Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe
-
Size
2.2MB
-
MD5
3368e5f66d6845cc96b2dca65f1e7780
-
SHA1
3da4fab790347189644fba012eee8dd8cd9882d5
-
SHA256
53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fc
-
SHA512
6fcd4ee3ad3ca01954c2b4f2c0ca99ed46c7b551bcc19c59e0634f49bcea2851d2e761d7084e4c3dd5485f9fc2a0a21835e87d1328888eb5831d201fd01d8fa5
-
SSDEEP
49152:u6Wy2byz0EQgrMAqOTbCErGgeVAzT+HC7dLZFWeX+:BWyq40ZoUOTybVmOC5hX
Malware Config
Signatures
-
Ardamax family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WQD.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe -
Executes dropped EXE 1 IoCs
pid Process 5012 WQD.exe -
Loads dropped DLL 2 IoCs
pid Process 5012 WQD.exe 5012 WQD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WQD Start = "C:\\ProgramData\\ESKSDU\\WQD.exe" WQD.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WQD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5012 WQD.exe 5012 WQD.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5012 WQD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5012 WQD.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5012 WQD.exe 5012 WQD.exe 5012 WQD.exe 5012 WQD.exe 5012 WQD.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1432 wrote to memory of 5012 1432 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe 83 PID 1432 wrote to memory of 5012 1432 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe 83 PID 1432 wrote to memory of 5012 1432 53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe 83 PID 5012 wrote to memory of 1716 5012 WQD.exe 101 PID 5012 wrote to memory of 1716 5012 WQD.exe 101 PID 5012 wrote to memory of 1716 5012 WQD.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe"C:\Users\Admin\AppData\Local\Temp\53430ebab6b89325c5a407342a7f9f22d85850fdd30df80daf1ea68fc0a407fcN.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\ProgramData\ESKSDU\WQD.exe"C:\ProgramData\ESKSDU\WQD.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\PROGRA~3\ESKSDU\WQD.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD591c5c31d240a797f668422badb64b40f
SHA122759b939c0706ac0d059abfd514ddb8700af8c8
SHA256f2e66026cd23eaf605aab23880931f96fabdbf354552aa5deaa68b1137c6e199
SHA512d8e04a746f4d137cfc8fbdb60cb4b63c3dbcb2d9f015c085c398f873923520d9794f99c74ea4f6a9736c0d848caf4472e070f9034eafe6ecd37aa7534ecb8c08
-
Filesize
79KB
MD55c3284d6f7c08908d5b7a8d8f862836a
SHA107a7f242ab34b864db7d2a3c1d259e85bd39db7d
SHA256049f3bc323b3219c9b99255a4b170dd5b9d89369a539d74d3a4a9cd125d93a4c
SHA5127fac2fcf19d76a78b1fd81e61035f4a3950ba6609d550f62054c37cc8faa2a871e566c49c64edb733557f1bf8cc5a43fcdc7dfb6fe9e03b049254f4a24542cbb
-
Filesize
54KB
MD5df99d06b2e6614303a21bfb4b93a6b32
SHA12bf4c3e0e5ab3fd51c52d569f76c9b30f0e4a416
SHA2564734ddf1600ad2957821c90bc9b67da3fab94dad6e6c90d47b656da8fad6c35c
SHA5128ba323ce7c65d977049dd1758266ddd1545e12f8dda594a948a17c5610b057bec4ca69e450c742bf94a00a1fedda8ef3969baa9c142b93cacb838ffd979f39e7
-
Filesize
2.6MB
MD529249516d7ec5a5fa4b37f2eab0db6a6
SHA19a87069dc06a65016ffe71c357f29a200be3ec0d
SHA2564783503716d78d1c7ef3b4d1fd44b60d97aa0f52fb4c6b465e258425236b41a8
SHA5127274d2de711b4878d409d2d847313fa7dea614109971c879851d66d310e443aab6635384e78d0c34f85c3124fa820aa8ea19636ba56736181b854f4061809991