Analysis

  • max time kernel
    145s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/04/2023, 11:26

General

  • Target

    WiiWarePatcher.bat

  • Size

    41KB

  • MD5

    e8b1754bf6eae0e4b7038cd54d1d9d16

  • SHA1

    0471df70b332ed579af7c02383be9a9d3d0617a2

  • SHA256

    a99c40f1fae6e3e66250761079a59288d602cf123be94ab7281ed3bf28a6d137

  • SHA512

    9a36cb2175c2d3ab7da28c98fe617e4c1ee318120fe567aee71a0ffcb334c14adae072c8ced4ea021d36fcb7f67ef9c4bcb995075d84bdf498b5e41b8a9667a3

  • SSDEEP

    384:P/pgn0y9YQ3twCj4bGg2+wapvn1D1U5hGIcL19eCKouLyLpR+PgbuLQ1qlMmUf:KhW19souOLpR+Pgbukq2/f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/curl.exe

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 25 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\WiiWarePatcher.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\system32\mode.com
      mode 128,37
      2⤵
        PID:1732
      • C:\Windows\system32\mode.com
        mode 128,37
        2⤵
          PID:2012
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -command (new-object System.Net.WebClient).DownloadFile('https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/curl.exe', 'curl.exe')
          2⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:980
        • C:\Users\Admin\AppData\Local\Temp\curl.exe
          curl
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:1252
        • C:\Windows\system32\mode.com
          mode 128,37
          2⤵
            PID:864
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s --insecure "http://www.msftncsi.com/ncsi.txt"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1768
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c call curl -f -L -s --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/connection_test.txt"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:800
            • C:\Users\Admin\AppData\Local\Temp\curl.exe
              curl -f -L -s --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/connection_test.txt"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:668
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/whatsnew.txt" --output "C:\Users\Admin\AppData\Roaming\WiiWare-Patcher\internet\temp\whatsnew.txt"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1920
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/version.txt" --output "C:\Users\Admin\AppData\Roaming\WiiWare-Patcher\internet\temp\version.txt"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1932
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c call curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/maintenance_info.txt"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1344
            • C:\Users\Admin\AppData\Local\Temp\curl.exe
              curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/maintenance_info.txt"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:1884
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c call curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/maintenance_block.txt"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1356
            • C:\Users\Admin\AppData\Local\Temp\curl.exe
              curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/UPDATE/maintenance_block.txt"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:1612
          • C:\Windows\system32\timeout.exe
            timeout -0 /nobreak
            2⤵
            • Delays execution with timeout.exe
            PID:1168
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/WiiWarePatcher/libWiiSharp.dll" --output "WiiWarePatcher/libWiiSharp.dll"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1152
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/WiiWarePatcher/lzx.exe" --output "WiiWarePatcher/lzx.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:904
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/WiiWarePatcher/Sharpii.exe" --output "WiiWarePatcher/Sharpii.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1576
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/WiiWarePatcher/WadInstaller.dll" --output "WiiWarePatcher/WadInstaller.dll"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1172
          • C:\Users\Admin\AppData\Local\Temp\curl.exe
            curl -f -L -s -S --user-agent "WiiWare Patcher v2.2.2" --insecure "https://patcher.rc24.xyz/update/WiiWare-Patcher/v1/WiiWarePatcher/WiiWarePatcher_64bit.exe" --output "WiiWarePatcher/WiiWarePatcher.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1812
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1688
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:964
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1076
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:616
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1868
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1216
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1612
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:764
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1156
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1548
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1936
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1488
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1688
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1652
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1956
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1888
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1344
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1356
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:684
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:764
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1552
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1044
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:1172
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:812
          • C:\Windows\system32\PING.EXE
            ping localhost -n 3
            2⤵
            • Runs ping.exe
            PID:864
        • C:\Windows\System32\fontview.exe
          "C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\RestartRedo.ttf
          1⤵
            PID:1108
          • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
            "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
            1⤵
            • Enumerates system info in registry
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:1512

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Local\Temp\curl.exe

            Filesize

            3.5MB

            MD5

            18b3d2e7f125317135c6db72a2b43cfa

            SHA1

            4553b67240b09a1ea60644b26a88535135fe089c

            SHA256

            a7c3d3a5a49f95e858a48541e4796b90931c85c9c4b4865e4c1a18fe6c91beae

            SHA512

            4ff0fb6a51bd7c157ea37633ab6b9006edb2015dcae97c9f46d0d05cb3fc03da568f558945ce99992d79e075598809d53c724fa9e5e298d0512c89e6fd5b64b7

          • C:\Users\Admin\AppData\Roaming\WiiWare-Patcher\internet\temp\version.txt

            Filesize

            5B

            MD5

            0656d165197f3b22591f6e91f3bb970f

            SHA1

            53847c48faeb5e255ebcdd1a4762a53f7163d7f0

            SHA256

            485eaf17abdd10439d5acfb5330d1217efc057498973b17c8fbf01d5849377df

            SHA512

            d02d234094aed1757dc88345d468388e82bda27e46abb3d6ad5666f38da097227d599da517d278af1ae12af5aeb8ea4c0dd58c76caef49874f36fd25e3670d60

          • memory/668-70-0x00000000013D0000-0x000000000174F000-memory.dmp

            Filesize

            3.5MB

          • memory/904-87-0x0000000001340000-0x00000000016BF000-memory.dmp

            Filesize

            3.5MB

          • memory/980-59-0x00000000024F0000-0x00000000024F8000-memory.dmp

            Filesize

            32KB

          • memory/980-62-0x00000000028B0000-0x0000000002930000-memory.dmp

            Filesize

            512KB

          • memory/980-60-0x00000000028B0000-0x0000000002930000-memory.dmp

            Filesize

            512KB

          • memory/980-61-0x00000000028B0000-0x0000000002930000-memory.dmp

            Filesize

            512KB

          • memory/980-58-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

            Filesize

            2.9MB

          • memory/1152-84-0x0000000001340000-0x00000000016BF000-memory.dmp

            Filesize

            3.5MB

          • memory/1172-93-0x0000000001340000-0x00000000016BF000-memory.dmp

            Filesize

            3.5MB

          • memory/1252-66-0x0000000000190000-0x000000000050F000-memory.dmp

            Filesize

            3.5MB

          • memory/1512-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1512-109-0x0000000007230000-0x0000000007232000-memory.dmp

            Filesize

            8KB

          • memory/1512-110-0x0000000007220000-0x0000000007221000-memory.dmp

            Filesize

            4KB

          • memory/1576-90-0x0000000001340000-0x00000000016BF000-memory.dmp

            Filesize

            3.5MB

          • memory/1612-81-0x0000000000270000-0x00000000005EF000-memory.dmp

            Filesize

            3.5MB

          • memory/1768-68-0x0000000001020000-0x000000000139F000-memory.dmp

            Filesize

            3.5MB

          • memory/1812-96-0x0000000000120000-0x000000000049F000-memory.dmp

            Filesize

            3.5MB

          • memory/1884-79-0x00000000013D0000-0x000000000174F000-memory.dmp

            Filesize

            3.5MB

          • memory/1920-73-0x00000000013D0000-0x000000000174F000-memory.dmp

            Filesize

            3.5MB

          • memory/1932-76-0x00000000013D0000-0x000000000174F000-memory.dmp

            Filesize

            3.5MB