Analysis

  • max time kernel
    150s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 20:42

General

  • Target

    cf[]Զǹ+ʮ׼[޸]/wg.exe

  • Size

    1.3MB

  • MD5

    358247032990d89f08c3fbd925a87f54

  • SHA1

    d4838436e51711f8842a5dcc69cde3e66bcf3ba4

  • SHA256

    69a0277a2130b1138f413ae58d456c9fbe35a31408b52dbef005b0ea8940d8cc

  • SHA512

    1eeb8219c8530ce74b87991e10786d8c2ac4d9498a689c2f08dca52184059bd84723f339a8358cf0c6b69203f150eeeaecc4978a58afc0f4ca71612d4dc1b7de

  • SSDEEP

    24576:N9xo5J35xAmxSPErgL8GPJQw//ajmJ2tfWAwBg7qv3C4caJqDRPFxb5jr6jQS:N85JjAmx7rgwAJp//aiJ2tLR734ca8b6

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 10 IoCs
  • VMProtect packed file 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 44 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf[]Զǹ+ʮ׼[޸]\wg.exe
    "C:\Users\Admin\AppData\Local\Temp\cf[]Զǹ+ʮ׼[޸]\wg.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:300
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1288
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1196
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1820
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1476
                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1984
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1784
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe"
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:1572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\ZQJIPT4D.txt

    Filesize

    89B

    MD5

    1478505c8bd572a6a5c6ad357d5993ba

    SHA1

    66255fe19237bd08cfce3edc72b9491fc5fe1b2d

    SHA256

    17d783096476ce8a35ac23af6435b0983b7a254c6ecb9ddfb9f3edb7341d31ee

    SHA512

    4bd934aeae7d05e2d491b6cc72865001ba353d86edbd9068fa0944b307ff87b5e539297f0387e3778bc1b969a6a793bf09a6984a1ca2fce99c1e42128a116054

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\CF½ø½ø×Ô¶¯¿ªÇ¹0524.exe

    Filesize

    1.8MB

    MD5

    3115214ce7e8c35b199b3174ad3a0582

    SHA1

    fcde16c3dbcab08fbdf6b6c91e06d0e1133c1c17

    SHA256

    5e5af924f5c0950286449dfceefdfa5fd504563d41ddbbe4a0daba280d1e5af5

    SHA512

    b6c329082a08e449f4d7a344afe176180e9c2d4875e1e16314ca5b246faf10daa77046851272fd8e9459fb285841e0e10f31b51d0278b025c1d63124b3f8cf75

  • memory/300-68-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/300-71-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/688-54-0x0000000000400000-0x0000000000836000-memory.dmp

    Filesize

    4.2MB

  • memory/688-97-0x0000000000400000-0x0000000000836000-memory.dmp

    Filesize

    4.2MB

  • memory/688-55-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/1196-80-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1196-83-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1288-72-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1288-75-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1476-88-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1476-91-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1480-58-0x0000000000000000-mapping.dmp

  • memory/1480-66-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1480-61-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1480-62-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1572-101-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1784-96-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1784-100-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1816-76-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1816-78-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1820-84-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1820-86-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-94-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB

  • memory/1984-92-0x0000000000400000-0x0000000000604000-memory.dmp

    Filesize

    2.0MB