Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe
Resource
win10v2004-20241007-en
General
-
Target
c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe
-
Size
3.2MB
-
MD5
29bccbe4c0d5dbc86a266b404c95f80f
-
SHA1
5f130401f13c28ff12ebfaac103b92a1f6c78579
-
SHA256
c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5
-
SHA512
03abc01d6bbb78c88200f4fc8c341d18792bd374b760d089849e8dd2072d1b745c84b300f591b60266d04edbc3be884f66379d3a75d53309f10caa048dfa72f2
-
SSDEEP
98304:cpQoJl7ckc2LNvvAGxEW1v9S4+RMJ9aOZF9LOldZbc:cpRJl7O228EW1QycldZbc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 xqbg.exe -
Loads dropped DLL 3 IoCs
pid Process 1968 c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe 1676 xqbg.exe 1676 xqbg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqbg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1676 1968 c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe 31 PID 1968 wrote to memory of 1676 1968 c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe 31 PID 1968 wrote to memory of 1676 1968 c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe 31 PID 1968 wrote to memory of 1676 1968 c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe"C:\Users\Admin\AppData\Local\Temp\c91598f31099d5157ef641d2cfce647ad6e7de1b766e537c38df4258553da7c5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Public\Downloads\program\xqbg.exe"C:\Users\Public\Downloads\program\xqbg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5c4a02d48a5933ff30a579f5115ebc2dc
SHA166ac05c908307796abf80e3054f309d1da78f7cc
SHA25671b56dee31c858efa6ae37f6fc491b79ecb9841485cb3bfdd0695b9672f5224c
SHA512999f4cf966b65196ceaedabcaacb1eda4c485345c41ea0b3ea904f6b98d31de0688df54d1539619c0e9143f8153f0b782470659ec1bb0e339b7562c24c8e719c
-
Filesize
2.8MB
MD5ca3b2eccdeedcf42bae93407743c0f37
SHA1033983e8e14c7b8f75e5032988737f30e78bd958
SHA256773464ce08bb928f76c3077815881334ac38b8289309bf15a1042491b960a16a
SHA5125d3142cd617f592b9347555011839e36b389823e15acc2af2ed265c856c9383fb7b051101b88360a9fec531a0550fa5ef1b7d74ed3ea2c0fdb7950f6c106d429
-
Filesize
3.0MB
MD500e8f650a308193ec0bc9b8844890ec4
SHA1eedf6392ae5dbb159c5e527b9b5a7a0b13a52f1a
SHA2564b2bc7e72401881cc9e6f1576fbf94f409cca025e26572aff7248a30453c67ee
SHA51256c0c7788bdd17b48b24e39c6fa2817cda2f504d1d5b97afa52791793961fa1e20a17ee518a8df4f803ca9fa95c4c60de31b39aac027487c9fa3fd1518dc6af1