              96KB

              MD5

              2a57a5a8bb1387995a94e1f800c2b5a4

              SHA1

              f12da17ed2a16ea87a4078501edcdc35a4f18d4a

              SHA256

              a5e221e7d62d53e0233f3c4931ed5383d79367b3c3fd2c630133719f301cd779

              SHA512

              eca896041167f6b706e52c47e26e419b62aaa9a1d2dee9b25c39280c8e02234265ad761aa2e9c98beae0d8b9986e211baf9cfecf16566a7941f89683b84c4183

            • \Users\Admin\AppData\Local\Temp\nsu9193.tmp\UAC.dll

              Filesize

              14KB

              MD5

              adb29e6b186daa765dc750128649b63d

              SHA1

              160cbdc4cb0ac2c142d361df138c537aa7e708c9

              SHA256

              2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

              SHA512

              b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

            • memory/2124-43-0x0000024A75E00000-0x0000024A75F00000-memory.dmp

              Filesize

              1024KB

            • memory/2124-44-0x0000024A75E00000-0x0000024A75F00000-memory.dmp

              Filesize

              1024KB

            • memory/2472-133-0x00000184484B0000-0x00000184484B2000-memory.dmp

              Filesize

              8KB

            • memory/2472-329-0x00000184499C0000-0x00000184499C2000-memory.dmp

              Filesize

              8KB

            • memory/2472-129-0x0000018448430000-0x0000018448432000-memory.dmp

              Filesize

              8KB

            • memory/2472-127-0x0000018448420000-0x0000018448422000-memory.dmp

              Filesize

              8KB

            • memory/2472-204-0x000001844A440000-0x000001844A460000-memory.dmp

              Filesize

              128KB

            • memory/2472-135-0x00000184485F0000-0x00000184485F2000-memory.dmp

              Filesize

              8KB

            • memory/2472-229-0x000001844A700000-0x000001844A800000-memory.dmp

              Filesize

              1024KB

            • memory/2472-246-0x00000184494D0000-0x00000184494D2000-memory.dmp

              Filesize

              8KB

            • memory/2472-243-0x00000184489C0000-0x0000018448AC0000-memory.dmp

              Filesize

              1024KB

            • memory/2472-244-0x0000018449450000-0x0000018449452000-memory.dmp

              Filesize

              8KB

            • memory/2472-311-0x000001844B980000-0x000001844BA80000-memory.dmp

              Filesize

              1024KB

            • memory/2472-312-0x000001844B980000-0x000001844BA80000-memory.dmp

              Filesize

              1024KB

            • memory/2472-327-0x00000184499B0000-0x00000184499B2000-memory.dmp

              Filesize

              8KB

            • memory/2472-138-0x0000018449320000-0x0000018449322000-memory.dmp

              Filesize

              8KB

            • memory/2472-59-0x0000018436F00000-0x0000018436F02000-memory.dmp

              Filesize

              8KB

            • memory/2472-62-0x0000018436F30000-0x0000018436F32000-memory.dmp

              Filesize

              8KB

            • memory/2472-131-0x0000018448470000-0x0000018448472000-memory.dmp

              Filesize

              8KB

            • memory/2472-390-0x0000018449470000-0x0000018449472000-memory.dmp

              Filesize

              8KB

            • memory/2472-388-0x0000018449460000-0x0000018449462000-memory.dmp

              Filesize

              8KB

            • memory/2472-64-0x0000018437360000-0x0000018437362000-memory.dmp

              Filesize

              8KB

            • memory/2472-125-0x00000184480F0000-0x00000184480F2000-memory.dmp

              Filesize

              8KB

            • memory/4428-16-0x0000016479520000-0x0000016479530000-memory.dmp

              Filesize

              64KB

            • memory/4428-337-0x0000016400ED0000-0x0000016400ED1000-memory.dmp

              Filesize

              4KB

            • memory/4428-336-0x0000016400EC0000-0x0000016400EC1000-memory.dmp

              Filesize

              4KB

            • memory/4428-35-0x00000164767A0000-0x00000164767A2000-memory.dmp

              Filesize

              8KB

            • memory/4428-1-0x0000016479430000-0x0000016479440000-memory.dmp

              Filesize

              64KB