Analysis
-
max time kernel
207s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe
Resource
win10v2004-20220812-en
General
-
Target
8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe
-
Size
204KB
-
MD5
8f97132303b5bf9f71f5a31a5ef2cc51
-
SHA1
62bcf1040405e903decc4a913e0bcd4601f1917c
-
SHA256
8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311
-
SHA512
6a41fc82e1d3b7d1c8b497680e8a3030d0eb64f66360e770fe272b163050de242d33b251c4963010d5a79e6c05ddd1af8c96bafbe3dcb43fe7aaffccbf3fde67
-
SSDEEP
1536:PO+OonHo1vzxHwx/kxNy3tQ9CW5EZWHakMwP9W6uXNh9h1AWa11GBPIdRONd+w6G:VHo1F0tQ9nLHbB9WTk9+Jgqmltri
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wbweih.exe -
Executes dropped EXE 1 IoCs
pid Process 4092 wbweih.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /u" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /j" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /m" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /t" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /h" 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /r" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /z" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /y" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /x" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /s" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /q" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /e" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /n" wbweih.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /d" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /g" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /h" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /v" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /b" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /w" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /p" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /o" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /a" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /f" wbweih.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run\ wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /k" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /c" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /l" wbweih.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbweih = "C:\\Users\\Admin\\wbweih.exe /i" wbweih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe 4092 wbweih.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 4092 wbweih.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4092 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 79 PID 4892 wrote to memory of 4092 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 79 PID 4892 wrote to memory of 4092 4892 8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe"C:\Users\Admin\AppData\Local\Temp\8d23b1649bb19dd0a7a5f3ffba401e177cded508385caa9d1f266d2628c3b311.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\wbweih.exe"C:\Users\Admin\wbweih.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5eae7561c164038ad8b832862ae6c2091
SHA117ed9188fc4b08d60a5dd4ffc98b978860fd1671
SHA256c1abb099d3653906d5809a454b5619a7f29624ac26104423c2dd5b1753009a31
SHA5124fbc75ee2a8c0c8e52148a177b7eaa62cbf5576145dcf1e71f56fe183dcbdce3c0036255514aa1d03b002c63cec15e58dbe30dc43dac7993607d3b61e4e75503
-
Filesize
204KB
MD5eae7561c164038ad8b832862ae6c2091
SHA117ed9188fc4b08d60a5dd4ffc98b978860fd1671
SHA256c1abb099d3653906d5809a454b5619a7f29624ac26104423c2dd5b1753009a31
SHA5124fbc75ee2a8c0c8e52148a177b7eaa62cbf5576145dcf1e71f56fe183dcbdce3c0036255514aa1d03b002c63cec15e58dbe30dc43dac7993607d3b61e4e75503