Resubmissions
08-06-2024 08:50
240608-krvyesae91 1008-05-2024 16:15
240508-tqnx6ach3w 1008-05-2024 16:07
240508-tkr3mafa54 1001-05-2024 18:02
240501-wmf49acg3s 627-04-2024 08:46
240427-kpfeysff8s 1025-04-2024 21:25
240425-z9y55afb7v 1025-04-2024 21:16
240425-z4pphafa97 1025-04-2024 18:27
240425-w3929sde33 1025-04-2024 18:17
240425-ww4a5sdc8x 10Analysis
-
max time kernel
5s -
max time network
5s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
000.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Ana.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
Bad Rabit.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Desktop Puzzle.exe
Resource
win7-20231129-en
Behavioral task
behavioral5
Sample
Memz.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
NoEscape.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
WannaCrypt0r.exe
Resource
win7-20240215-en
Errors
General
-
Target
000.exe
-
Size
6.7MB
-
MD5
f2b7074e1543720a9a98fda660e02688
-
SHA1
1029492c1a12789d8af78d54adcb921e24b9e5ca
-
SHA256
4ea1f2ecf7eb12896f2cbf8683dae8546d2b8dc43cf7710d68ce99e127c0a966
-
SHA512
73f9548633bc38bab64b1dd5a01401ef7f5b139163bdf291cc475dbd2613510c4c5e4d7702ecdfa74b49f3c9eaed37ed23b9d8f0064c66123eb0769c8671c6ff
-
SSDEEP
3072:eaLA1++iCeFj0im6X/AXpT8vVMCcHVcdhghUuz1o9Y:fLJlC6j0CX4XmvWHVcd62uO9
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
000.exedescription ioc process File opened (read-only) \??\I: 000.exe File opened (read-only) \??\J: 000.exe File opened (read-only) \??\K: 000.exe File opened (read-only) \??\R: 000.exe File opened (read-only) \??\Z: 000.exe File opened (read-only) \??\G: 000.exe File opened (read-only) \??\V: 000.exe File opened (read-only) \??\A: 000.exe File opened (read-only) \??\B: 000.exe File opened (read-only) \??\E: 000.exe File opened (read-only) \??\H: 000.exe File opened (read-only) \??\L: 000.exe File opened (read-only) \??\M: 000.exe File opened (read-only) \??\N: 000.exe File opened (read-only) \??\P: 000.exe File opened (read-only) \??\Q: 000.exe File opened (read-only) \??\W: 000.exe File opened (read-only) \??\O: 000.exe File opened (read-only) \??\S: 000.exe File opened (read-only) \??\T: 000.exe File opened (read-only) \??\U: 000.exe File opened (read-only) \??\X: 000.exe File opened (read-only) \??\Y: 000.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
000.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\AutoRestartShell = "0" 000.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
000.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\Wallpaper 000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 2836 taskkill.exe 2648 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
000.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\icon.ico" 000.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exetaskkill.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2648 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe Token: SeIncreaseQuotaPrivilege 2376 WMIC.exe Token: SeSecurityPrivilege 2376 WMIC.exe Token: SeTakeOwnershipPrivilege 2376 WMIC.exe Token: SeLoadDriverPrivilege 2376 WMIC.exe Token: SeSystemProfilePrivilege 2376 WMIC.exe Token: SeSystemtimePrivilege 2376 WMIC.exe Token: SeProfSingleProcessPrivilege 2376 WMIC.exe Token: SeIncBasePriorityPrivilege 2376 WMIC.exe Token: SeCreatePagefilePrivilege 2376 WMIC.exe Token: SeBackupPrivilege 2376 WMIC.exe Token: SeRestorePrivilege 2376 WMIC.exe Token: SeShutdownPrivilege 2376 WMIC.exe Token: SeDebugPrivilege 2376 WMIC.exe Token: SeSystemEnvironmentPrivilege 2376 WMIC.exe Token: SeRemoteShutdownPrivilege 2376 WMIC.exe Token: SeUndockPrivilege 2376 WMIC.exe Token: SeManageVolumePrivilege 2376 WMIC.exe Token: 33 2376 WMIC.exe Token: 34 2376 WMIC.exe Token: 35 2376 WMIC.exe Token: SeIncreaseQuotaPrivilege 2376 WMIC.exe Token: SeSecurityPrivilege 2376 WMIC.exe Token: SeTakeOwnershipPrivilege 2376 WMIC.exe Token: SeLoadDriverPrivilege 2376 WMIC.exe Token: SeSystemProfilePrivilege 2376 WMIC.exe Token: SeSystemtimePrivilege 2376 WMIC.exe Token: SeProfSingleProcessPrivilege 2376 WMIC.exe Token: SeIncBasePriorityPrivilege 2376 WMIC.exe Token: SeCreatePagefilePrivilege 2376 WMIC.exe Token: SeBackupPrivilege 2376 WMIC.exe Token: SeRestorePrivilege 2376 WMIC.exe Token: SeShutdownPrivilege 2376 WMIC.exe Token: SeDebugPrivilege 2376 WMIC.exe Token: SeSystemEnvironmentPrivilege 2376 WMIC.exe Token: SeRemoteShutdownPrivilege 2376 WMIC.exe Token: SeUndockPrivilege 2376 WMIC.exe Token: SeManageVolumePrivilege 2376 WMIC.exe Token: 33 2376 WMIC.exe Token: 34 2376 WMIC.exe Token: 35 2376 