Analysis
-
max time kernel
116s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 13:19
Static task
static1
Behavioral task
behavioral1
Sample
52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe
Resource
win10v2004-20250211-en
General
-
Target
52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe
-
Size
1.6MB
-
MD5
0e577b56933e1ca5c34d2332a5c60a00
-
SHA1
9a16911a231aa1d88ed89869b4a705c3023225d4
-
SHA256
52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623c
-
SHA512
15b4f4910a90678c52b0790fe0a47017240dc70764c060e99a842b16b0f0230267467b0380a9ddf039de78e2c7b95db8d9d88ba67ac736975850ab00ebea6d81
-
SSDEEP
24576:EeuPfbQTsLQvDFzqllx+/IAFAeuoRq6DJ/CoT+scEcz4OBl0p/EJUhe7DdwIHXZI:DtOgdquInmfdCqjcG00pces7DfHX
Malware Config
Extracted
systembc
wodresomdaymomentum.org
Signatures
-
Systembc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ gqdt.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion gqdt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion gqdt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 gqdt.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine gqdt.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2460 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe 2688 gqdt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gqdt.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2460 52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe 2688 gqdt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2688 2884 taskeng.exe 33 PID 2884 wrote to memory of 2688 2884 taskeng.exe 33 PID 2884 wrote to memory of 2688 2884 taskeng.exe 33 PID 2884 wrote to memory of 2688 2884 taskeng.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe"C:\Users\Admin\AppData\Local\Temp\52de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623cN.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
C:\Windows\system32\taskeng.exetaskeng.exe {66B055CC-A702-4F5C-9F37-0F94DC1DB590} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\ProgramData\xrnrui\gqdt.exeC:\ProgramData\xrnrui\gqdt.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50e577b56933e1ca5c34d2332a5c60a00
SHA19a16911a231aa1d88ed89869b4a705c3023225d4
SHA25652de774870c7ada6eed786f6d24840d1a59f7665d5b90c5029522ca35243623c
SHA51215b4f4910a90678c52b0790fe0a47017240dc70764c060e99a842b16b0f0230267467b0380a9ddf039de78e2c7b95db8d9d88ba67ac736975850ab00ebea6d81
-
Filesize
216B
MD5297530c4e68bb38a69e2933dd695eab2
SHA1e38bfa51ad8c339f21793e88ed6725a4843b619c
SHA2560ddb5782af4481ea02db1f4b8a38aec13c2d0ed8e9b6ff56d2ad96cad62e8c12
SHA51271ee88ebc7d03691a7eb84bc2e2b1d6e0570b7ee02b3ca92a7212b5b983976696472838ca262b00b7f94a76cf959d9bf7a184c38477a4828973a855e8c592cb9