Resubmissions
02-02-2025 21:49
250202-1pr2razjas 8Analysis
-
max time kernel
13s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 21:49
Static task
static1
Behavioral task
behavioral1
Sample
qbittorrent_5.0.3_x64_setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
qbittorrent_5.0.3_x64_setup.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
qbittorrent.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
qbittorrent.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
uninst.exe
Resource
win10v2004-20250129-en
General
-
Target
uninst.exe
-
Size
138KB
-
MD5
69f11311116dea38b390d99ccc295b24
-
SHA1
eceb02f012a978f518f0928a00017fe263aeec8a
-
SHA256
6f0baf53513b09eee91da1e92a4ac6637e606a645b52adee5fd0402de9232548
-
SHA512
73fe603810ccfe1ad2d43ab9917d6adbe8c189d558ed709c7f703c7400848a18b0a989d0a5b18e6b5208ab3d7d5880dd686dea38fc32b8bee0a207436b20ba2e
-
SSDEEP
3072:dnPdzuK8Jdw4TMJw3uXceAuH7v6OjxaJE1WQav1vb2MyE:dnPdudwDzmuT6OjxaBQav1TsE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 Un.exe -
Loads dropped DLL 3 IoCs
pid Process 2676 uninst.exe 2808 Un.exe 2808 Un.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2808 2676 uninst.exe 31 PID 2676 wrote to memory of 2808 2676 uninst.exe 31 PID 2676 wrote to memory of 2808 2676 uninst.exe 31 PID 2676 wrote to memory of 2808 2676 uninst.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe"C:\Users\Admin\AppData\Local\Temp\~nsu1.tmp\Un.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD550016010fb0d8db2bc4cd258ceb43be5
SHA144ba95ee12e69da72478cf358c93533a9c7a01dc
SHA25632230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e
SHA512ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
138KB
MD569f11311116dea38b390d99ccc295b24
SHA1eceb02f012a978f518f0928a00017fe263aeec8a
SHA2566f0baf53513b09eee91da1e92a4ac6637e606a645b52adee5fd0402de9232548
SHA51273fe603810ccfe1ad2d43ab9917d6adbe8c189d558ed709c7f703c7400848a18b0a989d0a5b18e6b5208ab3d7d5880dd686dea38fc32b8bee0a207436b20ba2e