Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
201508181025.scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
201508181025.scr
Resource
win10v2004-20230915-en
General
-
Target
201508181025.scr
-
Size
510KB
-
MD5
94c7105fc53a647d5a694cac27bce921
-
SHA1
332de33d33b043e4f3f0fde6c39ceff57afd7950
-
SHA256
41ff4f324b319a1d9fea3948fa804e9a3b12dc12d0ec1b3ee92099cf4ad45c05
-
SHA512
9657c7b1c0cd9e5fb3dbccc0af550ae953e5870dbc177ad404d49c4dfb6ab8d67212af993e84eb6f39bbdf50cd7e7d8601d2e7f5ce1349e42b592d4ba95e675d
-
SSDEEP
12288:dLKzKPysMX+I4IA/V/aE5PhLiG5XvktM9pVF2OD:RKealTQjhLVvSSF7D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 wmplayer.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 fsguidll.exe 2468 fsguidll.exe -
Loads dropped DLL 6 IoCs
pid Process 2168 201508181025.scr 2168 201508181025.scr 2168 201508181025.scr 2168 201508181025.scr 2600 fsguidll.exe 2468 fsguidll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionTime = d02c5c1273fad901 wmplayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionReason = "1" wmplayer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadNetworkName = "Network 3" wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionTime = d02c5c1273fad901 wmplayer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDetectedUrl wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionTime = 10d0572473fad901 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionTime = 10d0572473fad901 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionTime = 7027673073fad901 wmplayer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6} wmplayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecision = "0" wmplayer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32 wmplayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionReason = "1" wmplayer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecision = "0" wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionTime = 90405b3073fad901 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionTime = 50d9534873fad901 wmplayer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\f6-87-a0-ec-1f-32 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionTime = 90405b3073fad901 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{E0F67638-2F29-4177-98D7-C27FB8F1B3B6}\WpadDecisionTime = 7027673073fad901 wmplayer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\f6-87-a0-ec-1f-32\WpadDecisionTime = 50d9534873fad901 wmplayer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 1580 msiexec.exe 2556 wmplayer.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 2600 fsguidll.exe 2468 fsguidll.exe 2556 wmplayer.exe 1580 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2600 fsguidll.exe Token: SeTcbPrivilege 2600 fsguidll.exe Token: SeDebugPrivilege 2468 fsguidll.exe Token: SeTcbPrivilege 2468 fsguidll.exe Token: SeDebugPrivilege 2556 wmplayer.exe Token: SeTcbPrivilege 2556 wmplayer.exe Token: SeDebugPrivilege 1580 msiexec.exe Token: SeTcbPrivilege 1580 msiexec.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2600 fsguidll.exe 2468 fsguidll.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe 1580 msiexec.exe 2556 wmplayer.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2168 wrote to memory of 2600 2168 201508181025.scr 28 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2468 wrote to memory of 2556 2468 fsguidll.exe 30 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31 PID 2556 wrote to memory of 1580 2556 wmplayer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\201508181025.scr"C:\Users\Admin\AppData\Local\Temp\201508181025.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\fsguidll.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\fsguidll.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\ProgramData\BYKJzaM\fsguidll.exeC:\ProgramData\BYKJzaM\fsguidll.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Deletes itself
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d
-
Filesize
1KB
MD5cb58997909932d0835f7b6e37ccfdbe8
SHA163e28406c6b34d62f6738c68017cea61709b1968
SHA256bc3c6a77cdff0d3dabdb13ecff89bea5fd692200f4bc19138e4ed514eed13b01
SHA5120cf2ed35dfe13e915d4972f6d5688b0449d176e7c32567745c5e055e712e28f7c5cf7096741e46940cc8332c728e4d22afb978bf2bfd82a0e9dfc2b11c722b69
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51