Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
25-08-2023 04:01
Behavioral task
behavioral1
Sample
WPS_Installer_.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
WPS_Installer_.exe
Resource
win10-20230703-en
General
-
Target
WPS_Installer_.exe
-
Size
4.1MB
-
MD5
6e2cde27cf0f6d43d92687a13aef3980
-
SHA1
c35a49b96c283ed47e1d80153b76dffc5d296286
-
SHA256
fd6eb81590d22d47002590865955daa2ed559be1e9805099c59f5cb74a788c58
-
SHA512
3a735cd61335547a11d6290ad34f3be7c012f6020dc991ccfd733e46e747ac36649a07b5cbfbf9fadf7d357adb93d2520de46fe3193e8df27645121011d55f22
-
SSDEEP
98304:QSBIC1oZLORr1CjckI7d3bajae4Q+65q49HwWkFoLE3L:5CfONJTOuFQq45WKL6
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4348-31-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4348-31-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
Processes:
WPS_Installer.exedahai.exepid process 4584 WPS_Installer.exe 4348 dahai.exe -
Processes:
resource yara_rule behavioral2/memory/4304-0-0x0000000000400000-0x000000000050A000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\dahaima\WPS_Installer.exe upx C:\Users\Admin\AppData\Local\Temp\dahaima\WPS_Installer.exe upx C:\Users\Admin\AppData\Local\Temp\dahaima\WPS_Installer.exe upx behavioral2/memory/4584-18-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4304-22-0x0000000000400000-0x000000000050A000-memory.dmp upx behavioral2/memory/4584-28-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-30-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-39-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-40-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-41-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-45-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-64-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-65-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-66-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-67-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-68-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-69-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-70-0x00000000003F0000-0x0000000000993000-memory.dmp upx behavioral2/memory/4584-71-0x00000000003F0000-0x0000000000993000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dahai.exedescription ioc process File opened (read-only) \??\E: dahai.exe File opened (read-only) \??\N: dahai.exe File opened (read-only) \??\P: dahai.exe File opened (read-only) \??\T: dahai.exe File opened (read-only) \??\U: dahai.exe File opened (read-only) \??\Y: dahai.exe File opened (read-only) \??\B: dahai.exe File opened (read-only) \??\K: dahai.exe File opened (read-only) \??\R: dahai.exe File opened (read-only) \??\M: dahai.exe File opened (read-only) \??\S: dahai.exe File opened (read-only) \??\W: dahai.exe File opened (read-only) \??\X: dahai.exe File opened (read-only) \??\Z: dahai.exe File opened (read-only) \??\H: dahai.exe File opened (read-only) \??\J: dahai.exe File opened (read-only) \??\L: dahai.exe File opened (read-only) \??\Q: dahai.exe File opened (read-only) \??\V: dahai.exe File opened (read-only) \??\G: dahai.exe File opened (read-only) \??\I: dahai.exe File opened (read-only) \??\O: dahai.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
WPS_Installer.exedescription ioc process File opened for modification \??\PhysicalDrive0 WPS_Installer.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4304-22-0x0000000000400000-0x000000000050A000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WPS_Installer_.exeWPS_Installer.exedahai.exepid process 4304 WPS_Installer_.exe 4304 WPS_Installer_.exe 4304 WPS_Installer_.exe 4304 WPS_Installer_.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4584 WPS_Installer.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe 4348 dahai.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dahai.exepid process 4348 dahai.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WPS_Installer_.exedescription pid process target process PID 4304 wrote to memory of 4584 4304 WPS_Installer_.exe WPS_Installer.exe PID 4304 wrote to memory of 4584 4304 WPS_Installer_.exe WPS_Installer.exe PID 4304 wrote to memory of 4584 4304 WPS_Installer_.exe WPS_Installer.exe PID 4304 wrote to memory of 4348 4304 WPS_Installer_.exe dahai.exe PID 4304 wrote to memory of 4348 4304 WPS_Installer_.exe dahai.exe PID 4304 wrote to memory of 4348 4304 WPS_Installer_.exe dahai.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WPS_Installer_.exe"C:\Users\Admin\AppData\Local\Temp\WPS_Installer_.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\dahaima\WPS_Installer.exe"C:\Users\Admin\AppData\Local\Temp\dahaima\WPS_Installer.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\dahaima\dahai.exe"C:\Users\Admin\AppData\Local\Temp\dahaima\dahai.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5b52ba2b99108c496389ae5bb81fa6537
SHA19073d8c4a1968be24357862015519f2afecd833a
SHA256c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8
SHA5126637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397
-
Filesize
2.9MB
MD5b52ba2b99108c496389ae5bb81fa6537
SHA19073d8c4a1968be24357862015519f2afecd833a
SHA256c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8
SHA5126637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397
-
Filesize
2.9MB
MD5b52ba2b99108c496389ae5bb81fa6537
SHA19073d8c4a1968be24357862015519f2afecd833a
SHA256c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8
SHA5126637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397
-
Filesize
1.6MB
MD5174895d7e1a751397f161a785fb1b355
SHA127a56118d233adc9adcaaad95bedb0c8862c5277
SHA2562609445b23bf24267c6c5b597d78a8cfedecde62fb5c567436829ecbce95d743
SHA5122e9d5b7d247c9c2b3c38c4aecad08e217e2de7e3042c3eb67fb40e49c87c1709eeaec93119bbf4ea17464a75e8d1191795afbedc4f6bb62418a7619489df4d75
-
Filesize
1.6MB
MD5174895d7e1a751397f161a785fb1b355
SHA127a56118d233adc9adcaaad95bedb0c8862c5277
SHA2562609445b23bf24267c6c5b597d78a8cfedecde62fb5c567436829ecbce95d743
SHA5122e9d5b7d247c9c2b3c38c4aecad08e217e2de7e3042c3eb67fb40e49c87c1709eeaec93119bbf4ea17464a75e8d1191795afbedc4f6bb62418a7619489df4d75