Overview
overview
10Static
static
101acfdefd7d...c4.exe
windows7-x64
101acfdefd7d...c4.exe
windows10-2004-x64
1020de026bf4...60.exe
windows7-x64
1020de026bf4...60.exe
windows10-2004-x64
10353b1a5ced...52.exe
windows7-x64
10353b1a5ced...52.exe
windows10-2004-x64
1037a4514026...30.exe
windows7-x64
1037a4514026...30.exe
windows10-2004-x64
1060121ea2ab...3e.exe
windows7-x64
1060121ea2ab...3e.exe
windows10-2004-x64
96ac062d21f...22.exe
windows7-x64
106ac062d21f...22.exe
windows10-2004-x64
76db9f96b1c...da.exe
windows7-x64
106db9f96b1c...da.exe
windows10-2004-x64
1071f510c40f...cf.exe
windows7-x64
1071f510c40f...cf.exe
windows10-2004-x64
1074e40db78f...83.exe
windows7-x64
1074e40db78f...83.exe
windows10-2004-x64
108245c3b357...fe.exe
windows7-x64
108245c3b357...fe.exe
windows10-2004-x64
1099829d5483...fd.exe
windows7-x64
799829d5483...fd.exe
windows10-2004-x64
79d07b89cd6...7e.exe
windows7-x64
109d07b89cd6...7e.exe
windows10-2004-x64
10b8665cf00d...53.exe
windows7-x64
10b8665cf00d...53.exe
windows10-2004-x64
10ce7606cfdf...c3.exe
windows7-x64
10ce7606cfdf...c3.exe
windows10-2004-x64
10da4a56f9db...1a.exe
windows7-x64
10da4a56f9db...1a.exe
windows10-2004-x64
10f1ee32e471...c2.exe
windows7-x64
10f1ee32e471...c2.exe
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 23:05
Behavioral task
behavioral1
Sample
1acfdefd7d823688159e6369f5f32ec4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1acfdefd7d823688159e6369f5f32ec4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
20de026bf4998364c894a00f7a97df60.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
20de026bf4998364c894a00f7a97df60.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
353b1a5ced1e9c3341cf45160576b852.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
353b1a5ced1e9c3341cf45160576b852.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
37a4514026f67eeebd5a8f6786a92e30.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
37a4514026f67eeebd5a8f6786a92e30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
60121ea2ab380455f7e143cd9438443e.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
60121ea2ab380455f7e143cd9438443e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
6ac062d21f08f139d9f3d1e335e72e22.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
6ac062d21f08f139d9f3d1e335e72e22.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6db9f96b1c56bcb56bc88904683465da.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
6db9f96b1c56bcb56bc88904683465da.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
71f510c40fe511bbc6296101698124cf.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
71f510c40fe511bbc6296101698124cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
74e40db78ff482c904336c92e5702683.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
74e40db78ff482c904336c92e5702683.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
8245c3b357c4dfcce7e058464c58c5fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
8245c3b357c4dfcce7e058464c58c5fe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
99829d5483ef57c05af928322bd5d6fd.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
99829d5483ef57c05af928322bd5d6fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
9d07b89cd606bf2379ecc25fd4a4667e.exe
Resource
win7-20240215-en
Behavioral task
behavioral24
Sample
9d07b89cd606bf2379ecc25fd4a4667e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
b8665cf00d32352ee83ceb189595a753.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b8665cf00d32352ee83ceb189595a753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
ce7606cfdfc05f9d4b336df2c78a46c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
ce7606cfdfc05f9d4b336df2c78a46c3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
da4a56f9db3ccef32e88ad2e5c616a1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
da4a56f9db3ccef32e88ad2e5c616a1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
f1ee32e471a4581b7274c00459397cc2.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
f1ee32e471a4581b7274c00459397cc2.exe
Resource
win10v2004-20240508-en
General
-
Target
60121ea2ab380455f7e143cd9438443e.exe
-
Size
98KB
-
MD5
60121ea2ab380455f7e143cd9438443e
-
SHA1
091fd74c5caebd9f53c34781ad6b0241883fe698
-
SHA256
b8f7c90cd170ba8c79c472997c17509e2d241a54a9cef7efea4dac23b043afe8
-
SHA512
3f42a0756999d6441721f8d4663c8af677c895c4e11ddff25d7a1216b3b4a015b7d3763c0e06f616f73eb5e9df3b42e07baf8d5ec910632f3e275c8d2fd388e6
-
SSDEEP
1536:AnTUL9I230W6mN+ZGCHMNzKR1iFAGGR10p67LsJmFMbchiRO1mbF8VrdCKcl:skC2++p6/PMbcskdhY
Malware Config
Extracted
C:\PerfLogs\# How to Decrypt Files-V5G6N.html
Signatures
-
Clears Windows event logs 1 TTPs 3 IoCs
Processes:
wevtutil.exewevtutil.exewevtutil.exepid process 3028 wevtutil.exe 2604 wevtutil.exe 2164 wevtutil.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1824 cmd.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ipinfo.io 8 ipinfo.io 9 ipinfo.io 10 ipinfo.io 4 ipinfo.io 5 ipinfo.io 6 ipinfo.io -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2CEA.tmp.bmp" 60121ea2ab380455f7e143cd9438443e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 60121ea2ab380455f7e143cd9438443e.exe -
Drops file in Program Files directory 2 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exedescription ioc process File created C:\Program Files\Touch 60121ea2ab380455f7e143cd9438443e.exe File created C:\Program Files (x86)\Touch 60121ea2ab380455f7e143cd9438443e.exe -
