Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 14:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Qaovmgmn.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Qaovmgmn.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
Qaovmgmn.exe
-
Size
1.1MB
-
MD5
2fcc31707bfa6f3b9a82ef482e81f08f
-
SHA1
f820b95c7e9d10d951c3d48c2b491b64ed274534
-
SHA256
6d56700e490fbb082d3ff3fbde1bdb8404c0dd033e05a0e6b63d649bb06b03c0
-
SHA512
1cfa47e1a602467386b11f86a67252046cad119f378c2f09362efe60c7a9ce8e6ba26dd452d87e9dd6f7c1de00682a986495f4ec3708c15440441592a65fcbb9
-
SSDEEP
24576:Pt4rexG2D35fmUw5UpCZI3M3xr7KT8LwcCouwvxA688j:V4rexG2D3nw6pCZyMhvKrrTQxAl8j
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IsAbstract.vbs Qaovmgmn.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2124 Qaovmgmn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 Qaovmgmn.exe Token: SeDebugPrivilege 2124 Qaovmgmn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 5592 2124 Qaovmgmn.exe 30 PID 2124 wrote to memory of 5592 2124 Qaovmgmn.exe 30 PID 2124 wrote to memory of 5592 2124 Qaovmgmn.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Qaovmgmn.exe"C:\Users\Admin\AppData\Local\Temp\Qaovmgmn.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2124 -s 5922⤵PID:5592
-