Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe
Resource
win7-20221111-en
General
-
Target
7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe
-
Size
8.2MB
-
MD5
5314f9b66878db3fc8733be0a5890d7f
-
SHA1
2fda2c33e079041a9acbebe186bd6db616c7be0d
-
SHA256
7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe
-
SHA512
4bc72d360f906828537e5a0321bec74d97d53537fe720b5a7f0ab508dc3b887b6e7c6cb7ee5a387d079357d50ddee8baab768573d5a939a5ac385b7a429d1bb4
-
SSDEEP
98304:Tg8NoaGCGg0pL2OIUvKZa3ZnaGgux4QrPSNAPzpUCu+8PCvOLMtqlrynFQyfoIod:TN1m9vGapaGHrXzpUCelcIkPQIot96
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ £°£¶£°£¶.exe -
Executes dropped EXE 3 IoCs
pid Process 328 £°£¶£°£¶.exe 568 dns.exe 468 ~hwxgips.vbe -
resource yara_rule behavioral1/files/0x00090000000139eb-59.dat upx behavioral1/files/0x00090000000139eb-61.dat upx behavioral1/memory/568-63-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/files/0x00090000000139eb-64.dat upx behavioral1/memory/568-73-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/328-75-0x0000000077450000-0x00000000775D0000-memory.dmp upx behavioral1/memory/328-76-0x0000000005230000-0x00000000052A1000-memory.dmp upx behavioral1/memory/328-78-0x0000000005230000-0x00000000052A1000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine £°£¶£°£¶.exe -
Loads dropped DLL 5 IoCs
pid Process 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 568 dns.exe 568 dns.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/568-73-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral1/memory/328-75-0x0000000077450000-0x00000000775D0000-memory.dmp autoit_exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dns.vbe dns.exe File created C:\Windows\SysWOW64\dns.vbe dns.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 328 £°£¶£°£¶.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch £°£¶£°£¶.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da00000000020000000000106600000001000020000000526fba3df7918ddebe2cd71692ec643fd132d4f7b0f88c709d0db09e0793d88d000000000e800000000200002000000058fe3b4c556329d3dd0660840a4289336bf8354953fa9fd29f5bcfdefe9b604b20000000ea0291fcae0a29ccafc06678929d028e9a7e828fbd72a13fb8192cf81ec6a08340000000f72c3121e74751dad1647e77f26f6355ef4a9b6323103b9b110e1101e03852fd7732c01b3fd7127fc260dad2ffa0658a0e70b73206bbc2f553fd706e4f237b94 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00bd5b770701d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A07C651-6CFA-11ED-AD63-CED6325FB9F2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main £°£¶£°£¶.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" £°£¶£°£¶.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 568 dns.exe 568 dns.exe 568 dns.exe 568 dns.exe 328 £°£¶£°£¶.exe 568 dns.exe 328 £°£¶£°£¶.exe 328 £°£¶£°£¶.exe 328 £°£¶£°£¶.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 328 £°£¶£°£¶.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 568 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 328 £°£¶£°£¶.exe 328 £°£¶£°£¶.exe 328 £°£¶£°£¶.exe 328 £°£¶£°£¶.exe 568 iexplore.exe 568 iexplore.exe 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE 1784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1428 wrote to memory of 328 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 28 PID 1428 wrote to memory of 328 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 28 PID 1428 wrote to memory of 328 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 28 PID 1428 wrote to memory of 328 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 28 PID 1428 wrote to memory of 568 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 29 PID 1428 wrote to memory of 568 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 29 PID 1428 wrote to memory of 568 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 29 PID 1428 wrote to memory of 568 1428 7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe 29 PID 568 wrote to memory of 468 568 dns.exe 30 PID 568 wrote to memory of 468 568 dns.exe 30 PID 568 wrote to memory of 468 568 dns.exe 30 PID 568 wrote to memory of 468 568 dns.exe 30 PID 328 wrote to memory of 568 328 £°£¶£°£¶.exe 37 PID 328 wrote to memory of 568 328 £°£¶£°£¶.exe 37 PID 328 wrote to memory of 568 328 £°£¶£°£¶.exe 37 PID 328 wrote to memory of 568 328 £°£¶£°£¶.exe 37 PID 568 wrote to memory of 1784 568 iexplore.exe 38 PID 568 wrote to memory of 1784 568 iexplore.exe 38 PID 568 wrote to memory of 1784 568 iexplore.exe 38 PID 568 wrote to memory of 1784 568 iexplore.