Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe
Resource
win10v2004-20220901-en
General
-
Target
9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe
-
Size
1.0MB
-
MD5
fd2aa92a71824996e8e1f9602732b671
-
SHA1
03787461eb59034012d0ff215428ed91c143dc5b
-
SHA256
9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233
-
SHA512
9e048cd92ec024f3a5ea8426790c2ef76872e63c5b24f56e580e459d7a6675c1269f6ce6f33147954b752f4bf3f096e192c4e0724ea6b458ba97df725d3c7447
-
SSDEEP
24576:ohI98hBIkJSRRkVUz7bBAFuUWBxDaoFryHqhHab:ohIMBIkGkaziEUaPFryHqkb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit regini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit regini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,D:\\Program Files\\Tencent\\qqGame\\game\\qqgame\\kiss.exe" 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit regini.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\CWGWZEZE.sys 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\CWGWZEZE\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\CWGWZEZE.sys" 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe -
Deletes itself 1 IoCs
pid Process 1912 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created D:\Program Files\Tencent\qqGame\game\qqgame\desktop.ini 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe File opened for modification D:\Program Files\Tencent\qqGame\game\qqgame\desktop.ini 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cacls.exe File opened (read-only) \??\D: cacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier convert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier convert.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1704 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe Token: 33 1972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1972 AUDIODG.EXE Token: 33 1972 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1972 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1460 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 29 PID 1440 wrote to memory of 1460 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 29 PID 1440 wrote to memory of 1460 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 29 PID 1440 wrote to memory of 1460 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 29 PID 1460 wrote to memory of 1276 1460 cmd.exe 31 PID 1460 wrote to memory of 1276 1460 cmd.exe 31 PID 1460 wrote to memory of 1276 1460 cmd.exe 31 PID 1460 wrote to memory of 1276 1460 cmd.exe 31 PID 1440 wrote to memory of 980 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 32 PID 1440 wrote to memory of 980 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 32 PID 1440 wrote to memory of 980 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 32 PID 1440 wrote to memory of 980 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 32 PID 980 wrote to memory of 1768 980 cmd.exe 34 PID 980 wrote to memory of 1768 980 cmd.exe 34 PID 980 wrote to memory of 1768 980 cmd.exe 34 PID 980 wrote to memory of 1768 980 cmd.exe 34 PID 1440 wrote to memory of 728 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 35 PID 1440 wrote to memory of 728 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 35 PID 1440 wrote to memory of 728 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 35 PID 1440 wrote to memory of 728 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 35 PID 1440 wrote to memory of 1432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 37 PID 1440 wrote to memory of 1432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 37 PID 1440 wrote to memory of 1432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 37 PID 1440 wrote to memory of 1432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 37 PID 1440 wrote to memory of 432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 39 PID 1440 wrote to memory of 432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 39 PID 1440 wrote to memory of 432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 39 PID 1440 wrote to memory of 432 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 39 PID 432 wrote to memory of 536 432 cmd.exe 41 PID 432 wrote to memory of 536 432 cmd.exe 41 PID 432 wrote to memory of 536 432 cmd.exe 41 PID 432 wrote to memory of 536 432 cmd.exe 41 PID 1440 wrote to memory of 1684 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 42 PID 1440 wrote to memory of 1684 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 42 PID 1440 wrote to memory of 1684 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 42 PID 1440 wrote to memory of 1684 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 42 PID 1684 wrote to memory of 1816 1684 cmd.exe 