Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 05:42
Static task
static1
Behavioral task
behavioral1
Sample
d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe
Resource
win10v2004-20241007-en
General
-
Target
d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe
-
Size
27.6MB
-
MD5
dba779040cc9cf606ae3271ec9ef03d0
-
SHA1
00cd24e75cd21e44c14bc4602df189d34c2b14b2
-
SHA256
d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8
-
SHA512
427986dd32cd9ea42ee7da6eb8227ab939833f76a7d796d97b8ed213be3ed3e38dc75c0f332f50864eb972bf3af065f930acbafab8394098b9cd2d0f8158319f
-
SSDEEP
786432:wbnq//o4Syaf/A7NpfYoLzxCYjTF5wdbzo5p6VmTs1TW5lhH:z//nk8JjxCKSI5p6kTsJW5H
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2736 ChromeSetup.exe 2968 quubmrikb.exe 12076 Mnfgh.exe 15688 Mnfgh.exe -
Loads dropped DLL 4 IoCs
pid Process 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mnfgh.exe quubmrikb.exe File opened for modification C:\Windows\SysWOW64\Mnfgh.exe quubmrikb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 2968 quubmrikb.exe 2968 quubmrikb.exe 2968 quubmrikb.exe 12076 Mnfgh.exe 12076 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe 15688 Mnfgh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quubmrikb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnfgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mnfgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 15676 cmd.exe 15268 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 15268 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2968 quubmrikb.exe Token: 33 15688 Mnfgh.exe Token: SeIncBasePriorityPrivilege 15688 Mnfgh.exe Token: 33 15688 Mnfgh.exe Token: SeIncBasePriorityPrivilege 15688 Mnfgh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2968 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 30 PID 1684 wrote to memory of 2968 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 30 PID 1684 wrote to memory of 2968 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 30 PID 1684 wrote to memory of 2968 1684 d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe 30 PID 12076 wrote to memory of 15688 12076 Mnfgh.exe 35 PID 12076 wrote to memory of 15688 12076 Mnfgh.exe 35 PID 12076 wrote to memory of 15688 12076 Mnfgh.exe 35 PID 12076 wrote to memory of 15688 12076 Mnfgh.exe 35 PID 2968 wrote to memory of 15676 2968 quubmrikb.exe 34 PID 2968 wrote to memory of 15676 2968 quubmrikb.exe 34 PID 2968 wrote to memory of 15676 2968 quubmrikb.exe 34 PID 2968 wrote to memory of 15676 2968 quubmrikb.exe 34 PID 15676 wrote to memory of 15268 15676 cmd.exe 37 PID 15676 wrote to memory of 15268 15676 cmd.exe 37 PID 15676 wrote to memory of 15268 15676 cmd.exe 37 PID 15676 wrote to memory of 15268 15676 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe"C:\Users\Admin\AppData\Local\Temp\d645185fa8fbe338f26ad26972aec46c24e826556e229c059b6adb2669200fe8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\quubmrikb.exe"C:\Users\Admin\AppData\Local\Temp\quubmrikb.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\QUUBMR~1.EXE > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:15676 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:15268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\ChromeSetup.exe"C:\Users\Admin\AppData\Local\Temp\ChromeSetup.exe"2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\SysWOW64\Mnfgh.exeC:\Windows\SysWOW64\Mnfgh.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:12076 -
C:\Windows\SysWOW64\Mnfgh.exeC:\Windows\SysWOW64\Mnfgh.exe -acsi2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:15688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.5MB
MD5cd32eed7ff292c4be642d7effbcb7a81
SHA1168b1c3861b0ff480250284b70a6d57b8852a629
SHA2562e8957863173f7c3ce0e966b7683c04c16c01bdd78e41b6dc2a4b91a1d8f9181
SHA512597dd3315a05a0dc28a9fd31b24afbe4f6d2094fc95e8c3b5724368d5a15c97ad71c9dee178ae8ef467a32d8bc8aee304bb1b8e560bc964183ff1eaa610f83de
-
Filesize
7.3MB
MD54f0d9de0d534937dea9dcb479e3f09f7
SHA1d99b0224a28d360cad57c3ee9b97b2ae1dcc9b74
SHA2562daae00063e6141cfc30db8b7786566ff10feefa4ea65b4f9980a541a7a5c421
SHA51211ed7f957eec283fc2846e00c8148c66c61538059bc659978c65d49b9c11500b7057deb8c1ea2f9e39b77a8c9d8df85774dcb41d24ca3e3254c46a2e23f2519b
-
Filesize
27.6MB
MD5cbd2d222fe6b60ec3ee2f0389a180dc5
SHA14648d3752b9f5e9c5c8cd2593794851654c60125
SHA2561e806975407ff995659c6374f056b237f7b96a9da83977435b3bdf00fdb6e94b
SHA512bafbec0555566430d0bdb5e6b95a6e7d8b495b9f93788babd294242f91ce30e95b5ec058f29bf6a2ee0a0250658839e7a8cf8f40a5c3b77551eb4fdbccb13d4f