Analysis

  • max time kernel
    1779s
  • max time network
    1461s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 08:37

General

  • Target

    https://archive.org/download/WinXP.Horror.DestructiveCreatedByWobbyChip_201903/WinXP.Horror.Destructive%20%20%28Created%20By%20WobbyChip%29.exe

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://archive.org/download/WinXP.Horror.DestructiveCreatedByWobbyChip_201903/WinXP.Horror.Destructive%20%20%28Created%20By%20WobbyChip%29.exe
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb8b9758,0x7fefb8b9768,0x7fefb8b9778
      2⤵
        PID:2980
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:2
        2⤵
          PID:2732
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
          2⤵
            PID:2724
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
            2⤵
              PID:2784
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:1
              2⤵
                PID:852
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:1
                2⤵
                  PID:3064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1636 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:2
                  2⤵
                    PID:1736
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3660 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                    2⤵
                      PID:1960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3668 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                      2⤵
                        PID:656
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4052 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                        2⤵
                          PID:1720
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3144 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                          2⤵
                            PID:940
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1096 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                            2⤵
                              PID:920
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1864 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                              2⤵
                                PID:1572
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4068 --field-trial-handle=1364,i,9476783799835691394,3535849083507480305,131072 /prefetch:8
                                2⤵
                                  PID:1212
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:1076
                                • C:\Windows\System32\control.exe
                                  "C:\Windows\System32\control.exe" SYSTEM
                                  1⤵
                                    PID:2436
                                  • C:\Windows\SysWOW64\DllHost.exe
                                    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:840
                                  • C:\Windows\system32\SndVol.exe
                                    SndVol.exe -f 45548708 22585
                                    1⤵
                                    • Suspicious use of SendNotifyMessage
                                    PID:1908
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x500
                                    1⤵
                                      PID:2180
                                    • C:\Users\Admin\Downloads\WinXP.Horror.Destructive (Created By WobbyChip).exe
                                      "C:\Users\Admin\Downloads\WinXP.Horror.Destructive (Created By WobbyChip).exe"
                                      1⤵
                                      • Modifies WinLogon for persistence
                                      • UAC bypass
                                      • Disables RegEdit via registry modification
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Writes to the Master Boot Record (MBR)
                                      • System Location Discovery: System Language Discovery
                                      • Modifies Control Panel
                                      • Suspicious behavior: EnumeratesProcesses
                                      • System policy modification
                                      PID:2464
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:2940

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\697c7421-ef9f-4a85-a310-6a0ec273493a.tmp

                                              Filesize

                                              155KB

                                              MD5

                                              4a1a06f236278296db54e76c202c498d

                                              SHA1

                                              54e2cd7b5b3dd880fe9a2fb98b5c66cffeccca84

                                              SHA256

                                              a40f07872dc8490012306f9c15abddf124a127387f447df5fd3621af68c3d295

                                              SHA512

                                              01df2d5d7ab72c111febf69e5195d56b4c518d7f80df46d39f6a22d1a24a6e706a8c9b87e08d94a0780ba6e3ef61db4310c38f578a2e62fc6af80be8fd594eca

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                              Filesize

                                              264KB

                                              MD5

                                              f50f89a0a91564d0b8a211f8921aa7de

                                              SHA1

                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                              SHA256

                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                              SHA512

                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              987B

                                              MD5

                                              b94073a68ac7d8c90bb97e4515727849

                                              SHA1

                                              a2f2157d4b326cd56d6471b48d119c860f09aef1

                                              SHA256

                                              b365f97bd4d382510378a6690253226cbd6d9a917b3b4ea0b9fea1d51b402aa7

                                              SHA512

                                              b0d998041bfa849afae6ee35d846c8d25bf91a5d8974ef662e390f6cc1c4987e6b5604470bc20a00746f8a329fdfbfcdfd827c6bc2b7da22777f2e6fd5d28861

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              0136f61a6dfef550d7cbb9f2b6e1e390

                                              SHA1

                                              37e9f99e98622f42e2aa770bbd58be4b603284da

                                              SHA256

                                              64492f438022ea00aad789b99c8e4f962d50d64c31806aa05152abb965854a7a

                                              SHA512

                                              7ed940bddfec3b670e307e69d313036d4e04ee39a2113fbe1329eba7d29f2b64cc97ca1c9564b0afcb3f65a1d9a3f0c6debea85e8e482b7e6c5627a295d47851

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              02ae019231ce67af7f2c634e18b2b383

                                              SHA1

                                              43d82a5ea120286d75cc2aa706e675dcc917fe2b

                                              SHA256

                                              fd1d0361b38ccb4f5e06e44f7fb5e95ab84a76cf6bfe52ba1bbaec7b3620f415

                                              SHA512

                                              b3556244f9e886ff3fbe4a36b836f3fc8f5a3f389c10e841498fd87c08eab47b023a14c5d69fbac475ce539acca3b0f1df341c898497866e0b3d413e60593745

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              4KB

                                              MD5

                                              f65f623e795d2842b78f3f7a444a0e96

                                              SHA1

                                              8f9547f0abde726e6c89d8147c84b6982ba8b037

                                              SHA256

                                              987d41fdc6b5767cc573dd251bbf6ea1b4903143a8dc5069a6c5f0a15ab982a2

                                              SHA512

                                              8bd1d860cfd8e8464e85224137cabe6fc3506704872af74c08c178a492ba7dcfaf6f520b6915110f1461cc2d04aee1aef413eceb553e922db8277323e7dd431d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                              Filesize

                                              16B

                                              MD5

                                              18e723571b00fb1694a3bad6c78e4054

                                              SHA1

                                              afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                              SHA256

                                              8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                              SHA512

                                              43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ab207649-f53e-4f5b-a6d3-ddc798efc323.tmp

                                              Filesize

                                              4KB

                                              MD5

                                              1074dc4c81f99bb598fbdd5887b254e4

                                              SHA1

                                              7639d1d354af0f8933681b684fce1d64014de66d

                                              SHA256

                                              1974dbe01e288562f8b5a680de15d3d8dca47a4945a65183458d6b91349e6acb

                                              SHA512

                                              67da0e003f4eabfa14ddf1d2f11f6fa95b5d609f263f0866e1bba9ba805efee7051a2d1daf02ab769e9d1f2d049ba4ee3c3cdf52c36af759117cc95bfd17c9a6

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              155KB

                                              MD5

                                              7454dda433a33d62418ca8c346e3c024

                                              SHA1

                                              2e255acb3271f56c7b755fab0f0f884b66975602

                                              SHA256

                                              e11df009cc95e63b12e1f957aa0f51a42a44bceb53eeebf2cbffb5c3e798b972

                                              SHA512

                                              89fb957969747d28034b725887b6137dc5ec63879449ae05684bada6f8af69de044e36d3b5b7df826728af22553c146a1ec0fe198bb6e513b471d15dadab3baa

                                            • C:\Users\Admin\AppData\Local\Temp\CabC554.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • memory/2464-253-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-264-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-235-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-242-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-243-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-244-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-245-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-249-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-250-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-251-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-252-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-233-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-255-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-256-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-258-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-261-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-263-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-234-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-266-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-269-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-272-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-275-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-277-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-278-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-280-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-282-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-285-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-287-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-288-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-290-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-291-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-293-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-294-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB

                                            • memory/2464-297-0x0000000000400000-0x0000000003DF3000-memory.dmp

                                              Filesize

                                              57.9MB