Analysis

  • max time kernel
    52s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20220812-es
  • resource tags

    arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    02/01/2023, 22:55

General

  • Target

    setup_wipe.exe

  • Size

    6.3MB

  • MD5

    6ecbef662a58fa79898c64dfe4aec8b0

  • SHA1

    27f6facacf26773974f8a6a2c4fb929439d68c63

  • SHA256

    cb6a28f6848acc465fb118c2379cccf86f4605eb8d51f418d2c9e691a2679bd2

  • SHA512

    47e367ead641ef6c1f0ec28c715d70e257f3183e12a4d96f3cac61a0bcfa0e1de52c737d4c432f0c3ec993604ef5fdba9d186b3e52da29b8ce95210cc3e43a59

  • SSDEEP

    98304:dktDam/Y6kgSRo5e6n0rCq7oF7ftzTACeDC+X0aj008fmMMN3S1cn/b73:u8AI9Rw02+oF7lzMCeDCTvYN7P3

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_wipe.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_wipe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\is-36CP4.tmp\setup_wipe.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-36CP4.tmp\setup_wipe.tmp" /SL5="$C0158,6101741,185344,C:\Users\Admin\AppData\Local\Temp\setup_wipe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Program Files (x86)\Wipe\Wipe.exe
        "C:\Program Files (x86)\Wipe\Wipe.exe" uf_sub_runonsetup
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:988
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://privacyroot.com/apps/scripts/uframework-web.pl?scn=wipe&version=2227.00&fipr=2e02d98af13221cc24925629d2c35577&pcid=b83890ca22f1ab2ecaba8f123869647b&location=appInstalled&iso2=es&iso2ui=es&lang_wipe=es
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1876 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1652
        • C:\Program Files (x86)\Wipe\Wipe.exe
          "C:\Program Files (x86)\Wipe\Wipe.exe" uf_sub_downloadSetup
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Wipe\Framework\Interface\colors.ini

    Filesize

    605B

    MD5

    7083a2accda7fe7348e732bd46ecb25b

    SHA1

    727af15ff453cb6e164f94326baa9640e6f50150

    SHA256

    25e63e1d0be2bfaec6966c0df046a2c3f0c1ba69702745e3a7ffdf3507dc3661

    SHA512

    4e0a366b712405756cde465c5f48e0501549586fda73e2e30c252a50663a2f80de06d9ff3df43a45f52cfad6af8356e39bda0deb937c8c6c85fbefe770cf4e1a

  • C:\Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • C:\Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • C:\Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • C:\Program Files (x86)\Wipe\Wipe.exe.config

    Filesize

    1KB

    MD5

    93fd560b744390a798012730cf2b1648

    SHA1

    8a83bcfdf630bd1ceda69daf3d5af421cea95af3

    SHA256

    368f802cc75af22a2928278367450d712db9807c4ef41c37707ba52d72354841

    SHA512

    09f699d80001a68f9f63c316c765cd9a40c6bd516830ae511ced17ee6e2c4d6e25a2447427e888577495e0960d27cf4b40ff95db84ed96fcf367c19541e8fa69

  • C:\ProgramData\WindowsHardwareTelemetry.ini

    Filesize

    1KB

    MD5

    6c7bd6b53ffac70368c362ad993f1d9c

    SHA1

    d1af82d26b66b60a302085580e49e0278d7af8cc

    SHA256

    aefc37b9169800e8345c54fa46ad193f44ffd06a4900ed2a9fa4f05326f4c844

    SHA512

    4c1dea91a9e84e54c5664f16e01a7d9503ef350119e3dbacb31b77e74abc66e7a70bb7f34cf03f3ed233adf7cc9087c36a85af85657d7bd42a70b77de30bd86e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2fb4c2da29b2fb508abbe5d4309ececb

    SHA1

    cdc88d3532c0e114280b71e9bffd558544db0685

    SHA256

    002276016aa4a88c629e81b767596153eacf7befc528e8f122a8aa62fb6152d7

    SHA512

    cf6fb97a093e8c053bc7402d77b2620143184095e843d4172b7e0a97ece69010b373b91335254f8c7949665c1f28e82ac781100a13f43b0d922300b6121cac8a

  • C:\Users\Admin\AppData\Local\Temp\is-36CP4.tmp\setup_wipe.tmp

    Filesize

    1.2MB

    MD5

    ff41bdabba2dc4bab5bde486732632ed

    SHA1

    fae533b1f212eeec14fa0a27f3ab3d48ab5188f1

    SHA256

    d0f36ddae627a2b437586c9b81d4a1821e5721c2a1aeb1eadc5bafc6ad238fa1

    SHA512

    312f02c2faca4c8a771513fdd1804fd38da44b021aaa0e09d6d33bddd0120e77a4af9b525d331748788592d10d6187f0e453e9dedc2a23bbd40c05200035d45f

  • C:\Users\Admin\AppData\Local\Temp\is-36CP4.tmp\setup_wipe.tmp

    Filesize

    1.2MB

    MD5

    ff41bdabba2dc4bab5bde486732632ed

    SHA1

    fae533b1f212eeec14fa0a27f3ab3d48ab5188f1

    SHA256

    d0f36ddae627a2b437586c9b81d4a1821e5721c2a1aeb1eadc5bafc6ad238fa1

    SHA512

    312f02c2faca4c8a771513fdd1804fd38da44b021aaa0e09d6d33bddd0120e77a4af9b525d331748788592d10d6187f0e453e9dedc2a23bbd40c05200035d45f

  • C:\Users\Admin\AppData\Roaming\wipe2021\Settings\ServerResponse.ini

    Filesize

    214B

    MD5

    78f6ffbfcf8ba6f0bd8687d97bc1889d

    SHA1

    162697a1fe587372caac1fe61bb7ef3f0d6d8e4a

    SHA256

    58975a26a61df18a0516688760bff496901426e96a07148fa947f82ccaee7738

    SHA512

    02457c44f66a994929e46a90f81e0a40d7b42c0a25e0df26eeaa6987b101725fa74d41c6b65342e6cddd5d56c29d194b06598848dd65bcd6b68e4e3e30001302

  • C:\Users\Admin\AppData\Roaming\wipe2021\Settings\UF.ini

    Filesize

    84B

    MD5

    fd7fb0c0a4f69eef062486596cb8ffc2

    SHA1

    b5cda03aecbd15d25aac52e5ea09a54987c6a115

    SHA256

    06dfc7a241543e9f84867e947678d8f6b79dc5e00cfa8fff25ea85fdb2352e43

    SHA512

    b79796f81593730688b0b1bd2563cc1fbe92aeb16f6f1e1efaf0a4038f44a97eb00d20f893a0ae1cee8fafbabdcba8edc8ea286dcf497be7b57e6eb45217c1f9

  • C:\Users\Admin\AppData\Roaming\wipe2021\Settings\UsageV4.ini

    Filesize

    85B

    MD5

    e6051ac8f153c42e786f4c2a9ca08947

    SHA1

    359f8867e0459f4576ca3db96534630f76aaa94d

    SHA256

    8afbe31ed2e543ec5b274820ced89ddb44f81978d17b37845419aa011e061def

    SHA512

    9a5a31e399899e305153f7b2de5c3123f0925fb2e8581a5ab373983bf01cbf56d3c8ddd2c61431810d30ad7726d4b55b70727e44e09229cf58f7588ae37c1466

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Program Files (x86)\Wipe\Wipe.exe

    Filesize

    527KB

    MD5

    2d13fbc9e0a20399cdc992ecb622d0d0

    SHA1

    1e2cf017df1a2a68de5c89f4178c09f39bc434f6

    SHA256

    72222e082056c5347be18d714fd9afd6ff70dc4f412743e8355734fddf1ac485

    SHA512

    922487f6bd1fb7399239abdd3039b1e7aff99793f14beb1def716a0e5e0a0856d933cdf63cfb20d4660aa482ae1270c5b57d54e27a113c094a3149da86fe00ec

  • \Users\Admin\AppData\Local\Temp\is-36CP4.tmp\setup_wipe.tmp

    Filesize

    1.2MB

    MD5

    ff41bdabba2dc4bab5bde486732632ed

    SHA1

    fae533b1f212eeec14fa0a27f3ab3d48ab5188f1

    SHA256

    d0f36ddae627a2b437586c9b81d4a1821e5721c2a1aeb1eadc5bafc6ad238fa1

    SHA512

    312f02c2faca4c8a771513fdd1804fd38da44b021aaa0e09d6d33bddd0120e77a4af9b525d331748788592d10d6187f0e453e9dedc2a23bbd40c05200035d45f

  • memory/644-83-0x000007FEFB901000-0x000007FEFB903000-memory.dmp

    Filesize

    8KB

  • memory/644-92-0x000000001BFE6000-0x000000001C005000-memory.dmp

    Filesize

    124KB

  • memory/644-89-0x000000001BFE6000-0x000000001C005000-memory.dmp

    Filesize

    124KB

  • memory/860-61-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/860-88-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/860-54-0x0000000075541000-0x0000000075543000-memory.dmp

    Filesize

    8KB

  • memory/860-55-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/988-71-0x000000001C076000-0x000000001C095000-memory.dmp

    Filesize

    124KB

  • memory/988-82-0x000000001C076000-0x000000001C095000-memory.dmp

    Filesize

    124KB

  • memory/988-69-0x00000000009A0000-0x0000000000A24000-memory.dmp

    Filesize

    528KB

  • memory/1792-62-0x0000000074071000-0x0000000074073000-memory.dmp

    Filesize

    8KB