Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 00:39

General

  • Target

    98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe

  • Size

    262KB

  • MD5

    d91a607df4a30a22d89c4d305cb0d7b3

  • SHA1

    bc0a75faf4d36a2cfae9299fb21ed4ab1eba2acc

  • SHA256

    98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347

  • SHA512

    6c7e8f295026bab53dae095a36ba40236af2b25a78139e2cd12d3a77eb8513749578fce23dff0ace8ba6a7556e9e6e6d8a5f188ac7062d69a08bc27f2e6b22a7

  • SSDEEP

    6144:sdZUUZyznmkyANv494D83X5Dw0jUVOv0KEEMHHEMHk:qaUZ+nmkyANv494D83XE8nMEME

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe
    "C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Roaming\Wallpapers.exe
      "C:\Users\Admin\AppData\Roaming\Wallpapers.exe" C:\Users\Admin\AppData\Local\Temp\98fe47367996997628403d1beb7edc60a2bf1456b4e57f4a9afc5cb5d3631347.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe
        "C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe
          "C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk2
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe
            "C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk3
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2716
            • C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe
              "C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2624
            • C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe
              "C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2596
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2836
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1028
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1652
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2104
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2232
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2120
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1096
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1640
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1616
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2428
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1724
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1912
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1716
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:640
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2440
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2520
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2452
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2956
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:888
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2292
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1712
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2692
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2552
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2964
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:2184
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:628
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:592
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:856
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f
                7⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                PID:1996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe

          Filesize

          262KB

          MD5

          0bd98fd9b22381219d27e25538eecd5c

          SHA1

          e852ab8636f51e30f208480db9e36378f1c01d46

          SHA256

          589bd5bb5a7bf69cc2408158303cd7d0cc09878e2f5088afeeba83e3d761d9c3

          SHA512

          3199396848b98a61e2051576c1aae2e5141c4cf4ca9d21b1f6e0e30b92809507cfcabca8fa9e2274c4ae368cbedb74fe87d393b0e9163867c9a5e03ccffc6854

        • \Users\Admin\AppData\Roaming\Wallpapers.exe

          Filesize

          262KB

          MD5

          fc227d909016afd06e677400da8531a9

          SHA1

          408f218da4491e64628c73acc12a83128514e3dd

          SHA256

          0867315150c7be1cf3ae0f646691aabb78242a8eb2456e0a705d9e1c5d1d6cc4

          SHA512

          eb6f9e84582b4a3278ab732793bed481c9062e0d60751711e99bca349cc840dd1f9b7ef06d58d032d54f0288cae3833111173e86b9d0215f45ebc85dc4846b4d

        • \Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe

          Filesize

          262KB

          MD5

          66ad67090325a0f3cdf019c600c08a16

          SHA1

          0c28e5c774713357dbc341aa12a383b1e75e4f9c

          SHA256

          fff4bd3b065b01c27d40ce3dc0b745f6da686d8c57725c83417f9335e141d8c8

          SHA512

          ac392a26e8443cb32af93f7ec04a4b74d983895a5aafa3c3f8378cb429397a7008aa0238bb585745cbc4ee819d886ac49d4151c8d977baefe670d5a2bc47fb9a

        • \Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe

          Filesize

          262KB

          MD5

          49040a443e673dbaf8e5c728b88fce11

          SHA1

          efee6be4b19adad43e5bd470c031c225ef86bcb0

          SHA256

          e62e354e7a8a02793629e6e52e49407485a08794594e9dae78b739f591436018

          SHA512

          64db7a5a18dc866debdab206f94a0457e976d23474e772c8e0d7ed638a889f3d606d16b56a5e4fa3c110f6157f3867c383c8f330aaf62ce5a1b49570831b81fa

        • memory/2200-0-0x0000000074641000-0x0000000074642000-memory.dmp

          Filesize

          4KB

        • memory/2200-1-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2200-3-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2200-4-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2200-11-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2760-16-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2760-18-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB

        • memory/2760-27-0x0000000074640000-0x0000000074BEB000-memory.dmp

          Filesize

          5.7MB