General

  • Target

    QuarkPC_V1.9.0.151_pc_pf30002.msi

  • Size

    216.3MB

  • Sample

    241118-rzkkzsykbt

  • MD5

    4507d0b4b388162362dfcf53cc262ad9

  • SHA1

    c559c7ec90968a896f99acdd64cd7e073152173d

  • SHA256

    794a83579d11639d51da839647145a1a4b5d9a3e893fe09c0f56f7b7c5d64c69

  • SHA512

    927bf11c12efc4dc53ee3486da87b1fec03f33fdfd151e4f2715955a749af87b904499a048676301cf0461d955f9f2f04293a4bb5d786739075b279f963b63fe

  • SSDEEP

    6291456:0Ao/2PVmZrDQalQVdvLQtqF5BUgbE5MXtBUdbyv:0c2DQFdQ8F5PuMX/Uov

Malware Config

Targets

    • Target

      QuarkPC_V1.9.0.151_pc_pf30002.msi

    • Size

      216.3MB

    • MD5

      4507d0b4b388162362dfcf53cc262ad9

    • SHA1

      c559c7ec90968a896f99acdd64cd7e073152173d

    • SHA256

      794a83579d11639d51da839647145a1a4b5d9a3e893fe09c0f56f7b7c5d64c69

    • SHA512

      927bf11c12efc4dc53ee3486da87b1fec03f33fdfd151e4f2715955a749af87b904499a048676301cf0461d955f9f2f04293a4bb5d786739075b279f963b63fe

    • SSDEEP

      6291456:0Ao/2PVmZrDQalQVdvLQtqF5BUgbE5MXtBUdbyv:0c2DQFdQ8F5PuMX/Uov

    • Enumerates VirtualBox registry keys

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Identifies Xen via ACPI registry values (likely anti-VM)

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Looks for VMWare services registry key.

    • Looks for Xen service registry key.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks