Overview
overview
7Static
static
3qbittorren...up.exe
windows7-x64
7qbittorren...up.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...lW.dll
windows7-x64
3$PLUGINSDI...lW.dll
windows10-2004-x64
3qbittorrent.exe
windows7-x64
1qbittorrent.exe
windows10-2004-x64
1qbittorrent.pdb
windows7-x64
3qbittorrent.pdb
windows10-2004-x64
3qt.conf
windows7-x64
3qt.conf
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
qbittorrent_5.0.1_x64_setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
qbittorrent_5.0.1_x64_setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsisFirewallW.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsisFirewallW.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
qbittorrent.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
qbittorrent.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
qbittorrent.pdb
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
qbittorrent.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
qt.conf
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
qt.conf
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
qbittorrent.pdb
-
Size
162.8MB
-
MD5
1a7cb8a5dc6a23b2fd0d5b4e0bf1638f
-
SHA1
97124f273d2202572d7ac9c35ff33810d291c63f
-
SHA256
746a57aec4c0f7f7e4da21d3f6b18c989ea36582acdb00b0e0c3d16331959d5a
-
SHA512
bb974fab9fe3068fcf1d2a8a33887f14b942f33ec6ace10e90aaff47a67f80a02be9edcd279876bee89dde9fbcb1edb6f1383330cdec4eaf465e1f45d01bba68
-
SSDEEP
393216:4NX806H0hHQexrBAqC91DU31qqyh8emQ5lz8jspZx0xMCbNI+CLX5551z+Ec+Tu:Uc0hHHdBFU9MUqy8M0e1ZB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2828 AcroRd32.exe 2828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2800 2348 cmd.exe 32 PID 2348 wrote to memory of 2800 2348 cmd.exe 32 PID 2348 wrote to memory of 2800 2348 cmd.exe 32 PID 2800 wrote to memory of 2828 2800 rundll32.exe 33 PID 2800 wrote to memory of 2828 2800 rundll32.exe 33 PID 2800 wrote to memory of 2828 2800 rundll32.exe 33 PID 2800 wrote to memory of 2828 2800 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\qbittorrent.pdb1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\qbittorrent.pdb2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\qbittorrent.pdb"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b6bfa649f63fcc392a61427a17262c6
SHA19396a19a8d40ccf43f9f4a12f7ebe2671912fc97
SHA2561258e4d159d95954eb74642424f8263e6b79fdc4f0797aaaefdc68ae3f5b2975
SHA512a0554c93399ca7706f5ea76182c7384064767c85c0891f827c0b2a3773494049581b2e8105fa389aae3ef0d54058591988d03fc6bebfbb5503cc664ec8f27c56