Drops file in Windows directory 1 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exedescription ioc process File created C:\Windows\Touch 60121ea2ab380455f7e143cd9438443e.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Modifies Control Panel 2 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\TileWallpaper = "0" 60121ea2ab380455f7e143cd9438443e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\Desktop\WallpaperStyle = "2" 60121ea2ab380455f7e143cd9438443e.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exetasklist.exepid process 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 1652 60121ea2ab380455f7e143cd9438443e.exe 2592 tasklist.exe 2592 tasklist.exe 1652 60121ea2ab380455f7e143cd9438443e.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.exewevtutil.exewevtutil.exewevtutil.exetasklist.exedescription pid process Token: SeDebugPrivilege 1652 60121ea2ab380455f7e143cd9438443e.exe Token: SeSecurityPrivilege 2164 wevtutil.exe Token: SeBackupPrivilege 2164 wevtutil.exe Token: SeSecurityPrivilege 3028 wevtutil.exe Token: SeBackupPrivilege 3028 wevtutil.exe Token: SeSecurityPrivilege 2604 wevtutil.exe Token: SeBackupPrivilege 2604 wevtutil.exe Token: SeDebugPrivilege 2592 tasklist.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
60121ea2ab380455f7e143cd9438443e.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1652 wrote to memory of 940 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 940 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 940 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 940 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 940 wrote to memory of 2164 940 cmd.exe wevtutil.exe PID 940 wrote to memory of 2164 940 cmd.exe wevtutil.exe PID 940 wrote to memory of 2164 940 cmd.exe wevtutil.exe PID 940 wrote to memory of 2164 940 cmd.exe wevtutil.exe PID 1652 wrote to memory of 2168 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2168 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2168 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2168 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 2168 wrote to memory of 3028 2168 cmd.exe wevtutil.exe PID 2168 wrote to memory of 3028 2168 cmd.exe wevtutil.exe PID 2168 wrote to memory of 3028 2168 cmd.exe wevtutil.exe PID 2168 wrote to memory of 3028 2168 cmd.exe wevtutil.exe PID 1652 wrote to memory of 884 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 884 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 884 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 884 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 884 wrote to memory of 2604 884 cmd.exe wevtutil.exe PID 884 wrote to memory of 2604 884 cmd.exe wevtutil.exe PID 884 wrote to memory of 2604 884 cmd.exe wevtutil.exe PID 884 wrote to memory of 2604 884 cmd.exe wevtutil.exe PID 1652 wrote to memory of 2664 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2664 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2664 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2664 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 2664 wrote to memory of 2692 2664 cmd.exe sc.exe PID 2664 wrote to memory of 2692 2664 cmd.exe sc.exe PID 2664 wrote to memory of 2692 2664 cmd.exe sc.exe PID 2664 wrote to memory of 2692 2664 cmd.exe sc.exe PID 1652 wrote to memory of 2696 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2696 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2696 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2696 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2564 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2564 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2564 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 2564 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 2564 wrote to memory of 2724 2564 cmd.exe reg.exe PID 2564 wrote to memory of 2724 2564 cmd.exe reg.exe PID 2564 wrote to memory of 2724 2564 cmd.exe reg.exe PID 2564 wrote to memory of 2724 2564 cmd.exe reg.exe PID 1652 wrote to memory of 2592 1652 60121ea2ab380455f7e143cd9438443e.exe tasklist.exe PID 1652 wrote to memory of 2592 1652 60121ea2ab380455f7e143cd9438443e.exe tasklist.exe PID 1652 wrote to memory of 2592 1652 60121ea2ab380455f7e143cd9438443e.exe tasklist.exe PID 1652 wrote to memory of 2592 1652 60121ea2ab380455f7e143cd9438443e.exe tasklist.exe PID 1652 wrote to memory of 1824 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 1824 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 1824 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1652 wrote to memory of 1824 1652 60121ea2ab380455f7e143cd9438443e.exe cmd.exe PID 1824 wrote to memory of 1340 1824 cmd.exe PING.EXE PID 1824 wrote to memory of 1340 1824 cmd.exe PING.EXE PID 1824 wrote to memory of 1340 1824 cmd.exe PING.EXE PID 1824 wrote to memory of 1340 1824 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\60121ea2ab380455f7e143cd9438443e.exe"C:\Users\Admin\AppData\Local\Temp\60121ea2ab380455f7e143cd9438443e.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C wevtutil.exe clear-log Application2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C wevtutil.exe clear-log Security2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log Security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C wevtutil.exe clear-log System2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe clear-log System3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C sc config eventlog start=disabled2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\sc.exesc config eventlog start=disabled3⤵
- Launches sc.exe
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" sc stop eventlog2⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C REG add "HKLM\SYSTEM\CurrentControlSet\services\eventlog" / v Start / t REG_DWORD / d 4 / f2⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\reg.exeREG add "HKLM\SYSTEM\CurrentControlSet\services\eventlog" / v Start / t REG_DWORD / d 4 / f3⤵PID:2724
-
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist" /V /FO CSV2⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 127.0.0.1 -n 3 > NUL&&del /Q /F /S "C:\Users\Admin\AppData\Local\Temp\60121ea2ab380455f7e143cd9438443e.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD59cd7bafc81fd809e6db5810f160d74f8
SHA19c1fd42e3aac53609bd802cd470c48162de13e7d
SHA2563516c1f5d2e16993819c26ae1fefefb569ed213ecaedb41a2d32604feb754f14
SHA512a34ce3f073526297686c12e52ab79086e47048ca8594d4c32a239ba87b56e88ebc639c0ada7a6ab25a42b666b4ff4d3a64bea31ebef2c8c5a471a19d4665f067