Analysis

  • max time kernel
    1797s
  • max time network
    1563s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 18:35

General

  • Target

    Covid20.exe

  • Size

    4.8MB

  • MD5

    fde53eb92140afb22152cfa283ef26cc

  • SHA1

    b975f240e69307f809e54fabf6ea547183edf130

  • SHA256

    56c6b80e9f525e9010b47112f8085751e8e3fb744e111df3330b481df6a7e954

  • SHA512

    df5eaa0e429e618d7c94eab0dd6021d774abe50ad2d200d3608d1d1c50b70e65eccff564baa2fd2b86a5dad999ff7edb04152ac5cbff209fae7d93c329dff771

  • SSDEEP

    98304:i1EB4Av3kOW561R4+8QxEmKDxUmEhc0R2lIP9W0uJPg4dWzN/ODIw9AtVje7gQ:EEi4z1R4+LKDPEK0RBFduJ44dWpiHAtM

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Covid20.exe
    "C:\Users\Admin\AppData\Local\Temp\Covid20.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\5580.tmp\covid.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\5580.tmp\CLWCP.exe
        clwcp c:\covid20\bg.bmp
        3⤵
        • Executes dropped EXE
        • Sets desktop wallpaper using registry
        PID:2460
      • C:\Users\Admin\AppData\Local\Temp\5580.tmp\flasher.exe
        flasher 5 c:\covid20\covid.bmp
        3⤵
        • Executes dropped EXE
        PID:2744
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5580.tmp\corona.vbs"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5580.tmp\bg.bmp

    Filesize

    14.3MB

    MD5

    1fcc89e66a32278ad6a9ea4a0eb18469

    SHA1

    3abb195502e5ec1f12cd0bfb2167646aa91411f4

    SHA256

    f76f7ab0aa22e274354577c9e7744df91c21fa110e2b7625235e095b33b68d1f

    SHA512

    fe0f32f12ff35d6310fd01929c465e84d109b23bbddb607ea4675af05e77231f05d6b4a601f60f861a5988a7f47a09ba8cf374ee307e19e1cac4a2819c3d68b5

  • C:\Users\Admin\AppData\Local\Temp\5580.tmp\corona.vbs

    Filesize

    130B

    MD5

    e61624dced063c4ba5352bf487f12410

    SHA1

    40bd08928900cd97f444ffaa78d93dcaf913b274

    SHA256

    82ac48c4f7edbab182aa0a8c320d5616ccdd2f0e83dc733b91e45521f85462a3

    SHA512

    2a27db12d2af35e7b51a307eb8860800075867922d3d63a69da608c96bec045f3c64ac757674d2a40d7f4d9e55179fc2bddc17691919e18e109a5d4669c607ac

  • C:\Users\Admin\AppData\Local\Temp\5580.tmp\covid.bat

    Filesize

    445B

    MD5

    b08e02e536917f897acb2d21f42f0a97

    SHA1

    a078f1addfd3eeb0f0cb5fd206ff78e9dc0f3e45

    SHA256

    2c68caeada2c251c5fc12694b7288a5790114ced4142867179e75d313efaa50c

    SHA512

    1d1901c3c676bb6d99a39d1a0bab1a6ee378090390bb5e7fe66cf754b8dd772ac0b79ba1215fa758445db1deac200afcc5e1e1e32b2562df946c82b530ca95ab

  • C:\Users\Admin\AppData\Local\Temp\5580.tmp\covid.bmp

    Filesize

    147KB

    MD5

    738bbd119d8877f8342e1ff00fe60dff

    SHA1

    fc11d85e3c5b46bd877e06985fec1a601ce396ed

    SHA256

    548c9e22a04650efec06a0414d205d24600e08e0fac1beed7e8b4c03730962bb

    SHA512

    f7a12c9a1403c9a1953387c5871d6e7865ba80c405f37c51f5c3e093bab9235b8a8ba62ad8b27f2079407e9672d47ac365c9cb08033ef349bd8c9906a30fefad

  • \??\c:\covid20\bg.bmp

    Filesize

    4.3MB

    MD5

    031b9587b8023e0d9e395ce00f5a60eb

    SHA1

    d1768d8325af1e9f7f49af2e92332c1d0352ea67

    SHA256

    7008dfc20a7ea78f9f7b004fdb87b2c875dd7dcb4466cf6911908cbc32b5a735

    SHA512

    138190471d0e3e24014b4925c0566bb849e9d2a73eeda1ff9227909b174b7ded7aaaab4f86c94acbab181d8c8842ed75b8279426ad172591001e14e15fb801d7

  • \Users\Admin\AppData\Local\Temp\5580.tmp\CLWCP.exe

    Filesize

    505KB

    MD5

    e62ee6f1efc85cb36d62ab779db6e4ec

    SHA1

    da07ec94cf2cb2b430e15bd0c5084996a47ee649

    SHA256

    13b4ec59785a1b367efb691a3d5c86eb5aaf1ca0062521c4782e1baac6633f8a

    SHA512

    8142086979ec1ca9675418e94326a40078400aff8587fc613e17164e034badd828e9615589e6cb8b9339da7cdc9bcb8c48e0890c5f288068f4b86ff659670a69

  • \Users\Admin\AppData\Local\Temp\5580.tmp\flasher.exe

    Filesize

    246KB

    MD5

    9254ca1da9ff8ad492ca5fa06ca181c6

    SHA1

    70fa62e6232eae52467d29cf1c1dacb8a7aeab90

    SHA256

    30676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6

    SHA512

    a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a

  • memory/1808-74-0x0000000000400000-0x0000000001A7B000-memory.dmp

    Filesize

    22.5MB

  • memory/1808-0-0x0000000000400000-0x0000000001A7B000-memory.dmp

    Filesize

    22.5MB

  • memory/2460-44-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2460-76-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/2744-50-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2744-77-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2744-88-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB

  • memory/2744-119-0x0000000000400000-0x00000000004A4000-memory.dmp

    Filesize

    656KB