Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
-
Size
919KB
-
MD5
28e242e4680d33a2757aa2353cb84f8d
-
SHA1
6b949c3f919d530410beb7082a41e1f30bc5ea3e
-
SHA256
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d
-
SHA512
c00ce7ff6bc841533f3b18b3de8e864dc34e3370912b3bfc924b31e51e505b19422c61685d606861fdd7b25e6ba7a97aa42a7dd0d4bf18bc24863ec09b3d54e2
-
SSDEEP
24576:PYl48Rnd+xEhyXOmBjuGh3HZDCixvP/Fg:+N5d+GhoOSVh3FCkvP/
Malware Config
Extracted
\Device\HarddiskVolume1\How To Restore Your Files.txt
http://3wugtklp46ufx7dnr6j5cd6ate7wnvnivsyvwuni7hqcqt7hm5r72nid.onion/1D85262A4B3F59090972E7EE7804FC641E9CBB6D65E5F4B376DF37D6180CD1/connect
https://tox.chat/download.html
Signatures
-
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Drops desktop.ini file(s) 15 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-452311807-3713411997-1028535425-1000\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-452311807-3713411997-1028535425-1000\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Links\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\L: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\B: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Z: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\X: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\F: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Q: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\W: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\R: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Y: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\S: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\J: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\V: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\E: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\T: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\U: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\I: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\O: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\G: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\P: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\A: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\H: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\N: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\M: 1ce5dd21fbff44289d22647277a94f2611e.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\img54A5.tmp" 1ce5dd21fbff44289d22647277a94f2611e.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 1ce5dd21fbff44289d22647277a94f2611e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 884 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 1ce5dd21fbff44289d22647277a94f2611e.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeBackupPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeBackupPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 2416 1ce5dd21fbff44289d22647277a94f2611e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2668 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 29 PID 2416 wrote to memory of 2668 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 29 PID 2416 wrote to memory of 2668 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 29 PID 2416 wrote to memory of 2668 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 29 PID 2416 wrote to memory of 2636 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 30 PID 2416 wrote to memory of 2636 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 30 PID 2416 wrote to memory of 2636 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 30 PID 2416 wrote to memory of 2636 2416 1ce5dd21fbff44289d22647277a94f2611e.exe 30 PID 2636 wrote to memory of 884 2636 cmd.exe 32 PID 2636 wrote to memory of 884 2636 cmd.exe 32 PID 2636 wrote to memory of 884 2636 cmd.exe 32 PID 2636 wrote to memory of 884 2636 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c PING -n 5 127.0.0.1 > NUL && del "C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\PING.EXEPING -n 5 127.0.0.13⤵
- Runs ping.exe
PID:884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c8b110d3f49f601e037cd3b4202b19ca
SHA120f651c7f04be96c45eb6e67eca5dc3df77f29b8
SHA256054fe0faa37a430feea7842321374d7fc10706742f7b0b22a84aa755b22cad76
SHA5122f3808cc65da403f65b59c2694d6683e2d7ab8b66b6088cc5a422dafe40a4fecbdaf28c62b9fda90981c9de24ce4d04da74d441361f275107c3f364b031ba4b9