Overview
overview
10Static
static
7CSHacksFre...ks.exe
windows7-x64
1CSHacksFre...ks.exe
windows10-2004-x64
1Covid18.exe
windows7-x64
10Covid18.exe
windows10-2004-x64
10Covid20.exe
windows7-x64
7Covid20.exe
windows10-2004-x64
7Covid21 2.0.exe
windows7-x64
8Covid21 2.0.exe
windows10-2004-x64
8Covid666.exe
windows7-x64
Covid666.exe
windows10-2004-x64
CrazyPos.exe
windows7-x64
1CrazyPos.exe
windows10-2004-x64
1CrazyText.exe
windows7-x64
1CrazyText.exe
windows10-2004-x64
1Cronic.exe
windows7-x64
1Cronic.exe
windows10-2004-x64
1country.exe
windows7-x64
1country.exe
windows10-2004-x64
1Analysis
-
max time kernel
1797s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 18:35
Behavioral task
behavioral1
Sample
CSHacksFreeNoHacks.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CSHacksFreeNoHacks.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Covid18.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Covid18.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Covid20.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Covid20.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Covid21 2.0.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Covid21 2.0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Covid666.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Covid666.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
CrazyPos.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
CrazyPos.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
CrazyText.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
CrazyText.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Cronic.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Cronic.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
country.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
country.exe
Resource
win10v2004-20240226-en
General
-
Target
Covid20.exe
-
Size
4.8MB
-
MD5
fde53eb92140afb22152cfa283ef26cc
-
SHA1
b975f240e69307f809e54fabf6ea547183edf130
-
SHA256
56c6b80e9f525e9010b47112f8085751e8e3fb744e111df3330b481df6a7e954
-
SHA512
df5eaa0e429e618d7c94eab0dd6021d774abe50ad2d200d3608d1d1c50b70e65eccff564baa2fd2b86a5dad999ff7edb04152ac5cbff209fae7d93c329dff771
-
SSDEEP
98304:i1EB4Av3kOW561R4+8QxEmKDxUmEhc0R2lIP9W0uJPg4dWzN/ODIw9AtVje7gQ:EEi4z1R4+LKDPEK0RBFduJ44dWpiHAtM
Malware Config
Signatures
-
resource yara_rule behavioral5/files/0x0006000000016cd2-34.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2460 CLWCP.exe 2744 flasher.exe -
Loads dropped DLL 4 IoCs
pid Process 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe 2592 cmd.exe -
resource yara_rule behavioral5/memory/1808-0-0x0000000000400000-0x0000000001A7B000-memory.dmp upx behavioral5/memory/1808-74-0x0000000000400000-0x0000000001A7B000-memory.dmp upx -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Control Panel\Desktop\Wallpaper = "c:\\covid20\\bg.bmp" CLWCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 WScript.