Resubmissions

28/03/2025, 07:23

250328-h8bj1as1fv 10

28/03/2025, 07:16

250328-h33fjaszg1 10

Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 07:23

General

  • Target

    cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe

  • Size

    75KB

  • MD5

    35aa48c51f67634ab9a05028ddacd91a

  • SHA1

    41eda72d9456025eb0f881daac43f4b920fda1bd

  • SHA256

    cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48

  • SHA512

    5e3433d76ae896da6a91b66a49d15026620261eaab93acf498a0ea913eb5461bf44d7afae81dcebc878e04810da86fd3dea90d82eebbebfa75d3df7e1f1d3d4a

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOWWJ:GhfxHNIreQm+HidWJ

Malware Config

Extracted

Family

qqpass

C2

http://www.zigui.org/article.php?id=103822

Attributes
  • url

    http://www.mxm9191.com/myrunner_up.exe

  • user_agent

    Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

Signatures

  • QQpass

    QQpass is a trojan written in C++..

  • Qqpass family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe
    C:\Users\Admin\AppData\Local\Temp\cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe bcdedit /c set shutdown /r readonly /f force /t 2
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    82KB

    MD5

    cbe99cac92cca509db334ad1d56db908

    SHA1

    8144911cce1767bf531df8bb4b2357449cadddf6

    SHA256

    dbea519b748fecde0b1a812322f16e0d40e8b4d5b250a4593bd0665496911978

    SHA512

    938df44ffe31fb1cd1d09814cf019c490c96840d5fcbd9139c2778d7083f752a2cc0201d85cff7ebbb939c8a1156750edf67010289b0ccbe5538520be9697f38

  • \Windows\system\rundll32.exe

    Filesize

    73KB

    MD5

    b14042145636ab5bb86095be8c7a2576

    SHA1

    ef87ea6503f8535214037ece35c58925b59f2817

    SHA256

    5a9784159c245a3f3fa1fc13cdc62c53d216461bf7a66e0a77c86ac50034e3f2

    SHA512

    6f4d5e53c000854733441f34426b1c7408fd85dd9d52964b7d4a88fa00c664298c486c2ca2338f48c855998c58b3547423795a4024fb7ad25f6e613e705ed8c0

  • memory/1996-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1996-12-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/1996-17-0x0000000000360000-0x0000000000376000-memory.dmp

    Filesize

    88KB

  • memory/1996-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/1996-22-0x0000000000360000-0x0000000000362000-memory.dmp

    Filesize

    8KB

  • memory/2252-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2252-23-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB