Overview
overview
10Static
static
3wufuc_v1.0...d4.zip
windows7-x64
1wufuc/COPYING.txt
windows7-x64
1wufuc/Donate.url
windows7-x64
6wufuc/Help...se.url
windows7-x64
1wufuc/Help...ue.url
windows7-x64
1wufuc/Rest...rv.reg
windows7-x64
10wufuc/inst...uc.bat
windows7-x64
1wufuc/unin...uc.bat
windows7-x64
1wufuc/version.txt
windows7-x64
1wufuc/wufu...ub.url
windows7-x64
1wufuc/wufuc32.dll
windows7-x64
1wufuc/wufuc64.dll
windows7-x64
1wufuc/wufu...sk.xml
windows7-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
wufuc_v1.0.1.201-a52637d4.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
wufuc/COPYING.txt
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
wufuc/Donate.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
wufuc/Help and Support/Latest release.url
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
wufuc/Help and Support/Report an issue.url
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
wufuc/Restore_wuauserv.reg
Resource
win7-20240215-en
Behavioral task
behavioral7
Sample
wufuc/install_wufuc.bat
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
wufuc/uninstall_wufuc.bat
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
wufuc/version.txt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
wufuc/wufuc on GitHub.url
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
wufuc/wufuc32.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
wufuc/wufuc64.dll
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
wufuc/wufuc_ScheduledTask.xml
Resource
win7-20231129-en
General
-
Target
wufuc/uninstall_wufuc.bat
-
Size
743B
-
MD5
1997ce4faa7ba7034aeb39520e385ae8
-
SHA1
f684e417881098ddc7840691fea3ec0af47c974a
-
SHA256
d37252527c2a8b33bf0d7b26ca0caad2c255dbbdaf41685abb7f7a2bee2b0224
-
SHA512
e637f2878b59f063e3745e5d31594f3fba2d40d5df84f1cea6b56b0496ab2e548148617787ac3587ed74430d77504f6703bd9c20261ff31ea76d2e2c02dafa37
Malware Config
Signatures
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 1964 wrote to memory of 972 1964 cmd.exe fltMC.exe PID 1964 wrote to memory of 972 1964 cmd.exe fltMC.exe PID 1964 wrote to memory of 972 1964 cmd.exe fltMC.exe PID 1964 wrote to memory of 2028 1964 cmd.exe cmd.exe PID 1964 wrote to memory of 2028 1964 cmd.exe cmd.exe PID 1964 wrote to memory of 2028 1964 cmd.exe cmd.exe PID 1964 wrote to memory of 2184 1964 cmd.exe findstr.exe PID 1964 wrote to memory of 2184 1964 cmd.exe findstr.exe PID 1964 wrote to memory of 2184 1964 cmd.exe findstr.exe PID 1964 wrote to memory of 2864 1964 cmd.exe sfc.exe PID 1964 wrote to memory of 2864 1964 cmd.exe sfc.exe PID 1964 wrote to memory of 2864 1964 cmd.exe sfc.exe PID 1964 wrote to memory of 1696 1964 cmd.exe net.exe PID 1964 wrote to memory of 1696 1964 cmd.exe net.exe PID 1964 wrote to memory of 1696 1964 cmd.exe net.exe PID 1696 wrote to memory of 2372 1696 net.exe net1.exe PID 1696 wrote to memory of 2372 1696 net.exe net1.exe PID 1696 wrote to memory of 2372 1696 net.exe net1.exe PID 1964 wrote to memory of 1636 1964 cmd.exe schtasks.exe PID 1964 wrote to memory of 1636 1964 cmd.exe schtasks.exe PID 1964 wrote to memory of 1636 1964 cmd.exe schtasks.exe PID 1964 wrote to memory of 1596 1964 cmd.exe rundll32.exe PID 1964 wrote to memory of 1596 1964 cmd.exe rundll32.exe PID 1964 wrote to memory of 1596 1964 cmd.exe rundll32.exe PID 1964 wrote to memory of 2156 1964 cmd.exe reg.exe PID 1964 wrote to memory of 2156 1964 cmd.exe reg.exe PID 1964 wrote to memory of 2156 1964 cmd.exe reg.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\wufuc\uninstall_wufuc.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\fltMC.exefltmc2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver "2⤵
-
C:\Windows\system32\findstr.exefindstr " 6\.1\."2⤵
-
C:\Windows\system32\sfc.exesfc /SCANFILE="C:\Windows\System32\wuaueng.dll"2⤵
-
C:\Windows\system32\net.exenet start Schedule2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start Schedule3⤵
-
C:\Windows\system32\schtasks.exeschtasks /Delete /TN "wufuc.{72EEE38B-9997-42BD-85D3-2DD96DA17307}" /F2⤵
-
C:\Windows\system32\rundll32.exerundll32 "C:\Users\Admin\AppData\Local\Temp\wufuc\wufuc64.dll",RUNDLL32_Unload2⤵
-
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\svchost.exe"2⤵