Overview
overview
7Static
static
7Keygen.exe
windows7-x64
7Keygen.exe
windows10-2004-x64
7WinHex.exe
windows7-x64
6WinHex.exe
windows10-2004-x64
6dialogs.dll
windows7-x64
1dialogs.dll
windows10-2004-x64
1external.dll
windows7-x64
1external.dll
windows10-2004-x64
1psapi.dll
windows7-x64
1psapi.dll
windows10-2004-x64
1setup.exe
windows7-x64
7setup.exe
windows10-2004-x64
7zlib1.dll
windows7-x64
3zlib1.dll
windows10-2004-x64
3安装说明.url
windows7-x64
1安装说明.url
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 01:40
Behavioral task
behavioral1
Sample
Keygen.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Keygen.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
WinHex.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
WinHex.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
dialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
dialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
external.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
external.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
psapi.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
psapi.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
zlib1.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
zlib1.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
安装说明.url
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
安装说明.url
Resource
win10v2004-20240709-en
General
-
Target
WinHex.exe
-
Size
1.4MB
-
MD5
0bc48abad1ce6dc97a649e42f31d668f
-
SHA1
66b405640d43de81951e6202c2d7c239949ed6a6
-
SHA256
8fb578ca01388b5e2d6749418ee072d1b52a7c03e0aebcf0265f88f74d68e138
-
SHA512
a5f4ddfa5d9123b9705b77b8ca801e72bcadf30a6e8c380284f4ab5357ad02c88a31471e8c09b469d70d2158861cc793fb2c91303f183779727c5bb63bfed19d
-
SSDEEP
24576:3AmWVRjgsSykFQtV7GF/1JmbxEzl3trUuzOsGfO5hdOhPhvd9lWhM5GUMn0Tjl:qttV7m/Lm8tHMO5o5dzwUlTjl
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: WinHex.exe File opened (read-only) \??\Z: WinHex.exe File opened (read-only) \??\W: WinHex.exe File opened (read-only) \??\Q: WinHex.exe File opened (read-only) \??\P: WinHex.exe File opened (read-only) \??\K: WinHex.exe File opened (read-only) \??\V: WinHex.exe File opened (read-only) \??\O: WinHex.exe File opened (read-only) \??\J: WinHex.exe File opened (read-only) \??\G: WinHex.exe File opened (read-only) \??\E: WinHex.exe File opened (read-only) \??\Y: WinHex.exe File opened (read-only) \??\U: WinHex.exe File opened (read-only) \??\T: WinHex.exe File opened (read-only) \??\N: WinHex.exe File opened (read-only) \??\L: WinHex.exe File opened (read-only) \??\X: WinHex.exe File opened (read-only) \??\S: WinHex.exe File opened (read-only) \??\R: WinHex.exe File opened (read-only) \??\M: WinHex.exe File opened (read-only) \??\H: WinHex.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main helppane.exe -
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.whs\ = "WHSFile" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell\\Command WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\shell WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\ = "X-Ways Forensics Case File" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\DefaultIcon WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\shell\Open\Command WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\ WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\shell\Open\Command WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\" \"%1\"" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\shell\Open WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\" \"%1\"" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.whs WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\ WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.whx WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\shell WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\",3" WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell\Command\ = "notepad.exe \"%1\"" WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xfc\ = "XFCFile" WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\XFCFile\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\",0" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell\Open\Command WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\",0" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell\Open WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.whx\ = "WHXFile" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\DefaultIcon WinHex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\winhex.exe\" \"%1\"" WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHSFile\DefaultIcon WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WHXFile\shell\Open WinHex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xfc WinHex.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2720 helppane.exe Token: SeTakeOwnershipPrivilege 2720 helppane.exe Token: SeTakeOwnershipPrivilege 2720 helppane.exe Token: SeTakeOwnershipPrivilege 2720 helppane.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 helppane.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2292 WinHex.exe 2720 helppane.exe 2720 helppane.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30 PID 2292 wrote to memory of 2832 2292 WinHex.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinHex.exe"C:\Users\Admin\AppData\Local\Temp\WinHex.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\winhlp32.exewinhlp32.exe -x2⤵PID:2832
-
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2720