Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 09:15

General

  • Target

    QQռV7.0.exe

  • Size

    1.8MB

  • MD5

    e4d4156a763f4cb8e82df5ce6f5ad497

  • SHA1

    fbcb7b3d6bf3ff44fb183933988152f8d426f0f5

  • SHA256

    32776c05bbf19063cf6236eb62eacfe4f37a58dd057e2cf039b2bff26eacb73f

  • SHA512

    23d44a7ca7651c04d5a6f47ffe89368702c2f9abaeb1dc9da22a3a862f4b6ffa6bfadafa2ad4d8309a0caad338e449e909cbb6315796603631d6694787e44ad0

  • SSDEEP

    24576:+mDEUgkDkcILsKOBAbMpNf2FfWl8KuqGavkg3NyNIbbbIoIBAUZLY:hzgMzVBA2+s8KuqGaX0ToIBAUZLY

Score
5/10

Malware Config

Signatures

  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QQռV7.0.exe
    "C:\Users\Admin\AppData\Local\Temp\QQռV7.0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 760
      2⤵
      • Program crash
      PID:720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 760
      2⤵
      • Program crash
      PID:4884
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 740 -ip 740
    1⤵
      PID:3012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 740 -ip 740
      1⤵
        PID:380

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/740-13-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-47-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-46-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-41-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-39-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-37-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-33-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-31-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-29-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-25-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-23-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-19-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-17-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-15-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-11-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-9-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-5-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-4-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-3-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-0-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-43-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-35-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-27-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-21-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-7-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-2-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB

      • memory/740-48-0x0000000010000000-0x000000001003D000-memory.dmp

        Filesize

        244KB