Analysis
-
max time kernel
165s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:38
Static task
static1
Behavioral task
behavioral1
Sample
wg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
wg.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
逆战末日免费版0829防止非法防止检测板.exe
Resource
win10v2004-20220812-en
General
-
Target
逆战末日免费版0829防止非法防止检测板.exe
-
Size
44KB
-
MD5
3050bf115925685e388920797e9c9946
-
SHA1
cee5e6b0a0eda4bba0bb5b8106d4fef703c90dce
-
SHA256
acb2b2ceb098ee1b9d450dc60bc1410f7bb8f2faf7ddffadc47540fba6b3745c
-
SHA512
6d36b5b0c37e2aea21dd189d16f3521677a15e2b964e412342ba88499c1843fa7a487e985b7735f1c0159c4d9746aafb692526020b8088efa570559b0b8ba9f1
-
SSDEEP
768:RtjCjA5eMVH0tTlzM+YnVrW1xUbPYy6W1xUbPYy3k:39h0HuVrW16Y3W16YQk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ÄæսĩÈÕ¸¨Öú.exepid process 1752 ÄæսĩÈÕ¸¨Öú.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ÄæսĩÈÕ¸¨Öú.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ÄæսĩÈÕ¸¨Öú.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
Processes:
wg.datpid process 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat 3832 wg.dat -
Drops file in Windows directory 1 IoCs
Processes:
wg.datdescription ioc process File created C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe wg.dat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
wg.datdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS wg.dat Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer wg.dat -
Processes:
iexplore.exe逆战末日免费版0829防止非法防止检测板.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main 逆战末日免费版0829防止非法防止检测板.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FBB7656A-6D49-11ED-B696-F22D08015D11} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
逆战末日免费版0829防止非法防止检测板.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.wj95.com/" 逆战末日免费版0829防止非法防止检测板.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wg.datdescription pid process Token: 33 3832 wg.dat Token: SeIncBasePriorityPrivilege 3832 wg.dat -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 744 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
逆战末日免费版0829防止非法防止检测板.exewg.datÄæսĩÈÕ¸¨Öú.exeiexplore.exeIEXPLORE.EXEpid process 2264 逆战末日免费版0829防止非法防止检测板.exe 3832 wg.dat 3832 wg.dat 1752 ÄæսĩÈÕ¸¨Öú.exe 1752 ÄæսĩÈÕ¸¨Öú.exe 1752 ÄæսĩÈÕ¸¨Öú.exe 1752 ÄæսĩÈÕ¸¨Öú.exe 1752 ÄæսĩÈÕ¸¨Öú.exe 744 iexplore.exe 744 iexplore.exe 4492 IEXPLORE.EXE 4492 IEXPLORE.EXE 4492 IEXPLORE.EXE 4492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
逆战末日免费版0829防止非法防止检测板.exewg.datÄæսĩÈÕ¸¨Öú.exeiexplore.exedescription pid process target process PID 2264 wrote to memory of 3832 2264 逆战末日免费版0829防止非法防止检测板.exe wg.dat PID 2264 wrote to memory of 3832 2264 逆战末日免费版0829防止非法防止检测板.exe wg.dat PID 2264 wrote to memory of 3832 2264 逆战末日免费版0829防止非法防止检测板.exe wg.dat PID 3832 wrote to memory of 1752 3832 wg.dat ÄæսĩÈÕ¸¨Öú.exe PID 3832 wrote to memory of 1752 3832 wg.dat ÄæսĩÈÕ¸¨Öú.exe PID 3832 wrote to memory of 1752 3832 wg.dat ÄæսĩÈÕ¸¨Öú.exe PID 1752 wrote to memory of 744 1752 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 1752 wrote to memory of 744 1752 ÄæսĩÈÕ¸¨Öú.exe iexplore.exe PID 744 wrote to memory of 4492 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 4492 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 4492 744 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\逆战末日免费版0829防止非法防止检测板.exe"C:\Users\Admin\AppData\Local\Temp\逆战末日免费版0829防止非法防止检测板.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\wg.datC:\Users\Admin\AppData\Local\Temp\wg.dat2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exeC:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.moriwg.net4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\ÄæսĩÈÕ¸¨Öú.exeFilesize
1.5MB
MD591c1583ee24aa5791e4cf2a54cf802d7
SHA1b54d05d7be32a5595aa1fb1941cc77e3712a3013
SHA256c30acd06f8aa69501b9ef174dd7ba0f32fde4f48a94a7b21e998a133280797d7
SHA5127f9a46dab0fcf7deaeabef50689d834dacd650d83bcc6cbacb3e3b398c352d9499858e736f0342b2acae1ace6adcf7d9cd8624d4643930ec8d4d4eccbc778f77
-
C:\Windows\ÄæսĩÈÕ¸¨Öú.exeFilesize
1.5MB
MD591c1583ee24aa5791e4cf2a54cf802d7
SHA1b54d05d7be32a5595aa1fb1941cc77e3712a3013
SHA256c30acd06f8aa69501b9ef174dd7ba0f32fde4f48a94a7b21e998a133280797d7
SHA5127f9a46dab0fcf7deaeabef50689d834dacd650d83bcc6cbacb3e3b398c352d9499858e736f0342b2acae1ace6adcf7d9cd8624d4643930ec8d4d4eccbc778f77
-
memory/1752-1481-0x0000000000000000-mapping.dmp
-
memory/3832-132-0x0000000000000000-mapping.dmp
-
memory/3832-133-0x0000000077E40000-0x0000000077FE3000-memory.dmpFilesize
1.6MB
-
memory/3832-134-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB
-
memory/3832-135-0x00000000771B0000-0x00000000773C5000-memory.dmpFilesize
2.1MB
-
memory/3832-137-0x00000000765F0000-0x0000000076790000-memory.dmpFilesize
1.6MB
-
memory/3832-138-0x00000000773D0000-0x000000007744A000-memory.dmpFilesize
488KB
-
memory/3832-1480-0x0000000002610000-0x0000000002710000-memory.dmpFilesize
1024KB
-
memory/3832-1484-0x0000000002610000-0x0000000002710000-memory.dmpFilesize
1024KB
-
memory/3832-1485-0x0000000000400000-0x00000000009B5000-memory.dmpFilesize
5.7MB