Overview
overview
10Static
static
3samples4.zip
windows7-x64
1samples4.zip
windows10-2004-x64
10e60d49a96...01.exe
windows7-x64
0e60d49a96...01.exe
windows10-2004-x64
1ce5dd21fb...1e.exe
windows7-x64
101ce5dd21fb...1e.exe
windows10-2004-x64
103c73425d02...e6.exe
windows7-x64
63c73425d02...e6.exe
windows10-2004-x64
65df6314b5c...5b.exe
windows7-x64
105df6314b5c...5b.exe
windows10-2004-x64
105ee5166c02...93.exe
windows7-x64
105ee5166c02...93.exe
windows10-2004-x64
105f7cdd8c28...02.exe
windows7-x64
75f7cdd8c28...02.exe
windows10-2004-x64
7Analysis
-
max time kernel
154s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
samples4.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
samples4.zip
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
0e60d49a967599fab179f8c885d91db25016be996d66a4e00cbb197e5085efa4/0e60d49a967599fab179f8c885d91db2501.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
3c73425d026a172779c8ffc5e338afbf6e66f1ad3020a11c2bece4658fcb28fc/3c73425d026a172779c8ffc5e338afbf6e6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
5df6314b5c6f6bd151a5fda104d32655c5bd8153be922b80069b22f1c1de9db3/5df6314b5c6f6bd151a5fda104d32655c5b.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
5ee5166c02636f294fb8f6da69d5c0ae893a1c4694ae1bcc3753b497598121a0/5ee5166c02636f294fb8f6da69d5c0ae893.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
5f7cdd8c28daba74fd96c1aa9de6d920b026dcea5b596e7e145ffe11c5a4cb8e/5f7cdd8c28daba74fd96c1aa9de6d920b02.exe
Resource
win10v2004-20231215-en
General
-
Target
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d/1ce5dd21fbff44289d22647277a94f2611e.exe
-
Size
919KB
-
MD5
28e242e4680d33a2757aa2353cb84f8d
-
SHA1
6b949c3f919d530410beb7082a41e1f30bc5ea3e
-
SHA256
1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d
-
SHA512
c00ce7ff6bc841533f3b18b3de8e864dc34e3370912b3bfc924b31e51e505b19422c61685d606861fdd7b25e6ba7a97aa42a7dd0d4bf18bc24863ec09b3d54e2
-
SSDEEP
24576:PYl48Rnd+xEhyXOmBjuGh3HZDCixvP/Fg:+N5d+GhoOSVh3FCkvP/
Malware Config
Extracted
F:\$RECYCLE.BIN\How To Restore Your Files.txt
http://3wugtklp46ufx7dnr6j5cd6ate7wnvnivsyvwuni7hqcqt7hm5r72nid.onion/1D85262A4B3F59090972E7EE7804FC641E9CBB6D65E5F4B376DF37D6180CD1/connect
https://tox.chat/download.html
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 1ce5dd21fbff44289d22647277a94f2611e.exe -
Drops desktop.ini file(s) 18 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Links\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-635608581-3370340891-292606865-1000\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-635608581-3370340891-292606865-1000\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1ce5dd21fbff44289d22647277a94f2611e.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\M: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\F: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\R: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\S: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\J: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\V: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\N: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\I: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\O: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\P: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Z: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\K: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\W: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\E: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\U: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\H: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\G: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\L: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\X: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Q: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\T: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\Y: 1ce5dd21fbff44289d22647277a94f2611e.exe File opened (read-only) \??\A: 1ce5dd21fbff44289d22647277a94f2611e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PP0jd8eipekkbxjv1w4xvbgpovb.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\imgFBF4.tmp" 1ce5dd21fbff44289d22647277a94f2611e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2900 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 4756 ONENOTE.EXE 4756 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeBackupPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeBackupPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeBackupPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe Token: SeSecurityPrivilege 3932 1ce5dd21fbff44289d22647277a94f2611e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE 4756 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3932 wrote to memory of 1456 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 93 PID 3932 wrote to memory of 1456 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 93 PID 3932 wrote to memory of 1852 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 96 PID 3932 wrote to memory of 1852 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 96 PID 3932 wrote to memory of 1852 3932 1ce5dd21fbff44289d22647277a94f2611e.exe 96 PID 1852 wrote to memory of 2900 1852 cmd.exe 98 PID 1852 wrote to memory of 2900 1852 cmd.exe 98 PID 1852 wrote to memory of 2900 1852 cmd.exe 98 PID 2760 wrote to memory of 4756 2760 printfilterpipelinesvc.exe 100 PID 2760 wrote to memory of 4756 2760 printfilterpipelinesvc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c PING -n 5 127.0.0.1 > NUL && del "C:\Users\Admin\AppData\Local\Temp\1ce5dd21fbff44289d22647277a94f2611ee661cdcab323548caa0a7082ddc7d\1ce5dd21fbff44289d22647277a94f2611e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\PING.EXEPING -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2900
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1756
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{866BC266-E6DD-4B69-8033-7C456D240731}.xps" 1334859736941700002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5994372ec28f607569b45c8ec8adb8439
SHA131d41a96c3a9cdfcfda91d187af296ee0626f9ee
SHA256cd11fb1d907a7fe591056b6f2585ca6cef475592660eadcdbfe1526a8dee6f8a
SHA5125f88859108d6e1c133aae3fa4fe8b03ebae12769bdf585465ec1857e13e50c66d566c5eb5fe994041f9e4b9610950a089f3737fa067bb6e9cd7385b99b79a5d3
-
Filesize
1KB
MD5c8b110d3f49f601e037cd3b4202b19ca
SHA120f651c7f04be96c45eb6e67eca5dc3df77f29b8
SHA256054fe0faa37a430feea7842321374d7fc10706742f7b0b22a84aa755b22cad76
SHA5122f3808cc65da403f65b59c2694d6683e2d7ab8b66b6088cc5a422dafe40a4fecbdaf28c62b9fda90981c9de24ce4d04da74d441361f275107c3f364b031ba4b9