Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe
Resource
win10v2004-20241007-en
General
-
Target
7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe
-
Size
2.2MB
-
MD5
633c463311eb4a590d90529c539176e8
-
SHA1
535dc27cb5a63a308875510348ffc32f21ac5512
-
SHA256
7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b
-
SHA512
de5c181ae9ea388306c24e998699ae5b764f1fbcf01f7d46137e8599835cc3905c26366f9775c61d64b6a2f73fa7c1e8db875e8f0dd2555430cd7bf04d02a68d
-
SSDEEP
49152:u6Wy2byz0EQgrMAqOTbCErGgeVAzT+HC7dLZFWeX++:BWyq40ZoUOTybVmOC5hXt
Malware Config
Signatures
-
Ardamax family
-
Executes dropped EXE 1 IoCs
pid Process 400 WQD.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe 400 WQD.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WQD Start = "C:\\ProgramData\\ESKSDU\\WQD.exe" WQD.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WQD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 400 WQD.exe 400 WQD.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 400 WQD.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 400 WQD.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 400 WQD.exe 400 WQD.exe 400 WQD.exe 400 WQD.exe 400 WQD.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1268 wrote to memory of 400 1268 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe 31 PID 1268 wrote to memory of 400 1268 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe 31 PID 1268 wrote to memory of 400 1268 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe 31 PID 1268 wrote to memory of 400 1268 7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe 31 PID 400 wrote to memory of 2748 400 WQD.exe 32 PID 400 wrote to memory of 2748 400 WQD.exe 32 PID 400 wrote to memory of 2748 400 WQD.exe 32 PID 400 wrote to memory of 2748 400 WQD.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe"C:\Users\Admin\AppData\Local\Temp\7924a11f764e1c25543361654f782770761869291e04a04f1fb31e15cdf0ef7b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\ProgramData\ESKSDU\WQD.exe"C:\ProgramData\ESKSDU\WQD.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\PROGRA~3\ESKSDU\WQD.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD591c5c31d240a797f668422badb64b40f
SHA122759b939c0706ac0d059abfd514ddb8700af8c8
SHA256f2e66026cd23eaf605aab23880931f96fabdbf354552aa5deaa68b1137c6e199
SHA512d8e04a746f4d137cfc8fbdb60cb4b63c3dbcb2d9f015c085c398f873923520d9794f99c74ea4f6a9736c0d848caf4472e070f9034eafe6ecd37aa7534ecb8c08
-
Filesize
79KB
MD55c3284d6f7c08908d5b7a8d8f862836a
SHA107a7f242ab34b864db7d2a3c1d259e85bd39db7d
SHA256049f3bc323b3219c9b99255a4b170dd5b9d89369a539d74d3a4a9cd125d93a4c
SHA5127fac2fcf19d76a78b1fd81e61035f4a3950ba6609d550f62054c37cc8faa2a871e566c49c64edb733557f1bf8cc5a43fcdc7dfb6fe9e03b049254f4a24542cbb
-
Filesize
54KB
MD5df99d06b2e6614303a21bfb4b93a6b32
SHA12bf4c3e0e5ab3fd51c52d569f76c9b30f0e4a416
SHA2564734ddf1600ad2957821c90bc9b67da3fab94dad6e6c90d47b656da8fad6c35c
SHA5128ba323ce7c65d977049dd1758266ddd1545e12f8dda594a948a17c5610b057bec4ca69e450c742bf94a00a1fedda8ef3969baa9c142b93cacb838ffd979f39e7
-
Filesize
2.6MB
MD529249516d7ec5a5fa4b37f2eab0db6a6
SHA19a87069dc06a65016ffe71c357f29a200be3ec0d
SHA2564783503716d78d1c7ef3b4d1fd44b60d97aa0f52fb4c6b465e258425236b41a8
SHA5127274d2de711b4878d409d2d847313fa7dea614109971c879851d66d310e443aab6635384e78d0c34f85c3124fa820aa8ea19636ba56736181b854f4061809991