Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe
Resource
win10v2004-20240226-en
General
-
Target
f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe
-
Size
352KB
-
MD5
528f6a10f082f1fddd96c1d4f0bfce95
-
SHA1
bf2336177611e605410f61cbbf5a3deb2d186f3e
-
SHA256
f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416
-
SHA512
e013cdfcf443cf174d3b0319b77f989119f2be29b0e14a09022216e410485e909801cc26c07b076ef620444bc987a8ab327165d279a067b53efe24fa66533a66
-
SSDEEP
6144:B/3Uddl5Imn5crCyRKqUeyo3NczQgcTq4jpqMhBrq:B8ddl5Im5cg+yo3a81Hhhq
Malware Config
Extracted
C:\wKTiyscK2.README.txt
14hsKjR7L2KNmPpzeoXtNB8C2AuBL5Ch88
Signatures
-
Renames multiple (348) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 2136 2BD1.tmp -
Executes dropped EXE 1 IoCs
pid Process 2136 2BD1.tmp -
Loads dropped DLL 1 IoCs
pid Process 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\wKTiyscK2.bmp" f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\wKTiyscK2.bmp" f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2136 2BD1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop\WallpaperStyle = "10" f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Desktop f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wKTiyscK2\DefaultIcon\ = "C:\\ProgramData\\wKTiyscK2.ico" f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wKTiyscK2 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wKTiyscK2\ = "wKTiyscK2" f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wKTiyscK2\DefaultIcon f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wKTiyscK2 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp 2136 2BD1.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeDebugPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: 36 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeImpersonatePrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeIncBasePriorityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeIncreaseQuotaPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: 33 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeManageVolumePrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeProfSingleProcessPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeRestorePrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSystemProfilePrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeTakeOwnershipPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeShutdownPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeDebugPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeBackupPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe Token: SeSecurityPrivilege 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2136 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 30 PID 2872 wrote to memory of 2136 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 30 PID 2872 wrote to memory of 2136 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 30 PID 2872 wrote to memory of 2136 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 30 PID 2872 wrote to memory of 2136 2872 f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe 30 PID 2136 wrote to memory of 1424 2136 2BD1.tmp 31 PID 2136 wrote to memory of 1424 2136 2BD1.tmp 31 PID 2136 wrote to memory of 1424 2136 2BD1.tmp 31 PID 2136 wrote to memory of 1424 2136 2BD1.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe"C:\Users\Admin\AppData\Local\Temp\f9b0a14a2070d1aa76598960a7ff4e1da637aa3ac37a73eecfb63bed95a0b416.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\ProgramData\2BD1.tmp"C:\ProgramData\2BD1.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\2BD1.tmp >> NUL3⤵PID:1424
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD508e9926251379271293511799eb87036
SHA129d3061039e4de392f40450c5dd0023be8afa426
SHA256311e2cdbde9a1827649c15da8e2f456c2e1f5ffa73070f36686d4621eea372cb
SHA51227fb886aabca161c29b3b2aaa3aaea92c17db6c4a67b1f44ba9fbceb4f3f0a2f068d321d8b998386a50a822de640a13a4e4ccb287bd71a6b79ba2fc3c7e3a95d
-
C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
Filesize352KB
MD5a4cc7a2a95c4f881954c3780e6699efe
SHA128e58715141ec12edfde7dc0e97cd9b1e874b4a2
SHA2563ce4a5806088774b3f381fbd7071fc46dccc62b8a484001560f39c6f17078c0f
SHA512ef2fe905c83268363c17fda10de88fedee156fd435640d2887cb6f376612cb970623e3907d02048d07e68f8e254a3da180f2935d43e9a667c8c02749e7b8f4d1
-
Filesize
3KB
MD5892efc7e09681c42b36b2fe98c290bb9
SHA1804e40761e6a48268ab4365abb1866a8984ffee7
SHA2562d852c14216da672726944ab517ad206413343af9cbd0cb0e035e0689a3c9362
SHA51283da941bf64a9a4036034d85d0385113ffac517e906ae799fa45a3e15dd32c81120b80db9e1398a93c01d2ed2c8a27e8e6c2832c21bfb1490a3b144c35272218
-
Filesize
129B
MD53654b9196d795120b5d19df920428e8b
SHA10ae7bb85032800db46ebe37473cedc7bea65b005
SHA256166dc51d4cd2022c0750fd4fd0005150497a1d59843deaa9333e1461bdbce143
SHA5125e00274b6e9f0a12b5d3c0f4d0ef27a574f46ae2ee635a35cb55521d593b1f85058b9eae0384747df4b7da16ea8d476e37cd06dbd4f1c96c797a1b107087621e
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf