Overview
overview
8Static
static
3qq_pinyin_4.4_Dsn.exe
windows7-x64
7qq_pinyin_4.4_Dsn.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$TEMP/TXSS...er.dll
windows7-x64
3$TEMP/TXSS...er.dll
windows10-2004-x64
3$TEMP/TXSS...UI.exe
windows7-x64
3$TEMP/TXSS...UI.exe
windows10-2004-x64
3$TEMP/TXSS...on.dll
windows7-x64
3$TEMP/TXSS...on.dll
windows10-2004-x64
3$TEMP/TXSS...ol.dll
windows7-x64
3$TEMP/TXSS...ol.dll
windows10-2004-x64
3$TEMP/TXSS...rm.dll
windows7-x64
3$TEMP/TXSS...rm.dll
windows10-2004-x64
34.4.1105.4...ct.exe
windows7-x64
34.4.1105.4...ct.exe
windows10-2004-x64
34.4.1105.4...in.exe
windows7-x64
34.4.1105.4...in.exe
windows10-2004-x64
34.4.1105.4...il.dll
windows7-x64
34.4.1105.4...il.dll
windows10-2004-x64
34.4.1105.4...il.exe
windows7-x64
84.4.1105.4...il.exe
windows10-2004-x64
34.4.1105.4...64.dll
windows7-x64
14.4.1105.4...64.dll
windows10-2004-x64
14.4.1105.4...ud.exe
windows7-x64
34.4.1105.4...ud.exe
windows10-2004-x64
34.4.1105.4...ig.exe
windows7-x64
34.4.1105.4...ig.exe
windows10-2004-x64
34.4.1105.4...ce.exe
windows7-x64
34.4.1105.4...ce.exe
windows10-2004-x64
34.4.1105.4...ut.exe
windows7-x64
34.4.1105.4...ut.exe
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
qq_pinyin_4.4_Dsn.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
qq_pinyin_4.4_Dsn.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/TXSSO/InstTXSSOHelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$TEMP/TXSSO/InstTXSSOHelper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$TEMP/TXSSO/InstTXSSO_LUI.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$TEMP/TXSSO/InstTXSSO_LUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$TEMP/TXSSO/bin/SSOCommon.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$TEMP/TXSSO/bin/SSOCommon.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$TEMP/TXSSO/bin/SSOLUIControl.dll
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
$TEMP/TXSSO/bin/SSOLUIControl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$TEMP/TXSSO/bin/SSOPlatform.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$TEMP/TXSSO/bin/SSOPlatform.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
4.4.1105.400/QQImeRegDict.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
4.4.1105.400/QQImeRegDict.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
4.4.1105.400/QQImeRegSkin.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
4.4.1105.400/QQImeRegSkin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
4.4.1105.400/QQImeUtil.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
4.4.1105.400/QQImeUtil.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
4.4.1105.400/QQImeUtil.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
4.4.1105.400/QQImeUtil.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
4.4.1105.400/QQImeUtil_x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
4.4.1105.400/QQImeUtil_x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
4.4.1105.400/QQPYCloud.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
4.4.1105.400/QQPYCloud.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
4.4.1105.400/QQPYConfig.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
4.4.1105.400/QQPYConfig.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
4.4.1105.400/QQPYFace.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
4.4.1105.400/QQPYFace.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
4.4.1105.400/QQPYHandInput.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
4.4.1105.400/QQPYHandInput.exe
Resource
win10v2004-20241007-en
General
-
Target
4.4.1105.400/QQImeUtil.exe
-
Size
105KB
-
MD5
314cc11177c257767eb951c800eed2ef
-
SHA1
2e9e4476666eba914ae25fd513dba75c411c5a8e
-
SHA256
a16006a0ed8318fac27673fc487766862da3f26b6fa8813afb8821704ddf123c
-
SHA512
b9fcec5c00302197d0da415ebaab490445ba8487805ed6c7c3f69dda2e1c854f3286d8628918eb3b8a9b540d354ba787f20e31580d84b9b6f9ad7dd6ac4f9541
-
SSDEEP
1536:4HK/XPA5gQoC8fIbz63ZTexBU/kIUbgA6N/tq72da7CaA:4q/MSpAbGTe2Aq/tqio1A
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
pid Process 2228 takeown.exe 2080 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2080 icacls.exe 2228 takeown.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QQImeUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language takeown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2228 takeown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3052 2980 QQImeUtil.exe 30 PID 2980 wrote to memory of 3052 2980 QQImeUtil.exe 30 PID 2980 wrote to memory of 3052 2980 QQImeUtil.exe 30 PID 2980 wrote to memory of 3052 2980 QQImeUtil.exe 30 PID 3052 wrote to memory of 2228 3052 cmd.exe 32 PID 3052 wrote to memory of 2228 3052 cmd.exe 32 PID 3052 wrote to memory of 2228 3052 cmd.exe 32 PID 3052 wrote to memory of 2228 3052 cmd.exe 32 PID 3052 wrote to memory of 2080 3052 cmd.exe 33 PID 3052 wrote to memory of 2080 3052 cmd.exe 33 PID 3052 wrote to memory of 2080 3052 cmd.exe 33 PID 3052 wrote to memory of 2080 3052 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4.4.1105.400\QQImeUtil.exe"C:\Users\Admin\AppData\Local\Temp\4.4.1105.400\QQImeUtil.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Tencent\QQPinyin\RenameTTX\x_0.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\takeown.exetakeown /F mingliu.ttc /A3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\icacls.exeicacls mingliu.ttc /grant Administrators:(F)3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254B
MD500a44a36512228fdd22f812ad21d6f26
SHA164d48adbbd2d942e2ea79b232cf0fe8995edcf51
SHA25651bf22a92e82778eb0ea72b509ef0e25992fe218bae5f136dc95d01789297946
SHA512f183f7d7784b667c4ec82ff64097453d26c9b94e10aad76a72b691ed14dcd2d0e37b7aaa2f7407f06d4b06b36b3d46a5bc22001c43ac5d99c95df19612e63f7e