Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02-08-2023 09:47
Static task
static1
Behavioral task
behavioral1
Sample
NWwww#5.exe
Resource
win7-20230712-en
General
-
Target
NWwww#5.exe
-
Size
1.6MB
-
MD5
556c972a4792908bd1056880fbcf6fb8
-
SHA1
2db1abd5f0a4037a9935d571c4ca7f8e8b4efc15
-
SHA256
ac7a4330088e7a46a977714c404aad19d381262a3496be2f956ed868eba3b5f3
-
SHA512
cb088ac596350be0265e1b5ac0f1f2103d28c2c090c3644862cef57cc89ad30a91309f881f3e74af9a2f86a68b65d7cca8915e006677a9347f19ef97993dac60
-
SSDEEP
24576:4+l2sfHM0lcBAPwaUfJLdW43C5/f4UG4:/ERA03C5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 hthlrpse.exe -
Loads dropped DLL 7 IoCs
pid Process 2208 NWwww#5.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: hthlrpse.exe File opened (read-only) \??\L: hthlrpse.exe File opened (read-only) \??\M: hthlrpse.exe File opened (read-only) \??\R: hthlrpse.exe File opened (read-only) \??\S: hthlrpse.exe File opened (read-only) \??\U: hthlrpse.exe File opened (read-only) \??\V: hthlrpse.exe File opened (read-only) \??\B: hthlrpse.exe File opened (read-only) \??\X: hthlrpse.exe File opened (read-only) \??\Q: hthlrpse.exe File opened (read-only) \??\O: hthlrpse.exe File opened (read-only) \??\I: hthlrpse.exe File opened (read-only) \??\N: hthlrpse.exe File opened (read-only) \??\P: hthlrpse.exe File opened (read-only) \??\T: hthlrpse.exe File opened (read-only) \??\W: hthlrpse.exe File opened (read-only) \??\Z: hthlrpse.exe File opened (read-only) \??\G: hthlrpse.exe File opened (read-only) \??\J: hthlrpse.exe File opened (read-only) \??\K: hthlrpse.exe File opened (read-only) \??\Y: hthlrpse.exe File opened (read-only) \??\H: hthlrpse.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 NWwww#5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 NWwww#5.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2152 regedit.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe 2980 hthlrpse.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2980 hthlrpse.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2980 2208 NWwww#5.exe 28 PID 2208 wrote to memory of 2980 2208 NWwww#5.exe 28 PID 2208 wrote to memory of 2980 2208 NWwww#5.exe 28 PID 2208 wrote to memory of 2980 2208 NWwww#5.exe 28 PID 2208 wrote to memory of 2880 2208 NWwww#5.exe 29 PID 2208 wrote to memory of 2880 2208 NWwww#5.exe 29 PID 2208 wrote to memory of 2880 2208 NWwww#5.exe 29 PID 2208 wrote to memory of 2880 2208 NWwww#5.exe 29 PID 2880 wrote to memory of 2152 2880 cmd.exe 31 PID 2880 wrote to memory of 2152 2880 cmd.exe 31 PID 2880 wrote to memory of 2152 2880 cmd.exe 31 PID 2880 wrote to memory of 2152 2880 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NWwww#5.exe"C:\Users\Admin\AppData\Local\Temp\NWwww#5.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Public\Downloads\hthlrpse.exe"C:\Users\Public\Downloads\hthlrpse.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c regedit /s C:\\Users\\Public\\Downloads\\uac.reg2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\\Users\\Public\\Downloads\\uac.reg3⤵
- UAC bypass
- Runs .reg file with regedit
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5f1ccfdd550f0144a80f2b0ea791e2f7a
SHA1891dd45e0a495f46d92cc9437df54b3a361db967
SHA256d69d9332a42141168061e6bde1f1316d528060f93b2583acf188b78f9c062548
SHA512380c5bf672dc1f716c20a993f1a643cda7b87dd9f7cee09644e5d19d746e6de3b519668bc91397e83833d5a0d4144bae99cb577faa572424fcea3cc3fdca9e24
-
Filesize
1.9MB
MD58d2adb597a93331dfdf9c5a59962df62
SHA18b578724c2b2597b146e196c0c6436b177e097cb
SHA256ace46ac7b326b1e7b9860b78ef5b78d4112005c9cdff960cf524f965efd95562
SHA5120c5a58c913ab08ab8a017cfc600c73181520271facfeb10c2e0d8c275c17256d4153d450d19833d104b046194330f0a1f34877abc623976ae6bfa57137207b77
-
Filesize
1KB
MD5ca1ef50f4b8e67c8581b2c5abd1632cc
SHA17de6a98c2e44eb7c4eaf3b2fc950926df4eedc83
