Resubmissions

28/03/2025, 07:23

250328-h8bj1as1fv 10

28/03/2025, 07:16

250328-h33fjaszg1 10

Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 07:23

General

  • Target

    cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe

  • Size

    75KB

  • MD5

    35aa48c51f67634ab9a05028ddacd91a

  • SHA1

    41eda72d9456025eb0f881daac43f4b920fda1bd

  • SHA256

    cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48

  • SHA512

    5e3433d76ae896da6a91b66a49d15026620261eaab93acf498a0ea913eb5461bf44d7afae81dcebc878e04810da86fd3dea90d82eebbebfa75d3df7e1f1d3d4a

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOWWJ:GhfxHNIreQm+HidWJ

Malware Config

Extracted

Family

qqpass

C2

http://www.zigui.org/article.php?id=103822

Attributes
  • url

    http://www.mxm9191.com/myrunner_up.exe

  • user_agent

    Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

Signatures

  • QQpass

    QQpass is a trojan written in C++..

  • Qqpass family
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe
    C:\Users\Admin\AppData\Local\Temp\cd2b256127192a645cb0ee2f575bc480261bee0f5777b07fdf8fa23c6896cf48.exe bcdedit /c set shutdown /r readonly /f force /t 2
    1⤵
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5320
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    77KB

    MD5

    1666404d412b4fcd0248cf98e1379a28

    SHA1

    caf19508488e55b10f4f586179dcd3a0dc11defc

    SHA256

    c9817b64ceab6df5dba5e3c4f90db5951fb82a5b5286d242b9217e2ed333bcfb

    SHA512

    7e4b4894b956f4cb5f9b2164eb0b21dc6a26048ea7f06f9e2cb3ee09ee94b996935e9826e3492623cd81264c9cd94de7707813ff66efc2007a212f6f1a44f0e9

  • C:\Windows\System\rundll32.exe

    Filesize

    80KB

    MD5

    72b351c133ba4acd8519aac6c30fa509

    SHA1

    c7ae1241132f15648dbbc1f21bd52859bb665096

    SHA256

    0f7daecebe147b871c9c42e3c096c09fbb477c42fa84d4d190457288b03d4dec

    SHA512

    35eba39d7e31a94a49b0e2dc0909b6416c3d69b323350590312963735613bdd925b7f939e35af62100bc9aaa561635c2f6f5d07961aa1592a952a390bf77ce78

  • memory/1740-14-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/5320-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/5320-13-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB