Analysis

  • max time kernel
    30s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 10:04

General

  • Target

    qbittorrent_5.0.0_x64_setup.exe

  • Size

    37.5MB

  • MD5

    bef1037fb5f78d34dd95e353699db74a

  • SHA1

    7c29e428056fe381afe1f741e04464bb4db4ce88

  • SHA256

    f48ea5324636766d96c27132b31368a304373535cc1fbc400d5d8d4b30fe1693

  • SHA512

    56defd53e6b07f65db7dd85ffff9164358d4a4eeb613c737a82c4ea976f9a5c502b91c389bbdd56fa83db05424bde9c91d2494f7ab541d546d3f3ba8c41e9ea4

  • SSDEEP

    786432:7dCpKYOSSaVS5HWSWELqPsrxOKZo8xjqcGwpawIP9DNU/:7dj/SShWZG2/ojXhIPU/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 39 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 26 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.0_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.0_x64_setup.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2768
    • C:\Program Files\qBittorrent\qbittorrent.exe
      "C:\Program Files\qBittorrent\qbittorrent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4848

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\qBittorrent\qbittorrent.exe

          Filesize

          34.7MB

          MD5

          3c6608afa25824f03bb7f06aabd52dfe

          SHA1

          5c36c0af719623ce91c9aa4ee44b8a6d28326e02

          SHA256

          a1c18ca0aace487b64f1e35bffa7337f3065bdfc9a559f14c1f59bba20cdef8b

          SHA512

          88b83e3457666c83af74467d4f88587f76f3e1cbc383d3b07ce862266e9119e2cc4f7a25dc6af0e2830c6ea6019e34e5a945ce9b2da553ecbb0ed80de9a2b57e

        • C:\Program Files\qBittorrent\qt.conf

          Filesize

          84B

          MD5

          af7f56a63958401da8bea1f5e419b2af

          SHA1

          f66ee8779ca6d570dea22fe34ef8600e5d3c5f38

          SHA256

          fdb8fa58a6ffc14771ca2b1ef6438061a6cba638594d76d9021b91e755d030d3

          SHA512

          02f70ca7f1291b25402989be74408eb82343ab500e15e4ac22fbc7162eb9230cd7061eaa7e34acf69962b57ed0827f51ceaf0fa63da3154b53469c7b7511d23d

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\FindProcDLL.dll

          Filesize

          3KB

          MD5

          b4faf654de4284a89eaf7d073e4e1e63

          SHA1

          8efcfd1ca648e942cbffd27af429784b7fcf514b

          SHA256

          c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3

          SHA512

          eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          50016010fb0d8db2bc4cd258ceb43be5

          SHA1

          44ba95ee12e69da72478cf358c93533a9c7a01dc

          SHA256

          32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

          SHA512

          ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\System.dll

          Filesize

          12KB

          MD5

          4add245d4ba34b04f213409bfe504c07

          SHA1

          ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

          SHA256

          9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

          SHA512

          1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\UAC.dll

          Filesize

          14KB

          MD5

          adb29e6b186daa765dc750128649b63d

          SHA1

          160cbdc4cb0ac2c142d361df138c537aa7e708c9

          SHA256

          2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

          SHA512

          b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\modern-wizard.bmp

          Filesize

          25KB

          MD5

          cbe40fd2b1ec96daedc65da172d90022

          SHA1

          366c216220aa4329dff6c485fd0e9b0f4f0a7944

          SHA256

          3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

          SHA512

          62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          1d8f01a83ddd259bc339902c1d33c8f1

          SHA1

          9f7806af462c94c39e2ec6cc9c7ad05c44eba04e

          SHA256

          4b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed

          SHA512

          28bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567

        • C:\Users\Admin\AppData\Local\Temp\nslC805.tmp\nsisFirewallW.dll

          Filesize

          8KB

          MD5

          f5bf81a102de52a4add21b8a367e54e0

          SHA1

          cf1e76ffe4a3ecd4dad453112afd33624f16751c

          SHA256

          53be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2

          SHA512

          6e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256