Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 17:34

General

  • Target

    Wobbly Life_j-nIYL1.exe

  • Size

    13.8MB

  • MD5

    42b0828a300ff9641620a1ab43cb9547

  • SHA1

    aea4f6eefcc2aca7f04220daf688565f66b4c212

  • SHA256

    0bb4adf992267f14d272bb10743030952057ba5429013b1f6559788498c901d0

  • SHA512

    60341d9363a09636b1ccf19ff4ee20bc361c41488bba108ff546b8393aad2652988923d16e958ac889a13265a10f7ffce74b311acbc5986ac1d75c6cb3efa7d5

  • SSDEEP

    196608:4j6kU9NYlObEk0Lp2dd/kZzkmxgy9NSW7I7GIXSpINbhiTGIwTh3kC3uDEN9TrSi:yLSN30LpEiSCC9XSpIFwah3RuINhkUP

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wobbly Life_j-nIYL1.exe
    "C:\Users\Admin\AppData\Local\Temp\Wobbly Life_j-nIYL1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\is-DP1MT.tmp\Wobbly Life_j-nIYL1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DP1MT.tmp\Wobbly Life_j-nIYL1.tmp" /SL5="$4014E,13603942,780800,C:\Users\Admin\AppData\Local\Temp\Wobbly Life_j-nIYL1.exe"
      2⤵
      • Checks for any installed AV software in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Windows\SysWOW64\netsh.exe
        "netsh" firewall add allowedprogramC:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe "qBittorrent" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2480
      • C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe
        "C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe" magnet:?xt=urn:btih:C161A3F09512F309A643A3E4232595D7AFE490D6
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2756
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      73153c559cae78d0151c29181979f430

      SHA1

      e9e3f998f50e3b0378dfdb47fcf6eda7410a2179

      SHA256

      88b229ac63fa091c8ef3cdbb917284a62b00fb56b7c8453e18c92ae70af53288

      SHA512

      d5e35a1a0e153651b9cb05ed08f7d1401fa4c9071056c645cbb93dce80e97b994b0edb6f19b931ed97d5ef032f74983016ecf4965c89ba5ca0ff3af80d1888d3

    • C:\Users\Admin\AppData\Local\Temp\Cab345B.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar346E.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\AVG_AV.png

      Filesize

      114KB

      MD5

      5ef5291810c454a35f76d976105f37cc

      SHA1

      8ce0cc65ae1786cef1c545d40d081eda13239fa6

      SHA256

      03e69e8c87732c625df2f628ac63bd145268f9dea9c5f3dd3670b1cf349a995c

      SHA512

      3bec461bb3cbbbdb3c05171fcc5ab7e648b2b60d7b811261662f14d35c3836148b14cda1a3f2be127c89cc732de8cf1644d2e55e049eeeb2da8e397c58cc919e

    • C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\finish.png

      Filesize

      2KB

      MD5

      7afaf9e0e99fd80fa1023a77524f5587

      SHA1

      e20c9c27691810b388c73d2ca3e67e109c2b69b6

      SHA256

      760b70612bb9bd967c2d15a5133a50ccce8c0bd46a6464d76875298dcc45dea0

      SHA512

      a090626e7b7f67fb5aa207aae0cf65c3a27e1b85e22c9728eee7475bd9bb7375ca93baaecc662473f9a427b4f505d55f2c61ba36bda460e4e6947fe22eedb044

    • C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe

      Filesize

      640KB

      MD5

      5d9646e75a62c2b0fea2bf5c4113e249

      SHA1

      81e15b2b376a79503ca9ca77cb62aeefd1742b4d

      SHA256

      89e7d9525da18cb25d66bba31e54111abf4b9cef0c319c055806008e28b76b8b

      SHA512

      5e3fa9ec4d809ec0b73e813743c8dcf80f77b885001d3cb2012440d8563c0eb7d17542a68b3ee8191b9617938aa556a4f22f809980eded3fc724a653094978f6

    • C:\Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe

      Filesize

      15.2MB

      MD5

      13f2b6743e364d2caab4d0c0eea1e070

      SHA1

      a2abbbc277feca525e28029892e604bbdbeb4fde

      SHA256

      b25b7d6a22972f7da8e378107d9b7790efec0c53c5a983124ba00641f1bcf406

      SHA512

      c75ee96c86c67f6f300edd8aada2346feebbe98228e7003c371f2a6089f0d8b3a1a994cf5633880ef302cfa7de7dd72e5466dd123804dd9b56f650c05f2ea358

    • \Users\Admin\AppData\Local\Temp\is-DP1MT.tmp\Wobbly Life_j-nIYL1.tmp

      Filesize

      2.9MB

      MD5

      392188858aab78d544835de0fe665a04

      SHA1

      e2c06e4d926bbecee75887c83b5a9e732b0103b8

      SHA256

      eaa483432e2cae37fcf1350c160b848948f8e512ed085fab67d901bfcd8d5d07

      SHA512

      0d0d1d1196d705af2a755d054372b45e8540edeb201d2b9ac2d48a08240399314130f3e78e7e962ce708d3da90ed933fa848023f7db9ecaf7fc6ec7979cb05a5

    • \Users\Admin\AppData\Local\Temp\is-JKM07.tmp\botva2.dll

      Filesize

      37KB

      MD5

      67965a5957a61867d661f05ae1f4773e

      SHA1

      f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

      SHA256

      450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

      SHA512

      c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

    • \Users\Admin\AppData\Local\Temp\is-JKM07.tmp\qbittorrent.exe

      Filesize

      576KB

      MD5

      12b8ef025e88e7e6b077656f826b3a6e

      SHA1

      e36328ea1d8fca09fa0bf456656166cdb852a497

      SHA256

      7888bb17710ccb0afff62e51301553cfe9788f9016a9fb9e66ed47b2a4c54e4c

      SHA512

      2854359596eb65c6546d1781002ed90406755ac60223d3a77b1f2bd6bc22062e7c8f5b3e75b2a9bde82919dbc402d3d6e33a9ae1d1757fe689729fdcb68b920b

    • \Users\Admin\AppData\Local\Temp\is-JKM07.tmp\zbShieldUtils.dll

      Filesize

      2.0MB

      MD5

      c79e3df659cdee033a447a8f372760ce

      SHA1

      f402273e29a6fa39572163e4595e72bde3d9330a

      SHA256

      7d09715c4e0735a0832bf81d92d84600df1815a2ba451586bd25eb16f7c450a5

      SHA512

      490cc30ccfac209f1f5332ce4168b0dc849d7e4d86f3c198ddd23b39ddc950001928a1e071c2ace74c4710508265c0872adb02e3f068e521d28ed8b19ea36492

    • memory/1548-154-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1548-8-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1548-152-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/1548-153-0x0000000007870000-0x000000000787F000-memory.dmp

      Filesize

      60KB

    • memory/1548-141-0x0000000007870000-0x000000000787F000-memory.dmp

      Filesize

      60KB

    • memory/1548-138-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/1548-173-0x0000000000400000-0x00000000006EE000-memory.dmp

      Filesize

      2.9MB

    • memory/2756-159-0x0000000000110000-0x0000000000120000-memory.dmp

      Filesize

      64KB

    • memory/2756-161-0x0000000000120000-0x000000000012A000-memory.dmp

      Filesize

      40KB

    • memory/2756-162-0x0000000000120000-0x000000000012A000-memory.dmp

      Filesize

      40KB

    • memory/2756-177-0x0000000000120000-0x0000000000122000-memory.dmp

      Filesize

      8KB

    • memory/2932-1-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/2932-137-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB

    • memory/2932-175-0x0000000000400000-0x00000000004CC000-memory.dmp

      Filesize

      816KB