Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe
Resource
win10v2004-20220812-en
General
-
Target
ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe
-
Size
796KB
-
MD5
a7fb756bfe894118dd9390ec584ed097
-
SHA1
ee6baf27630b2da4c2c310240a15497954c33e73
-
SHA256
ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1
-
SHA512
53996704b70ce7bff42a76c5df45037ef30b9f8dc4283c4ef0789fd4bcf41abd1b630608ace3cd2e29822668fdeb573d3d058330f41676748a2158374f35fe03
-
SSDEEP
12288:d7tba8GV90fxf6JARzN9TbsltnlqvzFyqOF3Z4mxx9oEtlK+kt9T2Mhkdx2l:d7tbaTkfIARzN9Ml3qvorQmXuGCknK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1376 wg.exe -
Deletes itself 1 IoCs
pid Process 1364 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\BZXZHO.DAT ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe File created C:\Windows\wg.exe ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe File opened for modification C:\Windows\wg.exe ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe File created C:\Windows\uninstal.bat ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe File created C:\Windows\AFDCMR.DAT ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDetectedUrl wg.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 4011a5eeafccd801 wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\3e-81-0a-1e-e7-f5 wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6} wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5 wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecision = "0" wg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 60455f2bb0ccd801 wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecision = "0" wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionReason = "1" wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionReason = "1" wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 4011a5eeafccd801 wg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 60455f2bb0ccd801 wg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadNetworkName = "Network 2" wg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe Token: SeDebugPrivilege 1376 wg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1376 wg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1376 wg.exe 1376 wg.exe 1376 wg.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1792 1376 wg.exe 29 PID 1376 wrote to memory of 1792 1376 wg.exe 29 PID 1376 wrote to memory of 1792 1376 wg.exe 29 PID 1376 wrote to memory of 1792 1376 wg.exe 29 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30 PID 1980 wrote to memory of 1364 1980 ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe"C:\Users\Admin\AppData\Local\Temp\ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:1364
-
-
C:\Windows\wg.exeC:\Windows\wg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD56853cba3ccc11699c2d840f41c10393f
SHA180a430dcc2cb34b05d433f0f63b8ef8a6a09bbe3
SHA2560bcf3f4ff7862cd885003b8ecc4d424a2fd418fd64412ffe95a9c4221cc3de59
SHA512a02fef8b7c721459fa6f081a1208bf8dd84d957663b4d711b9f6f1731deedf977e5a391ec7481797da7a594c3dd133e84865133855dcdbe6da2128887270114c
-
Filesize
51KB
MD5d58f992c53515c9f1fb9394a46f4cb48
SHA11f9909d227b93be10328e0abc64052da984657ba
SHA25650c6b8848b0a9cf6a6b579928dc6e5c75cf7564c19bb7b40d86ba9d360ebb040
SHA5123a87c279fbbbaff2bfe791c523716ad092c41099b8914ba369565014502d408084259d4efe6896d785c024935b181ca34cf49e3b79f3f1a89ee1c9d775635d94
-
Filesize
254B
MD51a4f9bd1d8098c16ce920df2e248962f
SHA1c4b88d024b86d65ab35d2832b0d16cb4ddd0d085
SHA2560ab6c38fe0748ec78c6c791123603926134dd7207270936a9bd7742a9fa947b0
SHA5123d2fe572d3839685b9b69d600a8cb82347cbe4d0b76a002bd3f7085e041ab7dbeb6e33aa2d084d6e8072c5c6fe572a2cd3a2959c3348430fa7714ce50255c633
-
Filesize
796KB
MD5a7fb756bfe894118dd9390ec584ed097
SHA1ee6baf27630b2da4c2c310240a15497954c33e73
SHA256ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1
SHA51253996704b70ce7bff42a76c5df45037ef30b9f8dc4283c4ef0789fd4bcf41abd1b630608ace3cd2e29822668fdeb573d3d058330f41676748a2158374f35fe03
-
Filesize
796KB
MD5a7fb756bfe894118dd9390ec584ed097
SHA1ee6baf27630b2da4c2c310240a15497954c33e73
SHA256ea9a79b7aaae374ef7bcbadd9c57fad8b51ccaef0f1db94cef7eb026ec415bd1
SHA51253996704b70ce7bff42a76c5df45037ef30b9f8dc4283c4ef0789fd4bcf41abd1b630608ace3cd2e29822668fdeb573d3d058330f41676748a2158374f35fe03