Analysis
-
max time kernel
182s -
max time network
223s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:38
Static task
static1
Behavioral task
behavioral1
Sample
wg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
wg.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win10v2004-20220812-en
General
-
Target
wg.exe
-
Size
5.7MB
-
MD5
f55559f66229a8cfb591e0bcaa54c109
-
SHA1
17006709ee364b356e564a01fd70107c69691573
-
SHA256
2b873cb1b8eec5536a74c5ddab0472eff68cebf61757cbc317870b7192454ca8
-
SHA512
2ae90705029c37b3cead09d64cfd18bffb5507cd7def80b4a87a4f8759f205b4b9cbb86bfea090a71b98948b638c0ea35026da3925a5a5be082087791c3089de
-
SSDEEP
98304:J2llez/udrnJll4dP5aSGie4udyO4Okjsstz8V8bHxLcIm:J2lUzYIoSGz4ud11/qiupm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ÄæսĩÈÕ¸¨Öú.exepid process 928 ÄæսĩÈÕ¸¨Öú.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
wg.exepid process 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe 268 wg.exe -
Drops file in Windows directory 1 IoCs
Processes:
wg.exedescription ioc process File created C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe wg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
wg.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS wg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer wg.exe -
Processes:
iexplore.exeIEXPLORE.EXEÄæսĩÈÕ¸¨Öú.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07880b95601d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000729097c595fded478be26505ae75b5a90000000002000000000010660000000100002000000074a80f26f74b7f806707e3ff6ec1993d1f0cb508aa7dbec25772de0625e09de4000000000e8000000002000020000000662add61a27666a442aace5a848ada73057a481dfced71c0640391db8505ad5420000000168b9d7c3a8c7d37fdea1b7ff4a4623d8854be4d55ea05fc79ab7484bd4e6fd140000000a0e13dee7460878fb1b4e7cc16f571708cd320585d1455d430efde0905414ac8b25716b71d431d2f38a5c36af0680d180469792db2650273e8a5e9cf2aae7d9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D22406D1-6D49-11ED-AA01-6AB3F8C7EA51} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main ÄæսĩÈÕ¸¨Öú.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wg.exedescription pid process Token: 33 268 wg.exe Token: SeIncBasePriorityPrivilege 268 wg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 980 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
wg.exeÄæսĩÈÕ¸¨Öú.exeiexplore.exeIEXPLORE.EXEpid process 268 wg.exe 268 wg.exe 928 ÄæսĩÈÕ¸¨Öú.exe 928 ÄæսĩÈÕ¸¨Öú.exe 928 ÄæսĩÈÕ¸¨Öú.exe 928 ÄæսĩÈÕ¸¨Öú.exe 928 ÄæսĩÈÕ¸¨Öú.exe 980 iexplore.exe 980 iexplore.exe 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE 1324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
wg.exeÄæսĩÈÕ¸¨Öú.exeiexplore.exedescription pid process target process PID 268 wrote to memory of 928 268 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 268 wrote to memory of 928 268 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 268 wrote to memory of 928 268 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 268 wrote to memory of 928 268 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 928 wrote to memory of 980 928 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 928 wrote to memory of 980 928 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 928 wrote to memory of 980 928 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 928 wrote to memory of 980 928 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 980 wrote to memory of 1324 980 iexplore.exe IEXPLORE.EXE PID 980 wrote to memory of 1324 980 iexplore.exe IEXPLORE.EXE PID 980 wrote to memory of 1324 980 iexplore.exe IEXPLORE.EXE PID 980 wrote to memory of 1324 980 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\wg.exe"C:\Users\Admin\AppData\Local\Temp\wg.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exeC:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.moriwg.net3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\ÄæսĩÈÕ¸¨Öú.exeFilesize
1.5MB
MD591c1583ee24aa5791e4cf2a54cf802d7
SHA1b54d05d7be32a5595aa1fb1941cc77e3712a3013
SHA256c30acd06f8aa69501b9ef174dd7ba0f32fde4f48a94a7b21e998a133280797d7
SHA5127f9a46dab0fcf7deaeabef50689d834dacd650d83bcc6cbacb3e3b398c352d9499858e736f0342b2acae1ace6adcf7d9cd8624d4643930ec8d4d4eccbc778f77
-
memory/268-54-0x0000000075E31000-0x0000000075E33000-memory.dmpFilesize
8KB
-
memory/268-55-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB
-
memory/268-57-0x0000000076C00000-0x0000000076C47000-memory.dmpFilesize
284KB
-
memory/268-466-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-465-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-464-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-469-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-470-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-468-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-467-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-471-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-474-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-472-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-473-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-475-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-482-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-481-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-480-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-487-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-525-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-524-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-523-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-522-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-521-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-520-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-519-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-518-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-517-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-516-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-515-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-514-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-513-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-512-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-511-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-510-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-509-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-508-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-507-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-506-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-505-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-504-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-503-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-502-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-501-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-500-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-499-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-498-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-497-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-496-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-495-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-494-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-493-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-492-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-491-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-490-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-489-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-488-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-486-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-485-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-484-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-483-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-479-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-478-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-476-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-477-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-1333-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-1334-0x00000000024C0000-0x0000000002641000-memory.dmpFilesize
1.5MB
-
memory/268-2890-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/268-3937-0x000000000277F000-0x0000000002781000-memory.dmpFilesize
8KB
-
memory/268-3941-0x0000000002380000-0x0000000002480000-memory.dmpFilesize
1024KB
-
memory/268-3939-0x000000000277F000-0x0000000002781000-memory.dmpFilesize
8KB
-
memory/268-5279-0x0000000002890000-0x0000000002991000-memory.dmpFilesize
1.0MB
-
memory/268-5280-0x00000000029A0000-0x0000000002A41000-memory.dmpFilesize
644KB
-
memory/268-5284-0x000000000277F000-0x0000000002781000-memory.dmpFilesize
8KB
-
memory/268-5285-0x0000000002380000-0x0000000002480000-memory.dmpFilesize
1024KB
-
memory/268-5286-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB
-
memory/268-5287-0x0000000002770000-0x0000000002881000-memory.dmpFilesize
1.1MB
-
memory/928-5281-0x0000000000000000-mapping.dmp