Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2023 15:32

General

  • Target

    Wps.exe

  • Size

    8.3MB

  • MD5

    fa05a54376d3377967e52ba78dee8ba6

  • SHA1

    3349e0236e886f2c1e69c02eb99b6fbc242f930f

  • SHA256

    c9cbb955c9c7c0f5b5cb4bce2b7b87b211c2ddd5eb123da663ace4bd6beb3017

  • SHA512

    ba63752a5900d3ad1e1dcf9c00e99c6295ef9b06e2842ad2384860ace8c61458a483954e13700ff2402db58c6e3c2a759f73b5f5c69967b56fd37ded81f12953

  • SSDEEP

    196608:6guPOGfSizC2F/LVk6jO521HC3YW4Xxqrlnbt84bYQ8RK:6gKO63zRFqKO2EwXox8E9

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wps.exe
    "C:\Users\Admin\AppData\Local\Temp\Wps.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Program Files (x86)\a5.exe
      "C:\Program Files (x86)\a5.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3004
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\WINDOWS\DNomb\spolsvt.exe
      C:\WINDOWS\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\a5.exe

    Filesize

    5.6MB

    MD5

    48b171f32947aa7fe8752fdbf134c667

    SHA1

    a1ad1fa92b5828965021ad7d0d0a13bba0e51105

    SHA256

    69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

    SHA512

    18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

  • C:\Program Files (x86)\a5.exe

    Filesize

    5.6MB

    MD5

    48b171f32947aa7fe8752fdbf134c667

    SHA1

    a1ad1fa92b5828965021ad7d0d0a13bba0e51105

    SHA256

    69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

    SHA512

    18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

  • C:\Program Files (x86)\a5.exe

    Filesize

    5.6MB

    MD5

    48b171f32947aa7fe8752fdbf134c667

    SHA1

    a1ad1fa92b5828965021ad7d0d0a13bba0e51105

    SHA256

    69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

    SHA512

    18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    488KB

    MD5

    1a829ab10a43c43f1c19b37626cc937a

    SHA1

    690d228cf505c4ef655789fef97ff7634e62ad02

    SHA256

    0e7f8fbe4da4c2dcf93ceabb5271bd753c0ddb0156f303d1bc11cc97ad35fd6f

    SHA512

    34ce05f48584ff3938622f685cf6607d3cc1f8452fbda7a24314187a0694baaac720e46987956451bff14cf675bd68eaa761b750297eba2d5f602e1e3e3f15d0

  • C:\WINDOWS\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Program Files (x86)\WPS_Installer.exe

    Filesize

    2.9MB

    MD5

    b52ba2b99108c496389ae5bb81fa6537

    SHA1

    9073d8c4a1968be24357862015519f2afecd833a

    SHA256

    c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8

    SHA512

    6637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397

  • \Program Files (x86)\a5.exe

    Filesize

    5.6MB

    MD5

    48b171f32947aa7fe8752fdbf134c667

    SHA1

    a1ad1fa92b5828965021ad7d0d0a13bba0e51105

    SHA256

    69bd0a71b2a3fcf609ecb92a11a1eb07d2e58f3eb46505309701c5b1655a4ba6

    SHA512

    18d6a054953943ef96748ef6e473f77ac203f17cb81cb4456207f6baf65a5461c7c934eee3d47776b70f489dee6963ed5c1d0aeaec75a517ecbd3d7307abaee1

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/1632-86-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/1632-66-0x00000000042F0000-0x00000000042F1000-memory.dmp

    Filesize

    4KB

  • memory/1632-134-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1632-84-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/1632-61-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/1632-62-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/1632-63-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/1632-64-0x0000000004250000-0x0000000004251000-memory.dmp

    Filesize

    4KB

  • memory/1632-65-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/1632-67-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/1632-68-0x00000000042E0000-0x00000000042E2000-memory.dmp

    Filesize

    8KB

  • memory/1632-69-0x0000000004220000-0x0000000004221000-memory.dmp

    Filesize

    4KB

  • memory/1632-70-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/1632-58-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1632-59-0x0000000077E00000-0x0000000077E02000-memory.dmp

    Filesize

    8KB

  • memory/1632-80-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1632-79-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/1632-78-0x0000000004350000-0x0000000004351000-memory.dmp

    Filesize

    4KB

  • memory/1632-77-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/1632-76-0x0000000004260000-0x0000000004261000-memory.dmp

    Filesize

    4KB

  • memory/1632-75-0x00000000041C0000-0x00000000041C1000-memory.dmp

    Filesize

    4KB

  • memory/1632-74-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/1632-73-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/1632-72-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/1632-71-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/1972-139-0x00000000021A0000-0x00000000021B0000-memory.dmp

    Filesize

    64KB

  • memory/2180-96-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-104-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-100-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2180-99-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-85-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-93-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-90-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2180-88-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2420-118-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2420-111-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2420-113-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2420-115-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3004-39-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/3004-15-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3004-16-0x0000000000400000-0x0000000000DFB000-memory.dmp

    Filesize

    10.0MB

  • memory/3004-36-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/3004-21-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/3004-24-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3004-41-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/3004-26-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3004-42-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/3004-44-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/3004-17-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/3004-19-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/3004-46-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/3004-31-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/3004-47-0x0000000077E10000-0x0000000077E11000-memory.dmp

    Filesize

    4KB

  • memory/3004-54-0x0000000000400000-0x0000000000DFB000-memory.dmp

    Filesize

    10.0MB

  • memory/3004-13-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3004-12-0x0000000000400000-0x0000000000DFB000-memory.dmp

    Filesize

    10.0MB

  • memory/3004-34-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/3004-135-0x0000000000400000-0x0000000000DFB000-memory.dmp

    Filesize

    10.0MB

  • memory/3004-10-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/3004-29-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB