Overview
overview
7Static
static
3mal2/QtCore4.dll
windows7-x64
3mal2/QtCore4.dll
windows10-2004-x64
3mal2/QtGui4.dll
windows7-x64
3mal2/QtGui4.dll
windows10-2004-x64
3mal2/QtNetwork4.dll
windows7-x64
3mal2/QtNetwork4.dll
windows10-2004-x64
3mal2/QtWebKit4.dll
windows7-x64
3mal2/QtWebKit4.dll
windows10-2004-x64
3mal2/Setup.exe
windows7-x64
7mal2/Setup.exe
windows10-2004-x64
7mal2/msvcp100.dll
windows7-x64
3mal2/msvcp100.dll
windows10-2004-x64
3mal2/msvcr100.dll
windows7-x64
3mal2/msvcr100.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
mal2/QtCore4.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
mal2/QtCore4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mal2/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mal2/QtGui4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
mal2/QtNetwork4.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
mal2/QtNetwork4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
mal2/QtWebKit4.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
mal2/QtWebKit4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
mal2/Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
mal2/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
mal2/msvcp100.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
mal2/msvcp100.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
mal2/msvcr100.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
mal2/msvcr100.dll
Resource
win10v2004-20241007-en
General
-
Target
mal2/Setup.exe
-
Size
80KB
-
MD5
2a8613b7d99903516b8fe02fd820bf52
-
SHA1
78a96addcb556ab1d490fac80f929305263d06b9
-
SHA256
f1d68c5e7c7660d4f2ce412c109b7fe3e088872fa0ebe61ca9ab9dd92a496407
-
SHA512
af0902aeb6169ea507b787da7b61c3533df4610c3f51c1d8f65dfc9008c8ce2580f2d86a49a4d0acc2c51c731f3e4c447d0d1d8e779dc1c75e43d30b79c46436
-
SSDEEP
1536:9A8oAY5SXfidLez+Q+EGfdUHLLXJ+CqoVpPBucQwk7qnKXKo5OMY8xk03ben8TK:M7Ohz+Q+EGlUHLLXJ+CqoTPBucQwktXS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
nc.exepid Process 2144 nc.exe 1176 -
Loads dropped DLL 8 IoCs
Processes:
Setup.exemore.comAutoIt3.exeWerFault.exepid Process 2496 Setup.exe 1520 more.com 2736 AutoIt3.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe 2616 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid Process procid_target PID 2496 set thread context of 1520 2496 Setup.exe 32 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2616 2736 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Setup.exemore.comAutoIt3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exemore.compid Process 2496 Setup.exe 2496 Setup.exe 1520 more.com 1520 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exemore.compid Process 2496 Setup.exe 1520 more.com -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Setup.exemore.comAutoIt3.exedescription pid Process procid_target PID 2496 wrote to memory of 2144 2496 Setup.exe 30 PID 2496 wrote to memory of 2144 2496 Setup.exe 30 PID 2496 wrote to memory of 2144 2496 Setup.exe 30 PID 2496 wrote to memory of 2144 2496 Setup.exe 30 PID 2496 wrote to memory of 1520 2496 Setup.exe 32 PID 2496 wrote to memory of 1520 2496 Setup.exe 32 PID 2496 wrote to memory of 1520 2496 Setup.exe 32 PID 2496 wrote to memory of 1520 2496 Setup.exe 32 PID 2496 wrote to memory of 1520 2496 Setup.exe 32 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 1520 wrote to memory of 2736 1520 more.com 34 PID 2736 wrote to memory of 2616 2736 AutoIt3.exe 35 PID 2736 wrote to memory of 2616 2736 AutoIt3.exe 35 PID 2736 wrote to memory of 2616 2736 AutoIt3.exe 35 PID 2736 wrote to memory of 2616 2736 AutoIt3.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\mal2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\mal2\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\DJGB\TSWZGTNJZTN\nc.exeC:\Users\Admin\AppData\Roaming\DJGB\TSWZGTNJZTN\nc.exe2⤵
- Executes dropped EXE
PID:2144
-
-
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\AutoIt3.exeC:\Users\Admin\AppData\Local\Temp\AutoIt3.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 1484⤵
- Loads dropped DLL
- Program crash
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5aafc6eb335b15925083b6dfae7d98631
SHA1f4f2bbc9f47cfee158db2dbf49febf29dce711ca
SHA256bc6050ddcfb4a6809bd2c454726e24d6ec901c2a480f8e5db85b54bc9c4edf76
SHA512edc6a6ca5862fce36b4724e7138c6293adf78ffb2ad48beb05749da1688186c37abe1a0791cb4d99986464bdd94e6c33a878aee9140293c71db8e70f6ffc6a3b
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
285KB
MD57fb44c5bca4226d8aab7398e836807a2
SHA147128e4f8afabfde5037ed0fcaba8752c528ff52
SHA256a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef
SHA512f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab