Overview
overview
8Static
static
3Debug/Guna.UI.dll
windows7-x64
8Debug/Guna.UI.dll
windows10-2004-x64
1Debug/LetLiner.py
windows7-x64
3Debug/LetLiner.py
windows10-2004-x64
3Debug/Run ...n).bat
windows7-x64
3Debug/Run ...n).bat
windows10-2004-x64
3Debug/Run ...n).bat
windows7-x64
3Debug/Run ...n).bat
windows10-2004-x64
3Debug/Siticone.UI.dll
windows7-x64
1Debug/Siticone.UI.dll
windows10-2004-x64
1Debug/Trox...API.py
windows7-x64
3Debug/Trox...API.py
windows10-2004-x64
3Debug/WCI.bat
windows7-x64
1Debug/WCI.bat
windows10-2004-x64
1Debug/Wann...ce.exe
windows7-x64
1Debug/Wann...ce.exe
windows10-2004-x64
1Debug/Westrox.C.exe
windows7-x64
3Debug/Westrox.C.exe
windows10-2004-x64
3Debug/Wind...er.exe
windows7-x64
1Debug/Wind...er.exe
windows10-2004-x64
1Debug/dat.bat
windows7-x64
3Debug/dat.bat
windows10-2004-x64
3Debug/msg.vbs
windows7-x64
1Debug/msg.vbs
windows10-2004-x64
1Debug/pysx.py
windows7-x64
3Debug/pysx.py
windows10-2004-x64
3Debug/suscribe.vbs
windows7-x64
1Debug/suscribe.vbs
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Debug/Guna.UI.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Debug/Guna.UI.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Debug/LetLiner.py
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Debug/LetLiner.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Debug/Run Non Dangerous (admin).bat
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Debug/Run Non Dangerous (admin).bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Debug/Run dangerous (admin).bat
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Debug/Run dangerous (admin).bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
Debug/Siticone.UI.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Debug/Siticone.UI.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
Debug/Trox_Stealer_API.py
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Debug/Trox_Stealer_API.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
Debug/WCI.bat
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Debug/WCI.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
Debug/WannaC Custom Interface.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Debug/WannaC Custom Interface.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
Debug/Westrox.C.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Debug/Westrox.C.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
Debug/WindowsDefenderTrasher.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
Debug/WindowsDefenderTrasher.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
Debug/dat.bat
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
Debug/dat.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
Debug/msg.vbs
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
Debug/msg.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
Debug/pysx.py
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
Debug/pysx.py
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
Debug/suscribe.vbs
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
Debug/suscribe.vbs
Resource
win10v2004-20230915-en
General
-
Target
uh uh.zip
-
Size
4.4MB
-
MD5
2fddc0dfe3d811550f5f62867e3f79ed
-
SHA1
1a41669b014c1f07c66a41774edd438ab2bc53fa
-
SHA256
3c1d2e1bbe67fb6795cfa721186e0b9a204026d4fc647b83ed00b1b1aac53af6
-
SHA512
13af652d49946405457cae36e7f1bc5f1df5a9d5dd604694cc438a1655cde66b69e712b20216eba1485a9101ef2bc858875d446b484f5eeea45b4ba88c6c39c8
-
SSDEEP
98304:FAvRE58qmtzWk/BoCqFNwb7dviDgbnfgP65NAx/ozeVOcMtYw:FLTmbCC9JiDcrAxgzxXF
Malware Config
Signatures
-
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Debug/WannaC Custom Interface.exe unpack001/Debug/Westrox.C.exe unpack001/Debug/WindowsDefenderTrasher.exe
Files
-
uh uh.zip.zip
-
Debug/Guna.UI.dll.dll windows x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
7a:98:1b:7d:3e:b4:86:bb:45:84:c4:3c:c9:a8:3f:dbCertificate
IssuerCN=Sobatdata Root CANot Before23/10/2019, 05:22Not After22/10/2025, 17:00SubjectCN=Sobatdata Software03:01:9a:02:3a:ff:58:b1:6b:d6:d5:ea:e6:17:f0:66Certificate
IssuerCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before22/10/2014, 00:00Not After22/10/2024, 00:00SubjectCN=DigiCert Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
06:fd:f9:03:96:03:ad:ea:00:0a:eb:3f:27:bb:ba:1bCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before10/11/2006, 00:00Not After10/11/2021, 00:00SubjectCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
3f:f5:b3:24:9f:84:88:19:f3:b5:45:4a:64:72:1b:3d:3f:77:2d:b4Signer
Actual PE Digest3f:f5:b3:24:9f:84:88:19:f3:b5:45:4a:64:72:1b:3d:3f:77:2d:b4Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Debug/LetLiner.py
-
Debug/Read ME FIRST.txt
-
Debug/Run Non Dangerous (admin).bat
-
Debug/Run dangerous (admin).bat
-
Debug/Siticone.UI.dll.dll windows x86
dae02f32a21e03ce65412f6e56942daa
Code Sign
3a:93:0b:19:8f:29:72:9a:49:b0:8b:f3:6d:f8:17:aeCertificate
IssuerCN=Siticone Root CANot Before05/02/2020, 06:42Not After22/10/2030, 17:00SubjectCN=Siticone Technology03:01:9a:02:3a:ff:58:b1:6b:d6:d5:ea:e6:17:f0:66Certificate
IssuerCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before22/10/2014, 00:00Not After22/10/2024, 00:00SubjectCN=DigiCert Timestamp Responder,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
06:fd:f9:03:96:03:ad:ea:00:0a:eb:3f:27:bb:ba:1bCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before10/11/2006, 00:00Not After10/11/2021, 00:00SubjectCN=DigiCert Assured ID CA-1,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
34:8f:92:bf:68:07:1b:a4:18:d3:f6:b4:4e:02:5a:2c:51:c0:51:c0Signer
Actual PE Digest34:8f:92:bf:68:07:1b:a4:18:d3:f6:b4:4e:02:5a:2c:51:c0:51:c0Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Debug/Trox_Stealer_API.py
-
Debug/WCI.bat
-
Debug/WannaC Custom Interface.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Debug/Westrox.C.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Debug/WindowsDefenderTrasher.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Debug/dat.bat
-
Debug/desktop.ini
-
Debug/msg.vbs
-
Debug/pysx.py
-
Debug/suscribe.txt
-
Debug/suscribe.vbs