Overview
overview
10Static
static
10IFProtects...ts.exe
windows7-x64
6IFProtects...ts.exe
windows10-2004-x64
1IFProtects...s2.exe
windows7-x64
1IFProtects...s2.exe
windows10-2004-x64
6IFProtects...ut.exe
windows7-x64
3IFProtects...ut.exe
windows10-2004-x64
3active/WebUnion.exe
windows7-x64
1active/WebUnion.exe
windows10-2004-x64
6d86645adc1...sm.exe
windows7-x64
1d86645adc1...sm.exe
windows10-2004-x64
10d86645adc1...df.lnk
windows7-x64
3d86645adc1...df.lnk
windows10-2004-x64
10fgyjk/03F7...BF.exe
windows7-x64
6fgyjk/03F7...BF.exe
windows10-2004-x64
6wyanoc/Agghosts.exe
windows7-x64
10wyanoc/Agghosts.exe
windows10-2004-x64
10xiuxiu-/we...ss.exe
windows7-x64
10xiuxiu-/we...ss.exe
windows10-2004-x64
10Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 02:42
Behavioral task
behavioral1
Sample
IFProtects/Protects/AAProtects.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
IFProtects/Protects/AAProtects.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
active/WebUnion.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
active/WebUnion.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
fgyjk/03F76412C9334BF.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
fgyjk/03F76412C9334BF.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
wyanoc/Agghosts.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
wyanoc/Agghosts.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
xiuxiu-/webprocess.exe
Resource
win7-20231215-en
General
-
Target
active/WebUnion.exe
-
Size
232KB
-
MD5
11fa2146c4527103ca10513b727a2f16
-
SHA1
b27bbae26949f55b7ffe6d895d8e9f47e1a71688
-
SHA256
c406715895b447c0d94125442386cf9d0680e28e486401ab998957f08dd8f859
-
SHA512
5c157d1a6cd101ea6baf0b1708bfc6b67dcc470419162425b8bfd6b72f40d9b71e39567765110e6fafbcf5e7010988e78aeff25804ebe5c6b4c6128bc3f6d063
-
SSDEEP
3072:mqyyfpuqYo4sE5u3p7oyBLoqN8r9b3fEoQnSe7CZftJUOGX9M63QoboxH:mXuVE5uZ7ogWr9ZntSX9M63cH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WebUnion = "C:\\Users\\Admin\\AppData\\Local\\Temp\\active\\WebUnion.exe" WebUnion.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 WebUnion.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom WebUnion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 WebUnion.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom WebUnion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 WebUnion.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags WebUnion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 WebUnion.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags WebUnion.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WebUnion.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WebUnion.exe