Analysis
-
max time kernel
71s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe
Resource
win10v2004-20220901-en
General
-
Target
19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe
-
Size
123KB
-
MD5
5129f6ba842a3d15136b9ca88f447330
-
SHA1
063d6ab267ea253a9c8f8a1718ebada61b2119cf
-
SHA256
19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
-
SHA512
fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
SSDEEP
3072:TrhstTkhJ3Tqvcu4pLAP8rXDJCxDKas9bVF0iN7KipMp7q:vheTk/TqIpkEDaKp5FxxKuv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1968 WMPRWISE.EXE 1964 wmprwise.exe -
Loads dropped DLL 4 IoCs
pid Process 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 1964 wmprwise.exe 1964 wmprwise.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Firewall 2.9 = "C:\\Users\\Admin\\AppData\\Roaming\\WMPRWISE.EXE" 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\desktop.ini wmprwise.exe File opened for modification C:\Users\Admin\AppData\Roaming\desktop.ini wmprwise.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 900 set thread context of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 1968 set thread context of 1964 1968 WMPRWISE.EXE 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry wmprwise.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\SavedLegacySettingsML = 363035343830323930 wmprwise.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 900 wrote to memory of 1984 900 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 27 PID 1984 wrote to memory of 1968 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 28 PID 1984 wrote to memory of 1968 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 28 PID 1984 wrote to memory of 1968 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 28 PID 1984 wrote to memory of 1968 1984 19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe 28 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29 PID 1968 wrote to memory of 1964 1968 WMPRWISE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe"C:\Users\Admin\AppData\Local\Temp\19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
\??\c:\users\admin\appdata\local\temp\19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe"c:\users\admin\appdata\local\temp\19158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\WMPRWISE.EXEC:\Users\Admin\AppData\Roaming\WMPRWISE.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\users\admin\appdata\roaming\wmprwise.exe"c:\users\admin\appdata\roaming\wmprwise.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
PID:1964
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD55129f6ba842a3d15136b9ca88f447330
SHA1063d6ab267ea253a9c8f8a1718ebada61b2119cf
SHA25619158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
SHA512fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
Filesize
123KB
MD55129f6ba842a3d15136b9ca88f447330
SHA1063d6ab267ea253a9c8f8a1718ebada61b2119cf
SHA25619158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
SHA512fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
Filesize
123KB
MD55129f6ba842a3d15136b9ca88f447330
SHA1063d6ab267ea253a9c8f8a1718ebada61b2119cf
SHA25619158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
SHA512fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
Filesize
123KB
MD55129f6ba842a3d15136b9ca88f447330
SHA1063d6ab267ea253a9c8f8a1718ebada61b2119cf
SHA25619158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
SHA512fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
Filesize
123KB
MD55129f6ba842a3d15136b9ca88f447330
SHA1063d6ab267ea253a9c8f8a1718ebada61b2119cf
SHA25619158853b7c2497b322b77bbdef59b7299c913f0773ff89394163b320105933f
SHA512fc0799e97baac50e99b5b09e4da48681d9c9177fad7bf8d86add6dc928da62027952d6e669712a48434a48cab48cadfb7642e5f7da0985d514a932342a2d2fac
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51