Analysis
-
max time kernel
195s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:38
Static task
static1
Behavioral task
behavioral1
Sample
wg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
wg.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win10v2004-20220812-en
General
-
Target
wg.exe
-
Size
5.7MB
-
MD5
f55559f66229a8cfb591e0bcaa54c109
-
SHA1
17006709ee364b356e564a01fd70107c69691573
-
SHA256
2b873cb1b8eec5536a74c5ddab0472eff68cebf61757cbc317870b7192454ca8
-
SHA512
2ae90705029c37b3cead09d64cfd18bffb5507cd7def80b4a87a4f8759f205b4b9cbb86bfea090a71b98948b638c0ea35026da3925a5a5be082087791c3089de
-
SSDEEP
98304:J2llez/udrnJll4dP5aSGie4udyO4Okjsstz8V8bHxLcIm:J2lUzYIoSGz4ud11/qiupm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ÄæսĩÈÕ¸¨Öú.exepid process 3676 ÄæսĩÈÕ¸¨Öú.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ÄæսĩÈÕ¸¨Öú.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ÄæսĩÈÕ¸¨Öú.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
Processes:
wg.exepid process 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe 5108 wg.exe -
Drops file in Windows directory 1 IoCs
Processes:
wg.exedescription ioc process File created C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe wg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
wg.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS wg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer wg.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E482E5FA-6D49-11ED-B696-E62D9FD3CB0B} = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wg.exedescription pid process Token: 33 5108 wg.exe Token: SeIncBasePriorityPrivilege 5108 wg.exe Token: 33 5108 wg.exe Token: SeIncBasePriorityPrivilege 5108 wg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3368 iexplore.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
wg.exeÄæսĩÈÕ¸¨Öú.exeiexplore.exeIEXPLORE.EXEpid process 5108 wg.exe 5108 wg.exe 3676 ÄæսĩÈÕ¸¨Öú.exe 3676 ÄæսĩÈÕ¸¨Öú.exe 3676 ÄæսĩÈÕ¸¨Öú.exe 3676 ÄæսĩÈÕ¸¨Öú.exe 3676 ÄæսĩÈÕ¸¨Öú.exe 3368 iexplore.exe 3368 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
wg.exeÄæսĩÈÕ¸¨Öú.exeiexplore.exedescription pid process target process PID 5108 wrote to memory of 3676 5108 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 5108 wrote to memory of 3676 5108 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 5108 wrote to memory of 3676 5108 wg.exe ÄæսĩÈÕ¸¨Öú.exe PID 3676 wrote to memory of 3368 3676 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 3676 wrote to memory of 3368 3676 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 3368 wrote to memory of 2592 3368 iexplore.exe IEXPLORE.EXE PID 3368 wrote to memory of 2592 3368 iexplore.exe IEXPLORE.EXE PID 3368 wrote to memory of 2592 3368 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\wg.exe"C:\Users\Admin\AppData\Local\Temp\wg.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exeC:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.moriwg.net3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3368 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exeFilesize
1.5MB
MD591c1583ee24aa5791e4cf2a54cf802d7
SHA1b54d05d7be32a5595aa1fb1941cc77e3712a3013
SHA256c30acd06f8aa69501b9ef174dd7ba0f32fde4f48a94a7b21e998a133280797d7
SHA5127f9a46dab0fcf7deaeabef50689d834dacd650d83bcc6cbacb3e3b398c352d9499858e736f0342b2acae1ace6adcf7d9cd8624d4643930ec8d4d4eccbc778f77
-
C:\Windows\ÄæսĩÈÕ¸¨Öú.exeFilesize
1.5MB
MD591c1583ee24aa5791e4cf2a54cf802d7
SHA1b54d05d7be32a5595aa1fb1941cc77e3712a3013
SHA256c30acd06f8aa69501b9ef174dd7ba0f32fde4f48a94a7b21e998a133280797d7
SHA5127f9a46dab0fcf7deaeabef50689d834dacd650d83bcc6cbacb3e3b398c352d9499858e736f0342b2acae1ace6adcf7d9cd8624d4643930ec8d4d4eccbc778f77
-
memory/3676-1480-0x0000000000000000-mapping.dmp
-
memory/5108-132-0x0000000077B60000-0x0000000077D03000-memory.dmpFilesize
1.6MB
-
memory/5108-133-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB
-
memory/5108-134-0x0000000075D30000-0x0000000075F45000-memory.dmpFilesize
2.1MB
-
memory/5108-136-0x0000000075B90000-0x0000000075D30000-memory.dmpFilesize
1.6MB
-
memory/5108-137-0x0000000076F00000-0x0000000076F7A000-memory.dmpFilesize
488KB
-
memory/5108-1479-0x0000000002A50000-0x0000000002B50000-memory.dmpFilesize
1024KB
-
memory/5108-1483-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB