Overview
overview
10Static
static
3Set@up#!Fi...up.exe
windows7-x64
5Set@up#!Fi...up.exe
windows10-2004-x64
10Set@up#!Fi...-6.dll
windows7-x64
1Set@up#!Fi...-6.dll
windows10-2004-x64
3Set@up#!Fi...-6.dll
windows7-x64
1Set@up#!Fi...-6.dll
windows10-2004-x64
3Set@up#!Fi...-6.dll
windows7-x64
1Set@up#!Fi...-6.dll
windows10-2004-x64
3Set@up#!Fi...dl.dll
windows7-x64
1Set@up#!Fi...dl.dll
windows10-2004-x64
3Set@up#!Fi...-1.dll
windows7-x64
1Set@up#!Fi...-1.dll
windows10-2004-x64
3Set@up#!Fi...-1.dll
windows7-x64
1Set@up#!Fi...-1.dll
windows10-2004-x64
3Set@up#!Fi...-1.dll
windows7-x64
1Set@up#!Fi...-1.dll
windows10-2004-x64
3Set@up#!Fi...-0.dll
windows7-x64
1Set@up#!Fi...-0.dll
windows10-2004-x64
3Set@up#!Fi...-0.dll
windows7-x64
1Set@up#!Fi...-0.dll
windows10-2004-x64
3Set@up#!Fi...-1.dll
windows7-x64
1Set@up#!Fi...-1.dll
windows10-2004-x64
4Set@up#!Fi...b1.dll
windows7-x64
1Set@up#!Fi...b1.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
Set@up#!Files-P@ssw0rD__~2402~_/Set-up.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Set@up#!Files-P@ssw0rD__~2402~_/Set-up.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libX11-6.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libX11-6.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libXau-6.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libXau-6.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libXdmcp-6.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libXdmcp-6.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libdl.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libdl.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libgcc_s_dw2-1.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libgcc_s_dw2-1.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libwinpthread-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libwinpthread-1.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-1.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-image-0.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-image-0.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-shm-0.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-shm-0.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-util-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-util-1.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
Set@up#!Files-P@ssw0rD__~2402~_/zlib1.dll
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
Set@up#!Files-P@ssw0rD__~2402~_/zlib1.dll
Resource
win10v2004-20240221-en
General
-
Target
Set@up#!Files-P@ssw0rD__~2402~_/libxcb-util-1.dll
-
Size
23KB
-
MD5
ee6788d3d3750421e01519a27f86634e
-
SHA1
48f4c7dc7bd1208f07e4176e78f035d36682d687
-
SHA256
b5acf358ff97127eac9ef4c664a980b937376b5295ef23d77ee338225de10d60
-
SHA512
12ef0ac4cf9c8461044317e693bcfabdb4beb34a222b635ba50f6652b5a91b92ff20cb19e916ac60dca3e8314b7d8cec710a1c730374bb8f260b8d94f57c9775
-
SSDEEP
384:FlSwg+49czS++g6Od6e4um1J47E6Lx7Ow7qOocOS1:FlWgPdX66wwQJk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2512 2100 WerFault.exe 85 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1772 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3160 mspaint.exe 3160 mspaint.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1216 svchost.exe Token: SeRestorePrivilege 1216 svchost.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3160 mspaint.exe 3160 mspaint.exe 3160 mspaint.exe 3160 mspaint.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe 4276 OpenWith.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2100 2492 rundll32.exe 85 PID 2492 wrote to memory of 2100 2492 rundll32.exe 85 PID 2492 wrote to memory of 2100 2492 rundll32.exe 85 PID 1216 wrote to memory of 4384 1216 svchost.exe 97 PID 1216 wrote to memory of 4384 1216 svchost.exe 97 PID 4276 wrote to memory of 1772 4276 OpenWith.exe 102 PID 4276 wrote to memory of 1772 4276 OpenWith.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Set@up#!Files-P@ssw0rD__~2402~_\libxcb-util-1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Set@up#!Files-P@ssw0rD__~2402~_\libxcb-util-1.dll,#12⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 5523⤵
- Program crash
PID:2512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2100 -ip 21001⤵PID:3700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\dashost.exedashost.exe {3721e4d8-b7a8-44be-b61427b5ae413b47}2⤵PID:4384
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\AssertStop.ico"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3160
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\CompareConvertTo.cfg2⤵
- Opens file in notepad (likely ransom note)
PID:1772
-