Analysis
-
max time kernel
105s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe
Resource
win10v2004-20230220-en
General
-
Target
7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe
-
Size
6.0MB
-
MD5
820241820224a5c7eed0ca74b7420361
-
SHA1
4ad3588ecd226fde7fe8543c281290997a4ad9ac
-
SHA256
7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f
-
SHA512
17cc22e2d7c59bc86b5145e2990b76faf2602c3a4c19d6c7b23a84067240455e1293c857c1966217c26d8ae4baded83b612ed5325c7e5dea3bfa42335aa0d59c
-
SSDEEP
98304:x4S0clXTS9EIv1281Ey0l6iEz0JzA3+rBAlrHC3dNtCLChB:v/lX3I9R1EFlnxJzVA1ALI+hB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
2.1.1.exewfplwfs.exepid process 3584 2.1.1.exe 752 wfplwfs.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe vmprotect C:\Users\Admin\AppData\Local\Temp\wfplwfs.exe vmprotect behavioral1/memory/752-151-0x0000000000400000-0x0000000000D4A000-memory.dmp vmprotect -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wfplwfs.exedescription pid process target process PID 752 set thread context of 2552 752 wfplwfs.exe rundll32.exe -
Drops file in Windows directory 1 IoCs
Processes:
wfplwfs.exedescription ioc process File created C:\Windows\Tasks\e74a2e864eaf84a8.job wfplwfs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
wfplwfs.exepid process 752 wfplwfs.exe 752 wfplwfs.exe 752 wfplwfs.exe 752 wfplwfs.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
rundll32.exepid process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.execmd.exewfplwfs.exedescription pid process target process PID 1236 wrote to memory of 3584 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe 2.1.1.exe PID 1236 wrote to memory of 3584 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe 2.1.1.exe PID 1236 wrote to memory of 3584 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe 2.1.1.exe PID 1236 wrote to memory of 752 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe wfplwfs.exe PID 1236 wrote to memory of 752 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe wfplwfs.exe PID 1236 wrote to memory of 752 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe wfplwfs.exe PID 1236 wrote to memory of 2464 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe cmd.exe PID 1236 wrote to memory of 2464 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe cmd.exe PID 1236 wrote to memory of 2464 1236 7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe cmd.exe PID 2464 wrote to memory of 2156 2464 cmd.exe PING.EXE PID 2464 wrote to memory of 2156 2464 cmd.exe PING.EXE PID 2464 wrote to memory of 2156 2464 cmd.exe PING.EXE PID 752 wrote to memory of 4308 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 4308 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 4308 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe PID 752 wrote to memory of 2552 752 wfplwfs.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe"C:\Users\Admin\AppData\Local\Temp\7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\2.1.1.exeC:\Users\Admin\AppData\Local\Temp\2.1.1.exe2⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\wfplwfs.exeC:\Users\Admin\AppData\Local\Temp\wfplwfs.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵PID:4308
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\7740df954417683f1614403a7fa6607e7b9002ae045e25a07c8fd4e67f0b3c3f.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:2156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD5eb75a43690afdea95c83ba331de640b7
SHA1b65715468e185c3b54b60e075459a5f8b6e9c0f7
SHA25621df0ff4710ab3ea44a1950745f9c71f3098bce46c5b0a7e86ba2777810ae855
SHA512781a0b3fd4afecad6e4acf6cea53377b6c2d883fa9f14290f9530f7824fb4c1a89831edd2b67740392390bb984d530e1a34bcd45d350cec8341a8ffc55c01a9f
-
Filesize
478KB
MD5eb75a43690afdea95c83ba331de640b7
SHA1b65715468e185c3b54b60e075459a5f8b6e9c0f7
SHA25621df0ff4710ab3ea44a1950745f9c71f3098bce46c5b0a7e86ba2777810ae855
SHA512781a0b3fd4afecad6e4acf6cea53377b6c2d883fa9f14290f9530f7824fb4c1a89831edd2b67740392390bb984d530e1a34bcd45d350cec8341a8ffc55c01a9f
-
Filesize
5.4MB
MD5ad08fb264dd83251bebda5b2c71871f0
SHA1ca71a18d8a696031c016434de89c7a158e3a6052
SHA25674cd8cebc022b06c2cb58d00eb7d4dedaa47442bd7011130302785a3533c03ae
SHA51220012378e6c05e27c79baad9c76dad237ecdb154bd638df87ad69fbfba5f03880bd1501edfcf71002b45e6d351acf96d32dc7548c0c57dd4fa7ea730ddebf540
-
Filesize
5.4MB
MD5ad08fb264dd83251bebda5b2c71871f0
SHA1ca71a18d8a696031c016434de89c7a158e3a6052
SHA25674cd8cebc022b06c2cb58d00eb7d4dedaa47442bd7011130302785a3533c03ae
SHA51220012378e6c05e27c79baad9c76dad237ecdb154bd638df87ad69fbfba5f03880bd1501edfcf71002b45e6d351acf96d32dc7548c0c57dd4fa7ea730ddebf540
-
Filesize
1KB
MD512cf60e57791e7a8bd78033c9f308931
SHA1f6c8a295064f7fa8553295e3cd8a9c62352f7c2c
SHA2562f9f2fe135d66c296ab6071d01529623bac31d4a63ab073be3c6c1e20d34f50a
SHA51272735d76803980afe7260d713a377f82316fa24109f1d2767b352984aa53d4a5e441a89d99aa3fdb32042dcb61b43d88465272bc98552892747829d7986cf3b2
-
Filesize
2KB
MD5561a5a310ac6505c1dc2029a61632617
SHA1f267ab458ec5d0f008a235461e466b1fd3ed14ee
SHA256b41bd7c17b6bdfe6ae0d0dbbb5ce92fd38c4696833ae3333a1d81cf7e38d6e35
SHA5124edb7ef8313e20bbc73fd96207c2076ce3bac0754a92bb00aff0259ffe1adf6f7e4d6917e7815fd643139a08bd4a0f325f66982378f94483ce1ee0924df6d3c5
-
Filesize
1KB
MD5abcf7fd62d78b302475bac66fd1e2968
SHA1fad0de7476d1cb563ffd3723dfc8f6dc9d7fbac4
SHA256741a816750ffd35e3c4828cca24e90ffad946e040e11eca3c4a2ec2a1c74def4
SHA512323492e5b069e0544baa81ea5e1c4b693a5068f55cc20e678672abff55847af48c63e48a13ca8b8908f2defee4654f42941e7f93b5a26775a971bdf186db21ba