Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe
Resource
win10v2004-20241007-en
General
-
Target
31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe
-
Size
144KB
-
MD5
8aa6b268143e74ca234151aafab998c0
-
SHA1
3d6106c6caa20cd4b1b59e24222b1969efe5e0b0
-
SHA256
31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983
-
SHA512
ce39dcf3923b49fcba327edd5f082f592c66e14bcc8644ffda10dafd25fc2e5d0f64afc968a671d1e9f178476b1706a55f5b355101cd175ffe1006256ad8ff47
-
SSDEEP
3072:M5sYrWSqGzk2l4+Nass5yYb0cRJlO75O/70:2si/mcw5xbHRq75Q
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2CF518B2-DA52-4D81-93B9-C96E418B920C} 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{2CF518B2-DA52-4D81-93B9-C96E418B920C}\ = "0" 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Mail\qudarukof.dll 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe File opened for modification C:\Program Files (x86)\Windows Mail\qudarukof 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CF518B2-DA52-4D81-93B9-C96E418B920C}\InProcServer32 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CF518B2-DA52-4D81-93B9-C96E418B920C} 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CF518B2-DA52-4D81-93B9-C96E418B920C}\InProcServer32\ = "C:\\Program Files (x86)\\Windows Mail\\qudarukof.dll" 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2CF518B2-DA52-4D81-93B9-C96E418B920C}\InProcServer32\ThreadingModel = "Apartment" 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
pid Process 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 380 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 3 PID 2000 wrote to memory of 380 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 3 PID 2000 wrote to memory of 380 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 3 PID 2000 wrote to memory of 380 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 3 PID 2000 wrote to memory of 380 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 3 PID 2000 wrote to memory of 392 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 4 PID 2000 wrote to memory of 392 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 4 PID 2000 wrote to memory of 392 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 4 PID 2000 wrote to memory of 392 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 4 PID 2000 wrote to memory of 392 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 4 PID 2000 wrote to memory of 432 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 5 PID 2000 wrote to memory of 432 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 5 PID 2000 wrote to memory of 432 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 5 PID 2000 wrote to memory of 432 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 5 PID 2000 wrote to memory of 432 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 5 PID 2000 wrote to memory of 476 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 6 PID 2000 wrote to memory of 476 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 6 PID 2000 wrote to memory of 476 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 6 PID 2000 wrote to memory of 476 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 6 PID 2000 wrote to memory of 476 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 6 PID 2000 wrote to memory of 492 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 7 PID 2000 wrote to memory of 492 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 7 PID 2000 wrote to memory of 492 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 7 PID 2000 wrote to memory of 492 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 7 PID 2000 wrote to memory of 492 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 7 PID 2000 wrote to memory of 500 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 8 PID 2000 wrote to memory of 500 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 8 PID 2000 wrote to memory of 500 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 8 PID 2000 wrote to memory of 500 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 8 PID 2000 wrote to memory of 500 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 8 PID 2000 wrote to memory of 596 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 9 PID 2000 wrote to memory of 596 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 9 PID 2000 wrote to memory of 596 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 9 PID 2000 wrote to memory of 596 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 9 PID 2000 wrote to memory of 596 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 9 PID 2000 wrote to memory of 672 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 10 PID 2000 wrote to memory of 672 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 10 PID 2000 wrote to memory of 672 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 10 PID 2000 wrote to memory of 672 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 10 PID 2000 wrote to memory of 672 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 10 PID 2000 wrote to memory of 744 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 11 PID 2000 wrote to memory of 744 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 11 PID 2000 wrote to memory of 744 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 11 PID 2000 wrote to memory of 744 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 11 PID 2000 wrote to memory of 744 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 11 PID 2000 wrote to memory of 816 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 12 PID 2000 wrote to memory of 816 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 12 PID 2000 wrote to memory of 816 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 12 PID 2000 wrote to memory of 816 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 12 PID 2000 wrote to memory of 816 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 12 PID 2000 wrote to memory of 844 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 13 PID 2000 wrote to memory of 844 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 13 PID 2000 wrote to memory of 844 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 13 PID 2000 wrote to memory of 844 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 13 PID 2000 wrote to memory of 844 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 13 PID 2000 wrote to memory of 972 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 15 PID 2000 wrote to memory of 972 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 15 PID 2000 wrote to memory of 972 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 15 PID 2000 wrote to memory of 972 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 15 PID 2000 wrote to memory of 972 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 15 PID 2000 wrote to memory of 276 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 16 PID 2000 wrote to memory of 276 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 16 PID 2000 wrote to memory of 276 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 16 PID 2000 wrote to memory of 276 2000 31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe 16
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:380
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1312
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:896
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:1856
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:972
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:276
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1072
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1640
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2424
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2128
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe"C:\Users\Admin\AppData\Local\Temp\31f2dd7a001ec8b5c65f5a2bbf1f58548d14c3a4468dd9e5a8d8059396341983N.exe"2⤵
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000
-