WMIC.exe Token: SeIncreaseQuotaPrivilege 2684 WMIC.exe Token: SeSecurityPrivilege 2684 WMIC.exe Token: SeTakeOwnershipPrivilege 2684 WMIC.exe Token: SeLoadDriverPrivilege 2684 WMIC.exe Token: SeSystemProfilePrivilege 2684 WMIC.exe Token: SeSystemtimePrivilege 2684 WMIC.exe Token: SeProfSingleProcessPrivilege 2684 WMIC.exe Token: SeIncBasePriorityPrivilege 2684 WMIC.exe Token: SeCreatePagefilePrivilege 2684 WMIC.exe Token: SeBackupPrivilege 2684 WMIC.exe Token: SeRestorePrivilege 2684 WMIC.exe Token: SeShutdownPrivilege 2684 WMIC.exe Token: SeDebugPrivilege 2684 WMIC.exe Token: SeSystemEnvironmentPrivilege 2684 WMIC.exe Token: SeRemoteShutdownPrivilege 2684 WMIC.exe Token: SeUndockPrivilege 2684 WMIC.exe Token: SeManageVolumePrivilege 2684 WMIC.exe Token: 33 2684 WMIC.exe Token: 34 2684 WMIC.exe Token: 35 2684 WMIC.exe Token: SeIncreaseQuotaPrivilege 2684 WMIC.exe Token: SeSecurityPrivilege 2684 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
000.exepid process 2236 000.exe 2236 000.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
000.execmd.exedescription pid process target process PID 2236 wrote to memory of 3056 2236 000.exe cmd.exe PID 2236 wrote to memory of 3056 2236 000.exe cmd.exe PID 2236 wrote to memory of 3056 2236 000.exe cmd.exe PID 2236 wrote to memory of 3056 2236 000.exe cmd.exe PID 3056 wrote to memory of 2648 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2648 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2648 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2648 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2836 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2836 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2836 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2836 3056 cmd.exe taskkill.exe PID 3056 wrote to memory of 2376 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2376 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2376 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2376 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2684 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2684 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2684 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 2684 3056 cmd.exe WMIC.exe PID 3056 wrote to memory of 948 3056 cmd.exe shutdown.exe PID 3056 wrote to memory of 948 3056 cmd.exe shutdown.exe PID 3056 wrote to memory of 948 3056 cmd.exe shutdown.exe PID 3056 wrote to memory of 948 3056 cmd.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\000.exe"C:\Users\Admin\AppData\Local\Temp\000.exe"1⤵
- Enumerates connected drives
- Modifies WinLogon
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\windl.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' set FullName='UR NEXT'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic useraccount where name='Admin' rename 'UR NEXT'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /f /r /t 03⤵PID:948
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1724
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403B
MD56fbd6ce25307749d6e0a66ebbc0264e7
SHA1faee71e2eac4c03b96aabecde91336a6510fff60
SHA256e152b106733d9263d3cf175f0b6197880d70acb753f8bde8035a3e4865b31690
SHA51235a0d6d91178ec10619cf4d2fd44d3e57aa0266e1779e15b1eef6e9c359c77c384e0ffe4edb2cde980a6847e53f47733e6eacb72d46762066b3541dee3d29064
-
Filesize
76KB
MD59232120b6ff11d48a90069b25aa30abc
SHA197bb45f4076083fca037eee15d001fd284e53e47
SHA25670faa0e1498461731f873d3594f20cbf2beaa6f123a06b66f9df59a9cdf862be
SHA512b06688a9fc0b853d2895f11e812c48d5871f2793183fda5e9638ded22fc5dc1e813f174baedc980a1f0b6a7b0a65cd61f29bb16acc6dd45da62988eb012d6877
-
Filesize
396B
MD59037ebf0a18a1c17537832bc73739109
SHA11d951dedfa4c172a1aa1aae096cfb576c1fb1d60
SHA25638c889b5d7bdcb79bbcb55554c520a9ce74b5bfc29c19d1e4cb1419176c99f48
SHA5124fb5c06089524c6dcd48b6d165cedb488e9efe2d27613289ef8834dbb6c010632d2bd5e3ac75f83b1d8024477ebdf05b9e0809602bbe1780528947c36e4de32f
-
Filesize
81KB
MD5d2774b188ab5dde3e2df5033a676a0b4
SHA16e8f668cba211f1c3303e4947676f2fc9e4a1bcc
SHA25695374cf300097872a546d89306374e7cf2676f7a8b4c70274245d2dccfc79443
SHA5123047a831ed9c8690b00763061807e98e15e9534ebc9499e3e5abb938199f9716c0e24a83a13291a8fd5b91a6598aeeef377d6793f6461fc0247ec4bbd901a131
-
Filesize
771B
MD5a9401e260d9856d1134692759d636e92
SHA14141d3c60173741e14f36dfe41588bb2716d2867
SHA256b551fba71dfd526d4916ae277d8686d83fff36d22fcf6f18457924a070b30ef7
SHA5125cbe38cdab0283b87d9a9875f7ba6fa4e8a7673d933ca05deddddbcf6cf793bd1bf34ac0add798b4ed59ab483e49f433ce4012f571a658bc0add28dd987a57b6