Analysis

  • max time kernel
    66s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2024 14:06

Errors

Reason
Machine shutdown

General

  • Target

    WellPlayed.exe

  • Size

    145KB

  • MD5

    337559ae1b02b42586781787918b4b6c

  • SHA1

    114577ce6270fde6ed9dbc782484bfa36766baed

  • SHA256

    c394e1673274a8d0861ed637c425de244ead5f8ffbc7cb84862d9b81ec884505

  • SHA512

    8f6a3ed66d74a3950c78b24c8617714697ba8f3eea8ff75ba74206a2ee814212389d50d2824cdf96311774f16730429e4bae28b9c59b97dd0baf4e20dc73189f

  • SSDEEP

    3072:uqJogYkcSNm9V7D/Lwi7Z2ncxMN9vMWT:uq2kc4m9tDTwi7Z2cF

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WellPlayed.exe
    "C:\Users\Admin\AppData\Local\Temp\WellPlayed.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\ProgramData\A064.tmp
      "C:\ProgramData\A064.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      PID:1476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\AAAAAAAAAAA

    Filesize

    129B

    MD5

    9036e828be9c0af2cc9738a7efb30b01

    SHA1

    1c4dfb0517740a48b5789389238f3a077feb60c2

    SHA256

    9007504c88c3cd3cf27c753b08ac3b4941981da6d6e83c785cc5f6419c004bf8

    SHA512

    b0386244588938ab3f4bfc15796560877449f961dbb2a77cbafbc082bf072f9ad98cb1e86f56abde4e9ea8dd8a067f640df485bd0f467f98d20420d2ae5bad2a

  • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDD

    Filesize

    145KB

    MD5

    13c5928712a495d0f6e703aecead2a9e

    SHA1

    cbcebb8bfe118ca2b495f5a13185214acdd96bff

    SHA256

    d818526ecbcb74cadf331d42466e4a71455334e0a47cd13b1ca4f399c3f1ba18

    SHA512

    04d0d3369d110631a7bf2528ef6b8c29bce0dc77bfa11158eb684c5863be090a1b605674e1ae750e5fd90faf24857509d1f5ffd02b3f8b3d4afdcef4adcc88be

  • C:\txdM9F1WD.README.txt

    Filesize

    27B

    MD5

    734928ecdc131bc5f8de15316a4a3c36

    SHA1

    99f69f63b39bc26bab9e3a88a37e5eca67aff5c8

    SHA256

    5778fea386e2432c9d30e0a22ad06a4021462d6688c3dd2bf19e7a0206049fd5

    SHA512

    e0490bc9cb7cb18c99824eaf8aa37ee10be841245a3aa03f227d80dfd63ab125d025de6d9374883707a0ce60dc6e85079ada0bd1a22121ed9e9c75836fcf979d

  • F:\$RECYCLE.BIN\S-1-5-21-3434294380-2554721341-1919518612-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    c1422c347a57f3b5d4f28f70056550a1

    SHA1

    4a38ad4e40f601e7b8a21c5a02b48f61c7d2083d

    SHA256

    a555d20029717af55c83dd3a23845fc4b8bf9a5ce1c835e0aca9abdf3c6d5f68

    SHA512

    4d355007a688e5379d9aba83cb724fc6d72148dc612e0209228e75be780989a34a93c1684b8056c6ee446ef07b8d6c4710995c5cd196714f1424ae5d9aa0b198

  • \ProgramData\A064.tmp

    Filesize

    14KB

    MD5

    294e9f64cb1642dd89229fff0592856b

    SHA1

    97b148c27f3da29ba7b18d6aee8a0db9102f47c9

    SHA256

    917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

    SHA512

    b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

  • memory/1476-871-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

  • memory/1476-873-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/1476-902-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2724-0-0x0000000002060000-0x00000000020A0000-memory.dmp

    Filesize

    256KB