Overview
overview
7Static
static
7PluginsAnd...m1.vbs
windows7-x64
1PluginsAnd...m1.vbs
windows10-2004-x64
1PluginsAnd...m1.vbs
windows7-x64
1PluginsAnd...m1.vbs
windows10-2004-x64
1PluginsAnd...m1.vbs
windows7-x64
1PluginsAnd...m1.vbs
windows10-2004-x64
1PluginsAnd...m1.vbs
windows7-x64
1PluginsAnd...m1.vbs
windows10-2004-x64
1PluginsAnd...ug.dll
windows7-x64
1PluginsAnd...ug.dll
windows10-2004-x64
1RestoreSettings.bat
windows7-x64
1RestoreSettings.bat
windows10-2004-x64
1SaveSettings.bat
windows7-x64
1SaveSettings.bat
windows10-2004-x64
1WinOrganizer.chm
windows7-x64
1WinOrganizer.chm
windows10-2004-x64
1WinOrganizer.exe
windows7-x64
6WinOrganizer.exe
windows10-2004-x64
3安装说明.url
windows7-x64
1安装说明.url
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 06:57
Behavioral task
behavioral1
Sample
PluginsAndCOM/COM-Interface/VB5/0-AppVersion/Form1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PluginsAndCOM/COM-Interface/VB5/0-AppVersion/Form1.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
PluginsAndCOM/COM-Interface/VB5/1-Files/Form1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
PluginsAndCOM/COM-Interface/VB5/1-Files/Form1.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
PluginsAndCOM/COM-Interface/VB5/2-Nodes/Form1.vbs
Resource
win7-20240319-en
Behavioral task
behavioral6
Sample
PluginsAndCOM/COM-Interface/VB5/2-Nodes/Form1.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
PluginsAndCOM/COM-Interface/VB5/3-Data/Form1.vbs
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
PluginsAndCOM/COM-Interface/VB5/3-Data/Form1.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
PluginsAndCOM/Plugins/Demo/DemoPlug.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
PluginsAndCOM/Plugins/Demo/DemoPlug.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
RestoreSettings.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
RestoreSettings.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
SaveSettings.bat
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
SaveSettings.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
WinOrganizer.chm
Resource
win7-20240215-en
Behavioral task
behavioral16
Sample
WinOrganizer.chm
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
WinOrganizer.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
WinOrganizer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
安装说明.url
Resource
win7-20240319-en
Behavioral task
behavioral20
Sample
安装说明.url
Resource
win10v2004-20240226-en
General
-
Target
WinOrganizer.exe
-
Size
2.9MB
-
MD5
8ec0aef5e8529f44c4a27da7737359ba
-
SHA1
14dcc90c1fd6e2da9051285e75d81172eb84070a
-
SHA256
06c16a5cf9bd5f8e0d3a60993738c332b5f35de26d93aedf4316a873d78cc3af
-
SHA512
11bcd91dcad97ed6dd0887a24e4e3474d27d0605896a2e6f71dd1b3f517933fc5d4874fea97c34781b53b7dfb8bc3ce8bf32ebb43008dd5edbad31bc83f08917
-
SSDEEP
49152:+dMFrLc272i+g78yp1NLSIMg0LuIugLso9xkWCFXMeYhT2A9eH5mnIAB1ZKT:+i9I27mM8ytSIMg06IugLj9sF83ad5mO
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinOrganizer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9E3BFDE4-AE26-4EBB-AEE1-82B138ABFC81}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{427CE812-50EF-440B-9E12-4E4A4D797F13}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7DD99F4-81B9-46FD-9B5E-56C7940C4534}\ProgID\ = "WinOrganizer.DataSet" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FB8497E5-51FD-49B9-8566-2F7989164EDB}\ = "ITableDefs" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CA79EC2-968E-438C-856D-B15839C9E2EC}\TypeLib WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{554C8868-04B9-40C2-9429-1FE0B767D308}\TypeLib WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinOrganizer.DataSet\Clsid\ = "{E7DD99F4-81B9-46FD-9B5E-56C7940C4534}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DBAB12CA-3F7E-4B3C-9140-1C8DA93CFBAA} WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0D4991D8-943E-478F-A8E5-20AAEBC2E3C3}\Version WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0734A43-3C4C-4FE6-428D-5D7C7860ED19}\Programmable\ WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{A3759570-2470-4479-A232-CF6099503645}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A3759570-2470-4479-A232-CF6099503645}\TypeLib WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{935050F1-43E3-4999-B3EC-4F74EBE9873C}\Version\ = "1.0" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0734A43-3C4C-4FE6-428D-5D7C7860ED19}\InprocServer32\ WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FB8497E5-51FD-49B9-8566-2F7989164EDB}\TypeLib WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{935050F1-43E3-4999-B3EC-4F74EBE9873C}\ProgID WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1C6F097-BF99-446F-9F21-445B9D78CA03} WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B543DD96-55C7-40C9-9DE1-D4AF32FE1CE0}\ = "IVBlobStream" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{B543DD96-55C7-40C9-9DE1-D4AF32FE1CE0}\TypeLib\Version = "1.0" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9E3BFDE4-AE26-4EBB-AEE1-82B138ABFC81}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{4CA79EC2-968E-438C-856D-B15839C9E2EC}\ProxyStubClsid32 WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DBAB12CA-3F7E-4B3C-9140-1C8DA93CFBAA}\Version\ = "1.0" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C3B4D9DE-38F7-410E-9FBB-2ADF9E605D51}\TypeLib WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{86DCF08A-ED58-440C-AB37-DA745E23BB71}\ = "IAppEvents" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{427CE812-50EF-440B-9E12-4E4A4D797F13} WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7DD99F4-81B9-46FD-9B5E-56C7940C4534}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinOrganizer.exe" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{029C3716-2795-47D8-AEAA-C17541A41AE3}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinOrganizer.exe" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DBAB12CA-3F7E-4B3C-9140-1C8DA93CFBAA}\Version WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4CEB56B-4542-454F-80A0-F2C561DF6193} WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0CEF3ABA-ED7F-425A-B922-9E92B7ACB54C}\TypeLib WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CA79EC2-968E-438C-856D-B15839C9E2EC}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{935050F1-43E3-4999-B3EC-4F74EBE9873C}\Version WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1C6F097-BF99-446F-9F21-445B9D78CA03}\TypeLib\Version = "1.0" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{554C8868-04B9-40C2-9429-1FE0B767D308}\LocalServer32 WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A0734A43-3C4C-4FE6-428D-5D7C7860ED19}\VersionIndependentProgID WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D26BF7B1-3879-4C05-8704-7CD82F3C1A42} WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0D4991D8-943E-478F-A8E5-20AAEBC2E3C3} WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinOrganizer.VTable\Clsid WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{3A62365C-998A-4670-89DB-5CE0244B25A1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1C6F097-BF99-446F-9F21-445B9D78CA03}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8E4F1987-F34F-4437-A1A7-07DA8D44C762}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinOrganizer.VObject WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D7E8BF14-6927-4EF5-A518-AAE52A2A0718}\Version\ = "1.0" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77ABB053-F022-09A0-38D6-FF604792FD6E}\1.0\FLAGS\ WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E7DD99F4-81B9-46FD-9B5E-56C7940C4534} WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4CA79EC2-968E-438C-856D-B15839C9E2EC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A4ACB66-B9C0-4426-8F5B-EFB57119E12F}\TypeLib WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{77ABB053-F022-09A0-38D6-FF604792FD6E}\1.0\0\win64\ = "C:\\Windows\\SysWow64\\wbem\\Win32_EncryptableVolume.dll" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{46029C52-804D-4326-B73C-06DC12AE1E90}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FB8497E5-51FD-49B9-8566-2F7989164EDB}\ProxyStubClsid32 WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D26BF7B1-3879-4C05-8704-7CD82F3C1A42}\ = "Dlg Object" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D26BF7B1-3879-4C05-8704-7CD82F3C1A42}\TypeLib WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinOrganizer.VIniFile\Clsid WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A4ACB66-B9C0-4426-8F5B-EFB57119E12F}\Version WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4CEB56B-4542-454F-80A0-F2C561DF6193}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5C55BB2-2A46-49A0-B63A-1F9B5C9FD357}\Version WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinOrganizer.TableDef\Clsid\ = "{5A4ACB66-B9C0-4426-8F5B-EFB57119E12F}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D1C6F097-BF99-446F-9F21-445B9D78CA03}\TypeLib\ = "{E1C8B12A-579F-434E-8CDB-183F3FC8D705}" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{73AD04D3-2D63-450B-BB81-430F47D1997B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D27E0201-8005-43B7-83DC-6863F0539E5E}\ProxyStubClsid32 WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{554C8868-04B9-40C2-9429-1FE0B767D308}\ = "RVF Object" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{33120996-4ED6-4D2E-9AC0-C1DC10C6B11D}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinOrganizer.exe" WinOrganizer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A4ACB66-B9C0-4426-8F5B-EFB57119E12F}\ = "TableDef Object" WinOrganizer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1C6F097-BF99-446F-9F21-445B9D78CA03}\TypeLib WinOrganizer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2324 WinOrganizer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2324 WinOrganizer.exe Token: SeIncBasePriorityPrivilege 2324 WinOrganizer.exe Token: 33 2324 WinOrganizer.exe Token: SeIncBasePriorityPrivilege 2324 WinOrganizer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2324 WinOrganizer.exe 2324 WinOrganizer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2324 WinOrganizer.exe 2324 WinOrganizer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 WinOrganizer.exe 2324 WinOrganizer.exe 2324 WinOrganizer.exe 2324 WinOrganizer.exe 2324 WinOrganizer.exe 2324 WinOrganizer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2912 2324 WinOrganizer.exe 28 PID 2324 wrote to memory of 2912 2324 WinOrganizer.exe 28 PID 2324 wrote to memory of 2912 2324 WinOrganizer.exe 28 PID 2324 wrote to memory of 2912 2324 WinOrganizer.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinOrganizer.exe"C:\Users\Admin\AppData\Local\Temp\WinOrganizer.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2912
-