Overview
overview
3Static
static
3WINPG_V4_2...32.dll
windows7-x64
1WINPG_V4_2...32.dll
windows10-2004-x64
1WINPG_V4_2...64.dll
windows7-x64
1WINPG_V4_2...64.dll
windows10-2004-x64
1WINPG_V4_2...32.exe
windows7-x64
1WINPG_V4_2...32.exe
windows10-2004-x64
1WINPG_V4_2...64.exe
windows7-x64
1WINPG_V4_2...64.exe
windows10-2004-x64
1WINPG_V4_2...de.bat
windows7-x64
1WINPG_V4_2...de.bat
windows10-2004-x64
1WINPG_V4_2...32.bat
windows7-x64
1WINPG_V4_2...32.bat
windows10-2004-x64
1WINPG_V4_2...BG.bat
windows7-x64
1WINPG_V4_2...BG.bat
windows10-2004-x64
1WINPG_V4_2...TL.bat
windows7-x64
1WINPG_V4_2...TL.bat
windows10-2004-x64
1WINPG_V4_2...64.bat
windows7-x64
1WINPG_V4_2...64.bat
windows10-2004-x64
1WINPG_V4_2...BG.bat
windows7-x64
1WINPG_V4_2...BG.bat
windows10-2004-x64
1WINPG_V4_2...TL.bat
windows7-x64
1WINPG_V4_2...TL.bat
windows10-2004-x64
1WINPG_V4_2...32.exe
windows10-2004-x64
1WINPG_V4_2...64.exe
windows10-2004-x64
1WINPG_V4_2...64.sys
windows7-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows7-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
WINPG_V4_279/RTIoLib32.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
WINPG_V4_279/RTIoLib32.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
WINPG_V4_279/RTIoLib64.dll
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
WINPG_V4_279/RTIoLib64.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
WINPG_V4_279/RTNicPgW32.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
WINPG_V4_279/RTNicPgW32.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
WINPG_V4_279/RTNicPgW64.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
WINPG_V4_279/RTNicPgW64.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
WINPG_V4_279/RunCmdMode.bat
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
WINPG_V4_279/RunCmdMode.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
WINPG_V4_279/WINPG32.bat
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
WINPG_V4_279/WINPG32.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
WINPG_V4_279/WINPG32_DBG.bat
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
WINPG_V4_279/WINPG32_DBG.bat
Resource
win10v2004-20231025-en
Behavioral task
behavioral15
Sample
WINPG_V4_279/WINPG32_IOCTL.bat
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
WINPG_V4_279/WINPG32_IOCTL.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
WINPG_V4_279/WINPG64.bat
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
WINPG_V4_279/WINPG64.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
WINPG_V4_279/WINPG64_DBG.bat
Resource
win7-20231025-en
Behavioral task
behavioral20
Sample
WINPG_V4_279/WINPG64_DBG.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
WINPG_V4_279/WINPG64_IOCTL.bat
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
WINPG_V4_279/WINPG64_IOCTL.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
WINPG_V4_279/devcon32.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
WINPG_V4_279/devcon64.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
WINPG_V4_279/rtkio64.sys
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
WINPG_V4_279/rtkio64.sys
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
WINPG_V4_279/rtkio86.sys
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
WINPG_V4_279/rtkio86.sys
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
WINPG_V4_279/rtkiow10x64.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral30
Sample
WINPG_V4_279/rtkiow10x86.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
WINPG_V4_279/rtkiow8x64.sys
Resource
win10v2004-20231025-en
Behavioral task
behavioral32
Sample
WINPG_V4_279/rtkiow8x86.sys
Resource
win10v2004-20231023-en
General
-
Target
WINPG_V4_279/WINPG32.bat
-
Size
423B
-
MD5
cbf394ff14a9f4e6dc0b2039caf5e79c
-
SHA1
7218848b9fe9bb1a97290fcf957cc346b3a464bf
-
SHA256
81cfd6bc9b3967b20a364dbc92df9aa9d256bdae0962279b7f3c561e9464138f
-
SHA512
277f79d4c5f529258fda7cb881850de3887e79b6cc359d7b2cb93e221b9b8ff0de422ce4b087268a1c94380afbfc87e21f253eb423e473160ea8398d3c4a6995
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon32.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1324 devcon32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 260 wrote to memory of 4800 260 cmd.exe 89 PID 260 wrote to memory of 4800 260 cmd.exe 89 PID 4800 wrote to memory of 2924 4800 net.exe 90 PID 4800 wrote to memory of 2924 4800 net.exe 90 PID 260 wrote to memory of 880 260 cmd.exe 91 PID 260 wrote to memory of 880 260 cmd.exe 91 PID 260 wrote to memory of 880 260 cmd.exe 91 PID 260 wrote to memory of 4412 260 cmd.exe 94 PID 260 wrote to memory of 4412 260 cmd.exe 94 PID 260 wrote to memory of 4412 260 cmd.exe 94 PID 260 wrote to memory of 1324 260 cmd.exe 95 PID 260 wrote to memory of 1324 260 cmd.exe 95 PID 260 wrote to memory of 1324 260 cmd.exe 95 PID 260 wrote to memory of 3192 260 cmd.exe 96 PID 260 wrote to memory of 3192 260 cmd.exe 96 PID 260 wrote to memory of 3192 260 cmd.exe 96 PID 260 wrote to memory of 4388 260 cmd.exe 97 PID 260 wrote to memory of 4388 260 cmd.exe 97 PID 4388 wrote to memory of 1532 4388 net.exe 98 PID 4388 wrote to memory of 1532 4388 net.exe 98
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\WINPG32.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\system32\net.exenet stop DashClientService2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DashClientService3⤵PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe disable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"2⤵
- Checks SCSI registry key(s)
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\RTNicPgW32.exeRTNicPgW32.exe /eeprom /r2⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe rescan2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe enable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"2⤵
- Checks SCSI registry key(s)
PID:3192
-
-
C:\Windows\system32\net.exenet start DashClientService2⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start DashClientService3⤵PID:1532
-
-