Overview
overview
3Static
static
3WINPG_V4_2...32.dll
windows7-x64
1WINPG_V4_2...32.dll
windows10-2004-x64
1WINPG_V4_2...64.dll
windows7-x64
1WINPG_V4_2...64.dll
windows10-2004-x64
1WINPG_V4_2...32.exe
windows7-x64
1WINPG_V4_2...32.exe
windows10-2004-x64
1WINPG_V4_2...64.exe
windows7-x64
1WINPG_V4_2...64.exe
windows10-2004-x64
1WINPG_V4_2...de.bat
windows7-x64
1WINPG_V4_2...de.bat
windows10-2004-x64
1WINPG_V4_2...32.bat
windows7-x64
1WINPG_V4_2...32.bat
windows10-2004-x64
1WINPG_V4_2...BG.bat
windows7-x64
1WINPG_V4_2...BG.bat
windows10-2004-x64
1WINPG_V4_2...TL.bat
windows7-x64
1WINPG_V4_2...TL.bat
windows10-2004-x64
1WINPG_V4_2...64.bat
windows7-x64
1WINPG_V4_2...64.bat
windows10-2004-x64
1WINPG_V4_2...BG.bat
windows7-x64
1WINPG_V4_2...BG.bat
windows10-2004-x64
1WINPG_V4_2...TL.bat
windows7-x64
1WINPG_V4_2...TL.bat
windows10-2004-x64
1WINPG_V4_2...32.exe
windows10-2004-x64
1WINPG_V4_2...64.exe
windows10-2004-x64
1WINPG_V4_2...64.sys
windows7-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows7-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1WINPG_V4_2...64.sys
windows10-2004-x64
1WINPG_V4_2...86.sys
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
WINPG_V4_279/RTIoLib32.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
WINPG_V4_279/RTIoLib32.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
WINPG_V4_279/RTIoLib64.dll
Resource
win7-20231025-en
Behavioral task
behavioral4
Sample
WINPG_V4_279/RTIoLib64.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
WINPG_V4_279/RTNicPgW32.exe
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
WINPG_V4_279/RTNicPgW32.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
WINPG_V4_279/RTNicPgW64.exe
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
WINPG_V4_279/RTNicPgW64.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
WINPG_V4_279/RunCmdMode.bat
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
WINPG_V4_279/RunCmdMode.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
WINPG_V4_279/WINPG32.bat
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
WINPG_V4_279/WINPG32.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
WINPG_V4_279/WINPG32_DBG.bat
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
WINPG_V4_279/WINPG32_DBG.bat
Resource
win10v2004-20231025-en
Behavioral task
behavioral15
Sample
WINPG_V4_279/WINPG32_IOCTL.bat
Resource
win7-20231020-en
Behavioral task
behavioral16
Sample
WINPG_V4_279/WINPG32_IOCTL.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
WINPG_V4_279/WINPG64.bat
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
WINPG_V4_279/WINPG64.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
WINPG_V4_279/WINPG64_DBG.bat
Resource
win7-20231025-en
Behavioral task
behavioral20
Sample
WINPG_V4_279/WINPG64_DBG.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
WINPG_V4_279/WINPG64_IOCTL.bat
Resource
win7-20231020-en
Behavioral task
behavioral22
Sample
WINPG_V4_279/WINPG64_IOCTL.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
WINPG_V4_279/devcon32.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral24
Sample
WINPG_V4_279/devcon64.exe
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
WINPG_V4_279/rtkio64.sys
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
WINPG_V4_279/rtkio64.sys
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
WINPG_V4_279/rtkio86.sys
Resource
win7-20231023-en
Behavioral task
behavioral28
Sample
WINPG_V4_279/rtkio86.sys
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
WINPG_V4_279/rtkiow10x64.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral30
Sample
WINPG_V4_279/rtkiow10x86.sys
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
WINPG_V4_279/rtkiow8x64.sys
Resource
win10v2004-20231025-en
Behavioral task
behavioral32
Sample
WINPG_V4_279/rtkiow8x86.sys
Resource
win10v2004-20231023-en
General
-
Target
WINPG_V4_279/WINPG32_DBG.bat
-
Size
583B
-
MD5
d33e91c2b096699ff2cf20ae35f2d441
-
SHA1
93f9e0162e10f411b548fb898c52149265f94a7b
-
SHA256
784760b7a09a1aacd36180d0f5e7081a9b53e59a49a70de3d7a2b8fbff25c69e
-
SHA512
bc38562af5c39d9307c735f674fb86d4ca23304e985ddd7a5621a282177b6fc3435e4973f9f2f187cfea4a5184151851518dca6c10efdf6408e90600b37cdf6b
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon32.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3272 devcon32.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4768 2216 cmd.exe 87 PID 2216 wrote to memory of 4768 2216 cmd.exe 87 PID 4768 wrote to memory of 4540 4768 net.exe 88 PID 4768 wrote to memory of 4540 4768 net.exe 88 PID 2216 wrote to memory of 1640 2216 cmd.exe 89 PID 2216 wrote to memory of 1640 2216 cmd.exe 89 PID 2216 wrote to memory of 1640 2216 cmd.exe 89 PID 2216 wrote to memory of 4652 2216 cmd.exe 92 PID 2216 wrote to memory of 4652 2216 cmd.exe 92 PID 2216 wrote to memory of 4652 2216 cmd.exe 92 PID 2216 wrote to memory of 3272 2216 cmd.exe 93 PID 2216 wrote to memory of 3272 2216 cmd.exe 93 PID 2216 wrote to memory of 3272 2216 cmd.exe 93 PID 2216 wrote to memory of 3196 2216 cmd.exe 95 PID 2216 wrote to memory of 3196 2216 cmd.exe 95 PID 2216 wrote to memory of 3196 2216 cmd.exe 95 PID 2216 wrote to memory of 716 2216 cmd.exe 96 PID 2216 wrote to memory of 716 2216 cmd.exe 96 PID 716 wrote to memory of 2788 716 net.exe 97 PID 716 wrote to memory of 2788 716 net.exe 97 PID 2216 wrote to memory of 4140 2216 cmd.exe 98 PID 2216 wrote to memory of 4140 2216 cmd.exe 98
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\WINPG32_DBG.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\net.exenet stop DashClientService2⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DashClientService3⤵PID:4540
-
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe disable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"2⤵
- Checks SCSI registry key(s)
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\RTNicPgW32.exeRTNicPgW32.exe /efuse /r /rtkdbg2⤵PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe rescan2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exedevcon32.exe enable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"2⤵
- Checks SCSI registry key(s)
PID:3196
-
-
C:\Windows\system32\net.exenet start DashClientService2⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start DashClientService3⤵PID:2788
-
-
-
C:\Windows\system32\find.exefind 2.txt "Result = 0x0"2⤵PID:4140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
890B
MD5cd3368d2c62cde6ecffe24bbcb210ddf
SHA19457292b9da764c2c23fb3c32f510f0f0cf80b89
SHA256a140fd8a8522095a9e55a2f1dcfbee8c70af6238910bf081f9b82b0bb55948aa
SHA5123fdcbb27262743b814839c0c9c6c37e065c95fa4e3d50bda1d5600974f1c806338298e4954188ea401f47316a78641cc660d2ea9357c79604b05f6a91e4bc7d1