Overview
overview
10Static
static
10IFProtects...ts.exe
windows7-x64
6IFProtects...ts.exe
windows10-2004-x64
1IFProtects...s2.exe
windows7-x64
1IFProtects...s2.exe
windows10-2004-x64
6IFProtects...ut.exe
windows7-x64
3IFProtects...ut.exe
windows10-2004-x64
3active/WebUnion.exe
windows7-x64
1active/WebUnion.exe
windows10-2004-x64
6d86645adc1...sm.exe
windows7-x64
1d86645adc1...sm.exe
windows10-2004-x64
10d86645adc1...df.lnk
windows7-x64
3d86645adc1...df.lnk
windows10-2004-x64
10fgyjk/03F7...BF.exe
windows7-x64
6fgyjk/03F7...BF.exe
windows10-2004-x64
6wyanoc/Agghosts.exe
windows7-x64
10wyanoc/Agghosts.exe
windows10-2004-x64
10xiuxiu-/we...ss.exe
windows7-x64
10xiuxiu-/we...ss.exe
windows10-2004-x64
10Analysis
-
max time kernel
151s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 02:42
Behavioral task
behavioral1
Sample
IFProtects/Protects/AAProtects.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
IFProtects/Protects/AAProtects.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
active/WebUnion.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
active/WebUnion.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
fgyjk/03F76412C9334BF.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
fgyjk/03F76412C9334BF.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
wyanoc/Agghosts.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
wyanoc/Agghosts.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
xiuxiu-/webprocess.exe
Resource
win7-20231215-en
General
-
Target
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
-
Size
2KB
-
MD5
170121b443dfb94113e76d0a3125977f
-
SHA1
a9d3e8971781a70cdf9fb03301b8b68299f3f8e4
-
SHA256
de37f3b4aeeada22873dfb5fa074bd53e959fab38593ee22b8ab689fa767f8c8
-
SHA512
81dcefa5a4fd8a91e64280d365f645e30eff332e08189d3e006c3722d1cae46a53ad3841b0db9bc2bf58b8dfd4b3287b4ac5a15f0df5948d3d0bf0ac5c3bd779
Malware Config
Signatures
-
Detected phishing page
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe 1176 Dism.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1176 Dism.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4296 wrote to memory of 3700 4296 cmd.exe 91 PID 4296 wrote to memory of 3700 4296 cmd.exe 91 PID 3700 wrote to memory of 1176 3700 cmd.exe 92 PID 3700 wrote to memory of 1176 3700 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef\Document.pdf.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start Dism.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef\Dism.exeDism.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-