Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe
Resource
win10v2004-20240226-en
General
-
Target
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe
-
Size
212KB
-
MD5
0d4a45dce9816e44827346c0274dac14
-
SHA1
4887801c2741a6905e75fc1acf4282441546378f
-
SHA256
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c
-
SHA512
53c6c7ab56813ff36dd4995a458a7658ace56d19786bec5ac636aaa04296096c579f841cde48568e0105970f7e08707e6577fafb1f551e3309e45c92460273dd
-
SSDEEP
6144:3srM8O2JG4GpRKnvmb7/D26h/xFb8RQF9jwC/tRvPXbyheAg4ZIjJCe5SG:8rM8OUPURKnvmb7/D26xb8RQF9jwC/Tz
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
wuwap.exef905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wuwap.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe -
Executes dropped EXE 1 IoCs
Processes:
wuwap.exepid process 4952 wuwap.exe -
Adds Run key to start application 2 TTPs 51 IoCs
Processes:
wuwap.exef905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /K" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /a" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /l" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /T" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /U" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /N" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /L" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /p" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /X" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /v" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /h" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /g" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /D" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /S" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /z" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /b" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /i" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /V" f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /R" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /E" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /A" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /B" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /y" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /u" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /j" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /J" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /O" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /P" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /V" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /x" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /Y" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /G" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /s" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /e" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /k" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /C" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /t" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /c" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /H" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /I" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /f" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /d" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /w" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /n" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /Q" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /M" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /o" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /q" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /m" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /r" wuwap.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuwap = "C:\\Users\\Admin\\wuwap.exe /Z" wuwap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exewuwap.exepid process 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe 4952 wuwap.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exewuwap.exepid process 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe 4952 wuwap.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exedescription pid process target process PID 3400 wrote to memory of 4952 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe wuwap.exe PID 3400 wrote to memory of 4952 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe wuwap.exe PID 3400 wrote to memory of 4952 3400 f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe wuwap.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe"C:\Users\Admin\AppData\Local\Temp\f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\wuwap.exe"C:\Users\Admin\wuwap.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4032 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5f25826799dce6885b3cce2136ce3516f
SHA1fc7a2b4cbb40e68936f4e3bf78997c0a6562648c
SHA2560e543707104f5a0dd5f0ed84daf6c4bb737f48fe8c7c8418c63d85d532e4ffd2
SHA51272a0129b74176d6f6b414144fa073de21cc0e13bd9281e2216fb9ef270c061edd6cc39395d1ff4ab29e9b115181c443aca1a815022932cc74ef948294a0aa22e