Overview
overview
10Static
static
10dQwwXsTxxeE.exe
windows7-x64
10dQwwXsTxxeE.exe
windows10-2004-x64
10dQwwXsTxxeE.exe
android-9-x86
dQwwXsTxxeE.exe
android-10-x64
dQwwXsTxxeE.exe
android-11-x64
dQwwXsTxxeE.exe
macos-10.15-amd64
dQwwXsTxxeE.exe
ubuntu-18.04-amd64
dQwwXsTxxeE.exe
debian-9-armhf
dQwwXsTxxeE.exe
debian-9-mips
dQwwXsTxxeE.exe
debian-9-mipsel
Resubmissions
14-01-2025 07:08
250114-hyh64a1jg1 1014-01-2025 06:16
250114-g1z2ys1ndq 1020-06-2022 13:20
220620-qk384sdder 10Analysis
-
max time kernel
297s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 07:08
Behavioral task
behavioral1
Sample
dQwwXsTxxeE.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dQwwXsTxxeE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dQwwXsTxxeE.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
dQwwXsTxxeE.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
dQwwXsTxxeE.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
dQwwXsTxxeE.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
dQwwXsTxxeE.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
dQwwXsTxxeE.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
dQwwXsTxxeE.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
dQwwXsTxxeE.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
dQwwXsTxxeE.exe
-
Size
202KB
-
MD5
88e3eeefbb87b4534e3715ef59f81173
-
SHA1
471e2130d96d02a018cdf877d963c98a631246cd
-
SHA256
454a0228ab3aca978bb8da603e1f1ef783d2247f95d186f2f46c5e050d12ece3
-
SHA512
bcc12fa79fae920412874104c628fb14d8d77418dd9e9e392550eebd2d513ee9d2497b4a8ed1606d50220572c3125120df04d79e857c68e5724aed73e0884eb5
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIvXcZVg9FMMywQakxalJR0:QLV6Bta6dtJmakIM5LVgLMMywQVol0
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NTFS Manager = "C:\\Program Files (x86)\\NTFS Manager\\ntfsmgr.exe" dQwwXsTxxeE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dQwwXsTxxeE.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 25 IoCs
flow ioc 45 7.tcp.eu.ngrok.io 55 7.tcp.eu.ngrok.io 57 7.tcp.eu.ngrok.io 83 7.tcp.eu.ngrok.io 92 7.tcp.eu.ngrok.io 99 7.tcp.eu.ngrok.io 97 7.tcp.eu.ngrok.io 101 7.tcp.eu.ngrok.io 17 7.tcp.eu.ngrok.io 43 7.tcp.eu.ngrok.io 70 7.tcp.eu.ngrok.io 79 7.tcp.eu.ngrok.io 81 7.tcp.eu.ngrok.io 88 7.tcp.eu.ngrok.io 115 7.tcp.eu.ngrok.io 21 7.tcp.eu.ngrok.io 59 7.tcp.eu.ngrok.io 72 7.tcp.eu.ngrok.io 74 7.tcp.eu.ngrok.io 108 7.tcp.eu.ngrok.io 110 7.tcp.eu.ngrok.io 11 7.tcp.eu.ngrok.io 47 7.tcp.eu.ngrok.io 90 7.tcp.eu.ngrok.io 106 7.tcp.eu.ngrok.io -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NTFS Manager\ntfsmgr.exe dQwwXsTxxeE.exe File opened for modification C:\Program Files (x86)\NTFS Manager\ntfsmgr.exe dQwwXsTxxeE.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dQwwXsTxxeE.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 dQwwXsTxxeE.exe 4556 dQwwXsTxxeE.exe 4556 dQwwXsTxxeE.exe 4556 dQwwXsTxxeE.exe 4556 dQwwXsTxxeE.exe 4556 dQwwXsTxxeE.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4556 dQwwXsTxxeE.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4556 dQwwXsTxxeE.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dQwwXsTxxeE.exeC:\Users\Admin\AppData\Local\Temp\dQwwXsTxxeE.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4556