SHA256fb84ec8f2e2a971835dcf0ab906856b79aa006cbfd68e0e01c3136d2ecfed69c
SHA51225ba7b2c5101e84b4d6ff0f1e487d38d654354227d38de9bd1234ac9f10137b80f9d65eef3446df00b2fce1d4f457e26b36d555f297390d669584e55e590695e
-
Filesize
444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
Filesize
948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
Filesize
48KB
MD56ef054605667e2af4d546a51cbddb2f1
SHA1c935a683e8f1ab85ef719a07dcfff312f9ce3501
SHA256e9c29f5c3347e1b2c3cd53a6a0d46fadb717d63f9d00621c8855ff4d85d93a66
SHA512a50feeb46c84f85e4dbd91791481c6aa29db13951bde79a9ebd9d73508efe03df5c40be7ab0ede945b2eba4cf624387f56ae7680759863e66ad2907f9ad23fcf
-
Filesize
48KB
MD56ef054605667e2af4d546a51cbddb2f1
SHA1c935a683e8f1ab85ef719a07dcfff312f9ce3501
SHA256e9c29f5c3347e1b2c3cd53a6a0d46fadb717d63f9d00621c8855ff4d85d93a66
SHA512a50feeb46c84f85e4dbd91791481c6aa29db13951bde79a9ebd9d73508efe03df5c40be7ab0ede945b2eba4cf624387f56ae7680759863e66ad2907f9ad23fcf
-
Filesize
48KB
MD56ef054605667e2af4d546a51cbddb2f1
SHA1c935a683e8f1ab85ef719a07dcfff312f9ce3501
SHA256e9c29f5c3347e1b2c3cd53a6a0d46fadb717d63f9d00621c8855ff4d85d93a66
SHA512a50feeb46c84f85e4dbd91791481c6aa29db13951bde79a9ebd9d73508efe03df5c40be7ab0ede945b2eba4cf624387f56ae7680759863e66ad2907f9ad23fcf
-
Filesize
154KB
MD5b980923c4fda07404b3114f0a5ce24aa
SHA1bf41d3443a13eb57424e3dcdd04013de533a6a25
SHA2567530060649b85d910fb35da64ed9a2d0b3babaeadcce129e224e972f1f1b1029
SHA512031f85bf79b08b8da7dff198bf2326a761a4bf0aa1209cd543ab9617ee0a3071c81e57e4aa0d2859d55643b62d6e1070bf9f0cce1c6d0f0265595b43ca47974f
-
Filesize
302B
MD5958dce9a39bb4d496f94ea19388cf02e
SHA1d4f444e05e2c1893132506d4e8b22ef272083c95
SHA256c246172071f15967432a297a46fa532f71ba61a677a37a29764e55a429b247b5
SHA5129752c8406db0e92c0dab0374a428d961c7ef09679cde74bc71379e0418c00f9d36f4efec7f034f79f7763b18c531e50af1479824eb88458f3391824c406903cc
-
Filesize
134KB
MD5c96bf8296cc03164a0309e5acaea0426
SHA1b0ad779e64670f84ccbe471b936c0e57d45d1ed9
SHA2560ad6e0730cf3c8744de8af8522eadd092fbd4cf6aaf87a594d60bbfbfa3465a0
SHA5120e06807cee503259ab6771beeb0297460b440e38eddb5636a16911391ac95d8aa5b25fbebd2267b539b482a95223f5405c9d5a7d7558c5fb146cacbb1b893620
-
Filesize
152KB
MD5f1ccfdd550f0144a80f2b0ea791e2f7a
SHA1891dd45e0a495f46d92cc9437df54b3a361db967
SHA256d69d9332a42141168061e6bde1f1316d528060f93b2583acf188b78f9c062548
SHA512380c5bf672dc1f716c20a993f1a643cda7b87dd9f7cee09644e5d19d746e6de3b519668bc91397e83833d5a0d4144bae99cb577faa572424fcea3cc3fdca9e24
-
Filesize
1.9MB
MD58d2adb597a93331dfdf9c5a59962df62
SHA18b578724c2b2597b146e196c0c6436b177e097cb
SHA256ace46ac7b326b1e7b9860b78ef5b78d4112005c9cdff960cf524f965efd95562
SHA5120c5a58c913ab08ab8a017cfc600c73181520271facfeb10c2e0d8c275c17256d4153d450d19833d104b046194330f0a1f34877abc623976ae6bfa57137207b77
-
Filesize
48KB
MD56ef054605667e2af4d546a51cbddb2f1
SHA1c935a683e8f1ab85ef719a07dcfff312f9ce3501
SHA256e9c29f5c3347e1b2c3cd53a6a0d46fadb717d63f9d00621c8855ff4d85d93a66
SHA512a50feeb46c84f85e4dbd91791481c6aa29db13951bde79a9ebd9d73508efe03df5c40be7ab0ede945b2eba4cf624387f56ae7680759863e66ad2907f9ad23fcf
-
Filesize
444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
Filesize
948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
Filesize
154KB
MD5b980923c4fda07404b3114f0a5ce24aa
SHA1bf41d3443a13eb57424e3dcdd04013de533a6a25
SHA2567530060649b85d910fb35da64ed9a2d0b3babaeadcce129e224e972f1f1b1029
SHA512031f85bf79b08b8da7dff198bf2326a761a4bf0aa1209cd543ab9617ee0a3071c81e57e4aa0d2859d55643b62d6e1070bf9f0cce1c6d0f0265595b43ca47974f
-
Filesize
134KB
MD5c96bf8296cc03164a0309e5acaea0426
SHA1b0ad779e64670f84ccbe471b936c0e57d45d1ed9
SHA2560ad6e0730cf3c8744de8af8522eadd092fbd4cf6aaf87a594d60bbfbfa3465a0
SHA5120e06807cee503259ab6771beeb0297460b440e38eddb5636a16911391ac95d8aa5b25fbebd2267b539b482a95223f5405c9d5a7d7558c5fb146cacbb1b893620