44 PID 1684 wrote to memory of 1816 1684 cmd.exe 44 PID 1684 wrote to memory of 1816 1684 cmd.exe 44 PID 1684 wrote to memory of 1816 1684 cmd.exe 44 PID 1440 wrote to memory of 1652 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 45 PID 1440 wrote to memory of 1652 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 45 PID 1440 wrote to memory of 1652 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 45 PID 1440 wrote to memory of 1652 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 45 PID 1440 wrote to memory of 1884 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 47 PID 1440 wrote to memory of 1884 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 47 PID 1440 wrote to memory of 1884 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 47 PID 1440 wrote to memory of 1884 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 47 PID 1440 wrote to memory of 1912 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 49 PID 1440 wrote to memory of 1912 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 49 PID 1440 wrote to memory of 1912 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 49 PID 1440 wrote to memory of 1912 1440 9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe 49 PID 1912 wrote to memory of 1704 1912 cmd.exe 51 PID 1912 wrote to memory of 1704 1912 cmd.exe 51 PID 1912 wrote to memory of 1704 1912 cmd.exe 51 PID 1912 wrote to memory of 1704 1912 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe"C:\Users\Admin\AppData\Local\Temp\9b07c26aa7f84239289f6ee34af8ffa568934edc8582cc1248d069ab59a80233.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Sets service image path in registry
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd.exe /c convert d: /fs:ntfs /x2⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\convert.execonvert d: /fs:ntfs /x3⤵
- Enumerates system info in registry
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cacls "d:\program files\tencent\qqgame\game" /d everyone /e2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cacls.execacls "d:\program files\tencent\qqgame\game" /d everyone /e3⤵
- Enumerates connected drives
PID:1768
-
-
-
C:\Windows\SysWOW64\regini.exeregini c:\temp.txt2⤵
- Modifies WinLogon for persistence
PID:728
-
-
C:\Windows\SysWOW64\regini.exeregini c:\temp.txt2⤵
- Modifies WinLogon for persistence
PID:1432
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c convert d: /fs:ntfs /x2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\convert.execonvert d: /fs:ntfs /x3⤵
- Enumerates system info in registry
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cacls "d:\program files\tencent\qqgame\game" /d everyone /e2⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cacls.execacls "d:\program files\tencent\qqgame\game" /d everyone /e3⤵
- Enumerates connected drives
PID:1816
-
-
-
C:\Windows\SysWOW64\regini.exeregini c:\temp.txt2⤵
- Modifies WinLogon for persistence
PID:1652
-
-
C:\Windows\SysWOW64\regini.exeregini c:\temp.txt2⤵PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c temp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1704
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137B
MD53eaf4e2e37e2b275c89551e416ff0ae0
SHA1d8c0c99723ea2b200cb93c6c365244621f372cac
SHA25631322c819ed30f00854b1cbf0f1074ecf29c69e0fb7eed86bf90429e0ab27540
SHA512f142dd655da73b1851fed6f2b095c2a6f846ba23627231618f9cfb8547f37062df8837f4356e49f0c8094778df2105898408e0616979359407af1c863364c85a
-
Filesize
88B
MD583742c94fb95d102e93fddf46d8ef6f2
SHA152dfc8917945fc55311dc84c5212f286114d550e
SHA2565a5cf88d27c0e735ae2e5a979ac3fbcc6cd3773ab03af16dc591d3c74a7dc2d4
SHA5126e5cb5de0c8d8f3312c73cc81e7b55df1d41ffbcc5056b96aadaad02b1c317f014e2f969e75b8efea25a28a6d5c545261ed5346464ffa1e9907e271b175e20e0
-
Filesize
88B
MD583742c94fb95d102e93fddf46d8ef6f2
SHA152dfc8917945fc55311dc84c5212f286114d550e
SHA2565a5cf88d27c0e735ae2e5a979ac3fbcc6cd3773ab03af16dc591d3c74a7dc2d4
SHA5126e5cb5de0c8d8f3312c73cc81e7b55df1d41ffbcc5056b96aadaad02b1c317f014e2f969e75b8efea25a28a6d5c545261ed5346464ffa1e9907e271b175e20e0
-
Filesize
88B
MD5220d2e982564566aee034853d946bf8e
SHA128fd41417afbdd1a363efb6d3bd630093841dc6c
SHA256c2a32f3d34886137ddc9936e325c0fd540bf5ab6394cf47cb52f837c8c9e4060
SHA5129549459dfbcfe2fffc8ba8e0d137bb821b9bea0143c7e187c9a4c0ed6bd0f2088d514e6e3b3039cd15f08a90a36bf8a417704476385ab0b842afe882053e269d
-
Filesize
1.1MB
MD5cf46bb62a1ba559ceb0fad7a5d642f28
SHA180b63dd193e84bfacbe535587dd38471b8ea2c24
SHA256fe4bba1a99b332c8bbd196d3a2f3c78d9edc8f212842ff2efef17eba38427f67
SHA5121f71f31fdc1ef7695d7a6e79218a9192804178bb2af80486de4f8ff3d7e176860813a61fa265bf78fe4ff722a85b72798938d715d8a2a034ac759505197a1058