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe"C:\Users\Admin\AppData\Local\Temp\7bed3ad93b19db82b353027a3faa0d7c73a08a49fbfff9991b71e4c0579c6dfe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe"C:\Users\Admin\AppData\Local\Temp\£°£¶£°£¶.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.166wg.net/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\dns.exe"C:\Users\Admin\AppData\Local\Temp\dns.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe"C:\Users\Admin\AppData\Local\Temp\~hwxgips.vbe" "C:\Windows\SysWOW64\dns.vbe"3⤵
- Executes dropped EXE
PID:468
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5e45e27446fe4bb66a6a9226414794ea0
SHA15e0676807b5ce74748e2201d861e7a16e855c448
SHA256042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5
SHA512b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605
-
Filesize
411KB
MD5e45e27446fe4bb66a6a9226414794ea0
SHA15e0676807b5ce74748e2201d861e7a16e855c448
SHA256042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5
SHA512b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605
-
Filesize
138KB
MD5d1ab72db2bedd2f255d35da3da0d4b16
SHA1860265276b29b42b8c4b077e5c651def9c81b6e9
SHA256047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0
SHA512b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185
-
Filesize
138KB
MD5d1ab72db2bedd2f255d35da3da0d4b16
SHA1860265276b29b42b8c4b077e5c651def9c81b6e9
SHA256047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0
SHA512b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185
-
Filesize
7.8MB
MD516ff4b62d43bbf6a9f28cbcda002a7c2
SHA1eee991d06c2e0b512a226e05440c8026f8d49e89
SHA256bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7
SHA5125fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd
-
Filesize
7.8MB
MD516ff4b62d43bbf6a9f28cbcda002a7c2
SHA1eee991d06c2e0b512a226e05440c8026f8d49e89
SHA256bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7
SHA5125fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd
-
Filesize
752B
MD54d566e5d0f61678147812b9f3e677c42
SHA153646b8d2239a31f8ab173b75356fe2aabdd1087
SHA256426a59e454b8b7329f3dbb356bbdb5e3cbe5e8bc97abfe5b8c8f63a85b30e3ff
SHA512ad69478b4a0b3148436da1e315ce7f9115284ef2b7d70bbc7bd7745852f65db126ad6a37b4d3977c482af6405b03077103059146ad171eab430632725217d70d
-
Filesize
411KB
MD5e45e27446fe4bb66a6a9226414794ea0
SHA15e0676807b5ce74748e2201d861e7a16e855c448
SHA256042fe3dc806396e06bbe307edfad4de4728f5af72820ae2e3fc4a22d63644bf5
SHA512b1fc39be0b645272446e01a9bb17814c93299363335856a1154c331c6cd95a07270a04cdf514755ca9851acb6377a984084e6efa991a7a30a3997171baeba605
-
Filesize
138KB
MD5d1ab72db2bedd2f255d35da3da0d4b16
SHA1860265276b29b42b8c4b077e5c651def9c81b6e9
SHA256047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0
SHA512b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185
-
Filesize
138KB
MD5d1ab72db2bedd2f255d35da3da0d4b16
SHA1860265276b29b42b8c4b077e5c651def9c81b6e9
SHA256047f3c5a7ab0ea05f35b2ca8037bf62dd4228786d07707064dbd0d46569305d0
SHA512b46830742eebc85e731c14f7dc72cc6734fcc79aab46f6080c95589c438c4cca0a069027badc0a8a78e4deeb31cdf38df3d63db679b793212a32efdad7bb8185
-
Filesize
7.8MB
MD516ff4b62d43bbf6a9f28cbcda002a7c2
SHA1eee991d06c2e0b512a226e05440c8026f8d49e89
SHA256bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7
SHA5125fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd
-
Filesize
7.8MB
MD516ff4b62d43bbf6a9f28cbcda002a7c2
SHA1eee991d06c2e0b512a226e05440c8026f8d49e89
SHA256bba918fefc6eb57ea5bde40b4744888a2dee4751cdf559b525073677e1643ec7
SHA5125fd0467660983360dbe929b19e9abef3ae4dc57da80c0c8b62f58bb98bd84af520c7993360ce4d1ad05770c4e4f05dea5f9cc47a987e263c82b32fbe5929d8cd