Analysis

  • max time kernel
    154s
  • max time network
    159s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-01-2025 14:31

General

  • Target

    qbittorrent_5.0.3_x64_setup.exe

  • Size

    37.5MB

  • MD5

    83505c82e83bd2e61bd67dfcf30724cf

  • SHA1

    5fbde5f904a7c0e1346b9bcef4a66a7a7dd7e5b9

  • SHA256

    878ca7e3fb7a90a937afdbe080c055877b4c6334a9589d27e092fd6737a0716f

  • SHA512

    87ead0cac1dd041f7929e68bfdf8b61ac50c9d05a74344ab951f9c624874452e22a30f678a6a059cc3e8906f92189c39cfe7bba6552681140d610edb1b529833

  • SSDEEP

    786432:7nvRa6b9c7DLVZhxGjtYO9NByxgyXXbFTUgCe4Oa0eMe6NwRI/gWfe+C:7paO9c7VZejf3OBbFTU3U+6NxIV+C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 16 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 39 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5240
    • C:\Program Files\qBittorrent\qbittorrent.exe
      "C:\Program Files\qBittorrent\qbittorrent.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5852
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:4140
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost
    1⤵
      PID:6076
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5564
      • C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe
        "C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe"
        1⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe
        "C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe"
        1⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4652
      • C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe
        "C:\Users\Admin\AppData\Local\Temp\qbittorrent_5.0.3_x64_setup.exe"
        1⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2088

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\qBittorrent\qbittorrent.exe

        Filesize

        35.0MB

        MD5

        7a47d50bdb7a84a1fa58653f55eb2697

        SHA1

        fd767a6225bfdcca0537043b8f647d6ce33f7d1c

        SHA256

        6864e1a85198efb8ecf5f26564f7565d4d4e93f1ba7e4359bc05910ad74e83f0

        SHA512

        8c292a2a0bd6be2dac30e0f2cefe9bfd73aaff96e0cbb1301bba283fa8eabf378bbbc2c45667ec0cb0092e92d54bc02f054fb74b51eaa9068839225c3915d753

      • C:\Program Files\qBittorrent\qt.conf

        Filesize

        84B

        MD5

        af7f56a63958401da8bea1f5e419b2af

        SHA1

        f66ee8779ca6d570dea22fe34ef8600e5d3c5f38

        SHA256

        fdb8fa58a6ffc14771ca2b1ef6438061a6cba638594d76d9021b91e755d030d3

        SHA512

        02f70ca7f1291b25402989be74408eb82343ab500e15e4ac22fbc7162eb9230cd7061eaa7e34acf69962b57ed0827f51ceaf0fa63da3154b53469c7b7511d23d

      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\6b0f9589-2612-409c-8eff-4d813dd32eb4.down_data

        Filesize

        555KB

        MD5

        5683c0028832cae4ef93ca39c8ac5029

        SHA1

        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

        SHA256

        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

        SHA512

        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\FindProcDLL.dll

        Filesize

        3KB

        MD5

        b4faf654de4284a89eaf7d073e4e1e63

        SHA1

        8efcfd1ca648e942cbffd27af429784b7fcf514b

        SHA256

        c0948b2ec36a69f82c08935fac4b212238b6792694f009b93b4bdb478c4f26e3

        SHA512

        eef31e332be859cf2a64c928bf3b96442f36fe51f1a372c5628264a0d4b2fc7b3e670323c8fb5ffa72db995b8924da2555198e7de7b4f549d9e0f9e6dbb6b388

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\LangDLL.dll

        Filesize

        5KB

        MD5

        50016010fb0d8db2bc4cd258ceb43be5

        SHA1

        44ba95ee12e69da72478cf358c93533a9c7a01dc

        SHA256

        32230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e

        SHA512

        ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\System.dll

        Filesize

        12KB

        MD5

        4add245d4ba34b04f213409bfe504c07

        SHA1

        ef756d6581d70e87d58cc4982e3f4d18e0ea5b09

        SHA256

        9111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706

        SHA512

        1bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\UAC.dll

        Filesize

        14KB

        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\modern-wizard.bmp

        Filesize

        25KB

        MD5

        cbe40fd2b1ec96daedc65da172d90022

        SHA1

        366c216220aa4329dff6c485fd0e9b0f4f0a7944

        SHA256

        3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

        SHA512

        62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\nsDialogs.dll

        Filesize

        9KB

        MD5

        1d8f01a83ddd259bc339902c1d33c8f1

        SHA1

        9f7806af462c94c39e2ec6cc9c7ad05c44eba04e

        SHA256

        4b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed

        SHA512

        28bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567

      • C:\Users\Admin\AppData\Local\Temp\nsi9A4E.tmp\nsisFirewallW.dll

        Filesize

        8KB

        MD5

        f5bf81a102de52a4add21b8a367e54e0

        SHA1

        cf1e76ffe4a3ecd4dad453112afd33624f16751c

        SHA256

        53be5716ad80945cb99681d5dbda60492f5dfb206fbfdb776b769b3eeb18d2c2

        SHA512

        6e280a75f706474ad31b2ce770fa34f54cb598528fac4477c466200a608b79c0f9b84011545595d9ba94331ad08e2f51bd42de91f92379db27686a28ba351256

      • C:\Users\Admin\AppData\Local\Temp\nsoCBC4.tmp\modern-header.bmp

        Filesize

        9KB

        MD5

        940c56737bf9bb69ce7a31c623d4e87a

        SHA1

        f2f3b4e7b9c28df6687ceeaed300a793e3bac445

        SHA256

        766a893fe962aefd27c574cb05f25cf895d3fc70a00db5a6fa73d573f571aefc

        SHA512

        81c60431619d7eb826b8da997c227c4f7077cc754caa15df6e0e7ae0e33690432bc2a27a7e295998f15e33a17b3d80e492d7cc09fd70dc43daf1cfe86b8746ff