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2592 1808 Covid20.exe 28 PID 1808 wrote to memory of 2592 1808 Covid20.exe 28 PID 1808 wrote to memory of 2592 1808 Covid20.exe 28 PID 1808 wrote to memory of 2592 1808 Covid20.exe 28 PID 2592 wrote to memory of 2460 2592 cmd.exe 30 PID 2592 wrote to memory of 2460 2592 cmd.exe 30 PID 2592 wrote to memory of 2460 2592 cmd.exe 30 PID 2592 wrote to memory of 2460 2592 cmd.exe 30 PID 2592 wrote to memory of 2744 2592 cmd.exe 31 PID 2592 wrote to memory of 2744 2592 cmd.exe 31 PID 2592 wrote to memory of 2744 2592 cmd.exe 31 PID 2592 wrote to memory of 2744 2592 cmd.exe 31 PID 2592 wrote to memory of 2988 2592 cmd.exe 32 PID 2592 wrote to memory of 2988 2592 cmd.exe 32 PID 2592 wrote to memory of 2988 2592 cmd.exe 32 PID 2592 wrote to memory of 2988 2592 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Covid20.exe"C:\Users\Admin\AppData\Local\Temp\Covid20.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5580.tmp\covid.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\5580.tmp\CLWCP.execlwcp c:\covid20\bg.bmp3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\5580.tmp\flasher.exeflasher 5 c:\covid20\covid.bmp3⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\5580.tmp\corona.vbs"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.3MB
MD51fcc89e66a32278ad6a9ea4a0eb18469
SHA13abb195502e5ec1f12cd0bfb2167646aa91411f4
SHA256f76f7ab0aa22e274354577c9e7744df91c21fa110e2b7625235e095b33b68d1f
SHA512fe0f32f12ff35d6310fd01929c465e84d109b23bbddb607ea4675af05e77231f05d6b4a601f60f861a5988a7f47a09ba8cf374ee307e19e1cac4a2819c3d68b5
-
Filesize
130B
MD5e61624dced063c4ba5352bf487f12410
SHA140bd08928900cd97f444ffaa78d93dcaf913b274
SHA25682ac48c4f7edbab182aa0a8c320d5616ccdd2f0e83dc733b91e45521f85462a3
SHA5122a27db12d2af35e7b51a307eb8860800075867922d3d63a69da608c96bec045f3c64ac757674d2a40d7f4d9e55179fc2bddc17691919e18e109a5d4669c607ac
-
Filesize
445B
MD5b08e02e536917f897acb2d21f42f0a97
SHA1a078f1addfd3eeb0f0cb5fd206ff78e9dc0f3e45
SHA2562c68caeada2c251c5fc12694b7288a5790114ced4142867179e75d313efaa50c
SHA5121d1901c3c676bb6d99a39d1a0bab1a6ee378090390bb5e7fe66cf754b8dd772ac0b79ba1215fa758445db1deac200afcc5e1e1e32b2562df946c82b530ca95ab
-
Filesize
147KB
MD5738bbd119d8877f8342e1ff00fe60dff
SHA1fc11d85e3c5b46bd877e06985fec1a601ce396ed
SHA256548c9e22a04650efec06a0414d205d24600e08e0fac1beed7e8b4c03730962bb
SHA512f7a12c9a1403c9a1953387c5871d6e7865ba80c405f37c51f5c3e093bab9235b8a8ba62ad8b27f2079407e9672d47ac365c9cb08033ef349bd8c9906a30fefad
-
Filesize
4.3MB
MD5031b9587b8023e0d9e395ce00f5a60eb
SHA1d1768d8325af1e9f7f49af2e92332c1d0352ea67
SHA2567008dfc20a7ea78f9f7b004fdb87b2c875dd7dcb4466cf6911908cbc32b5a735
SHA512138190471d0e3e24014b4925c0566bb849e9d2a73eeda1ff9227909b174b7ded7aaaab4f86c94acbab181d8c8842ed75b8279426ad172591001e14e15fb801d7
-
Filesize
505KB
MD5e62ee6f1efc85cb36d62ab779db6e4ec
SHA1da07ec94cf2cb2b430e15bd0c5084996a47ee649
SHA25613b4ec59785a1b367efb691a3d5c86eb5aaf1ca0062521c4782e1baac6633f8a
SHA5128142086979ec1ca9675418e94326a40078400aff8587fc613e17164e034badd828e9615589e6cb8b9339da7cdc9bcb8c48e0890c5f288068f4b86ff659670a69
-
Filesize
246KB
MD59254ca1da9ff8ad492ca5fa06ca181c6
SHA170fa62e6232eae52467d29cf1c1dacb8a7aeab90
SHA25630676ad5dc94c3fec3d77d87439b2bf0a1aaa7f01900b68002a06f11caee9ce6
SHA512a84fbbdea4e743f3e41878b9cf6db219778f1479aa478100718af9fc8d7620fc7a3295507e11df39c7863cb896f946514e50368db480796b6603c8de5580685a