Overview
overview
10Static
static
319979.exe
windows7-x64
1019979.exe
windows10-2004-x64
10Factura_855.pdf.exe
windows7-x64
10Factura_855.pdf.exe
windows10-2004-x64
7qfmjhb.exe
windows7-x64
3qfmjhb.exe
windows10-2004-x64
3Fattura_855.pdf.exe
windows7-x64
10Fattura_855.pdf.exe
windows10-2004-x64
7gocbcx.exe
windows7-x64
3gocbcx.exe
windows10-2004-x64
3IoC/MIL000...0.xlsm
windows7-x64
3IoC/MIL000...0.xlsm
windows10-2004-x64
1IoC/PO.xlsx
windows7-x64
8IoC/PO.xlsx
windows10-2004-x64
1PO_2022-04-33981.exe
windows7-x64
3PO_2022-04-33981.exe
windows10-2004-x64
10IoC/Pagamento.xlsx
windows7-x64
8IoC/Pagamento.xlsx
windows10-2004-x64
1IoC/SHIPPI...TS.rtf
windows7-x64
8IoC/SHIPPI...TS.rtf
windows10-2004-x64
3SMK_29082022.exe
windows7-x64
10SMK_29082022.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
19979.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Factura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Factura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
qfmjhb.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
qfmjhb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Fattura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Fattura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
gocbcx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
gocbcx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IoC/MIL0000640730.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IoC/MIL0000640730.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IoC/PO.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
IoC/PO.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
PO_2022-04-33981.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
PO_2022-04-33981.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
IoC/Pagamento.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
IoC/Pagamento.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
SMK_29082022.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
SMK_29082022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
qfmjhb.exe
-
Size
5KB
-
MD5
d93c0902c13f3f17012c2778fd24b009
-
SHA1
7ad3d53210ce587d2195545115c9086457a14623
-
SHA256
0487ed5d2a046ee552e410b5c9b3cf27eb0c3b369fecff3132c58e57eb1c0ad8
-
SHA512
4cb2d5beb7ed5532819bd96c92000c9e12f145d37cdd2ad4dec3f67ce74107c4a00fb850700015168ef6c2620277c237de3a2c279a99150ed46a3d0b5905fc3a
-
SSDEEP
96:jYRTsfPD1niVZnEQ1TfHP97HzJcpLLWPOoyn:jYRIPDwVF15fV79qLSPOoyn
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1704 2348 WerFault.exe qfmjhb.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qfmjhb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qfmjhb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
qfmjhb.exedescription pid process target process PID 2348 wrote to memory of 1704 2348 qfmjhb.exe WerFault.exe PID 2348 wrote to memory of 1704 2348 qfmjhb.exe WerFault.exe PID 2348 wrote to memory of 1704 2348 qfmjhb.exe WerFault.exe PID 2348 wrote to memory of 1704 2348 qfmjhb.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\qfmjhb.exe"C:\Users\Admin\AppData\Local\Temp\qfmjhb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2322⤵
- Program crash
PID:1704
-