Analysis
-
max time kernel
19s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 15:48
Static task
static1
Behavioral task
behavioral1
Sample
Wattylexe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Wattylexe.exe
Resource
win10v2004-20230621-en
General
-
Target
Wattylexe.exe
-
Size
477KB
-
MD5
34e03669773d47d0d8f01be78ae484e4
-
SHA1
4b0a7e2af2c28ae191737ba07632ed354d35c978
-
SHA256
2919b157d8d2161bf56a17af0efc171d8e2c3c233284cf116e8c968dd9704572
-
SHA512
8d93fab3c2544d015af2d84f07d3ebbf8acead8bb0185ffb045302b2be19ac12cd2ac59288313bd75bc230768c90e68139c124ea89df943776b1cfaac4876a7f
-
SSDEEP
6144:ZvZ2iKiZ/QAKVfiROzkViZwc0W/1vNuMqTp/CelAaWjSZ/nnnKCXP7:J7wVfiRuqPW/dgMqIHdjSFnnKCX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe RVHOST.exe" Wattylexe.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Wattylexe.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\RVHOST.exe" Wattylexe.exe Key created \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\Software\Microsoft\Windows\CurrentVersion\Run Wattylexe.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: Wattylexe.exe File opened (read-only) \??\p: Wattylexe.exe File opened (read-only) \??\t: Wattylexe.exe File opened (read-only) \??\u: Wattylexe.exe File opened (read-only) \??\v: Wattylexe.exe File opened (read-only) \??\z: Wattylexe.exe File opened (read-only) \??\a: Wattylexe.exe File opened (read-only) \??\e: Wattylexe.exe File opened (read-only) \??\k: Wattylexe.exe File opened (read-only) \??\o: Wattylexe.exe File opened (read-only) \??\r: Wattylexe.exe File opened (read-only) \??\s: Wattylexe.exe File opened (read-only) \??\g: Wattylexe.exe File opened (read-only) \??\h: Wattylexe.exe File opened (read-only) \??\n: Wattylexe.exe File opened (read-only) \??\q: Wattylexe.exe File opened (read-only) \??\x: Wattylexe.exe File opened (read-only) \??\y: Wattylexe.exe File opened (read-only) \??\i: Wattylexe.exe File opened (read-only) \??\j: Wattylexe.exe File opened (read-only) \??\l: Wattylexe.exe File opened (read-only) \??\m: Wattylexe.exe File opened (read-only) \??\w: Wattylexe.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\RVHOST.exe Wattylexe.exe File opened for modification C:\Windows\SysWOW64\RVHOST.exe Wattylexe.exe File created C:\Windows\SysWOW64\setting.ini Wattylexe.exe File opened for modification C:\Windows\SysWOW64\setting.ini Wattylexe.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\RVHOST.exe Wattylexe.exe File opened for modification C:\Windows\RVHOST.exe Wattylexe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 564 Wattylexe.exe 564 Wattylexe.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 564 wrote to memory of 1860 564 Wattylexe.exe 85 PID 564 wrote to memory of 1860 564 Wattylexe.exe 85 PID 564 wrote to memory of 1860 564 Wattylexe.exe 85 PID 1860 wrote to memory of 4164 1860 cmd.exe 87 PID 1860 wrote to memory of 4164 1860 cmd.exe 87 PID 1860 wrote to memory of 4164 1860 cmd.exe 87 PID 564 wrote to memory of 1056 564 Wattylexe.exe 88 PID 564 wrote to memory of 1056 564 Wattylexe.exe 88 PID 564 wrote to memory of 1056 564 Wattylexe.exe 88 PID 1056 wrote to memory of 4684 1056 cmd.exe 90 PID 1056 wrote to memory of 4684 1056 cmd.exe 90 PID 1056 wrote to memory of 4684 1056 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wattylexe.exe"C:\Users\Admin\AppData\Local\Temp\Wattylexe.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe3⤵PID:4684
-
-