Analysis
-
max time kernel
59s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe
Resource
win10v2004-20220901-en
General
-
Target
80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe
-
Size
126KB
-
MD5
55116b0306b0bdf3064fae9988d38c80
-
SHA1
57b2ca76d142fd4a96bec8e076a09bd238728eea
-
SHA256
80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
-
SHA512
701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
SSDEEP
3072:sLl4w1QHe+3AMvGXDZcriKjrs2gCRCydnjQKSohheHY+S:sLl4lHerMv4RKdRRVnjk6heHY+S
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1736 WMPRWISE.EXE 1528 wmprwise.exe -
Loads dropped DLL 4 IoCs
pid Process 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 1528 wmprwise.exe 1528 wmprwise.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Firewall 2.9 = "C:\\Users\\Admin\\AppData\\Roaming\\WMPRWISE.EXE" 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\desktop.ini wmprwise.exe File opened for modification C:\Users\Admin\AppData\Roaming\desktop.ini wmprwise.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1204 set thread context of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1736 set thread context of 1528 1736 WMPRWISE.EXE 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry wmprwise.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\SavedLegacySettingsML = 383436343330343931 wmprwise.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1204 wrote to memory of 1344 1204 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 27 PID 1344 wrote to memory of 1736 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 28 PID 1344 wrote to memory of 1736 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 28 PID 1344 wrote to memory of 1736 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 28 PID 1344 wrote to memory of 1736 1344 80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe 28 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29 PID 1736 wrote to memory of 1528 1736 WMPRWISE.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe"C:\Users\Admin\AppData\Local\Temp\80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\users\admin\appdata\local\temp\80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe"c:\users\admin\appdata\local\temp\80d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\WMPRWISE.EXEC:\Users\Admin\AppData\Roaming\WMPRWISE.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\users\admin\appdata\roaming\wmprwise.exe"c:\users\admin\appdata\roaming\wmprwise.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
PID:1528
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD555116b0306b0bdf3064fae9988d38c80
SHA157b2ca76d142fd4a96bec8e076a09bd238728eea
SHA25680d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
SHA512701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
Filesize
126KB
MD555116b0306b0bdf3064fae9988d38c80
SHA157b2ca76d142fd4a96bec8e076a09bd238728eea
SHA25680d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
SHA512701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
Filesize
126KB
MD555116b0306b0bdf3064fae9988d38c80
SHA157b2ca76d142fd4a96bec8e076a09bd238728eea
SHA25680d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
SHA512701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
Filesize
126KB
MD555116b0306b0bdf3064fae9988d38c80
SHA157b2ca76d142fd4a96bec8e076a09bd238728eea
SHA25680d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
SHA512701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
Filesize
126KB
MD555116b0306b0bdf3064fae9988d38c80
SHA157b2ca76d142fd4a96bec8e076a09bd238728eea
SHA25680d47d9c711dc4dfbfbe9c8a9ab4ea0772c8cf29149630417489c0fd8886bfd6
SHA512701e38ab7a7d0058fe50203b42281b32c289f38c1351a719e5252709ffa8bde886b6727732359dc02d88f3ccccfc94ac11b11107bfadce028504bdf510fe0e64
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51