Analysis

  • max time kernel
    122s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 01:39

General

  • Target

    PTOTAC_WINCASIHD_17.50.58.exe

  • Size

    45.9MB

  • MD5

    cfd4bc5b3adfdb2716cc92f2d8a49784

  • SHA1

    e3b777de2f0201155bac46c4a168a2aa787e72bb

  • SHA256

    676aea942a11ce91bc29388ca949fd2201682b63c13cf33327421d980e586e49

  • SHA512

    28be60febf0ea1d2fee656a80bbcdba2a5871244984cf81f243e3467481ba59db09f61c4ebba36c8d59c74ef524575831b72082eacf1988c15e1a0f6b46a31aa

  • SSDEEP

    786432:8s4bQrCDby1pmxJ7hUwT0UVnnewa+tr2EKYknaKkwpleuvAyPBC3srYpJmGLrkoU:sGD1pmPAUVnnlpxmhdkw/cJmW/H0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PTOTAC_WINCASIHD_17.50.58.exe
    "C:\Users\Admin\AppData\Local\Temp\PTOTAC_WINCASIHD_17.50.58.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\is-QC1RR.tmp\PTOTAC_WINCASIHD_17.50.58.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QC1RR.tmp\PTOTAC_WINCASIHD_17.50.58.tmp" /SL5="$40108,47266724,1090560,C:\Users\Admin\AppData\Local\Temp\PTOTAC_WINCASIHD_17.50.58.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:2760
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7D557A89-51D2-4999-BB8D-79D613E9863C} S-1-5-21-457978338-2990298471-2379561640-1000:WOUOSVRD\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\4713b1991\1c460c8f5\Potato.exe
      C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\4713b1991\1c460c8f5\Potato.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic BaseBoard get SerialNumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\4713b1991\1c460c8f5\Potato.exe
        "C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\4713b1991\1c460c8f5\Potato.exe" -noupdate
        3⤵
        • Executes dropped EXE
        • Drops desktop.ini file(s)
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic BaseBoard get SerialNumber
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:524
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {AFD4DD22-9D2E-4AD9-B7D9-0298A82A1EBA} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\svbonxh3.exe
      C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\svbonxh3.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabC18D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC1CE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\34a6d805642d06a18e7576c

    Filesize

    12.9MB

    MD5

    0af9c4e52e04dd850421a861383dc840

    SHA1

    cbea9a6a3daf10573e11e96131a79e350b062582

    SHA256

    8283c33b68467ba84bd74c1888238ad616affd4972f176deb68d224866d3cc90

    SHA512

    f81e8d464ae4d7bddaf43b2b026b0a04e976dc617526b48b716c90a5dc7bafb32e4e841baf89bf08942fdc83c5d623e710ef2b567a0f3de55eda1eac43944326

  • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\libcef.dll

    Filesize

    2.3MB

    MD5

    8cf38f54aaa53e636a071336e0703776

    SHA1

    3748b5464f9b6e025b032c3d6f9e814381888700

    SHA256

    14e11b9b39f8c638afaf3976c4ca18fed30a533d73cd73f8057e1a8a5cf0a2ee

    SHA512

    0f0da7430e53f52db6ac3026f92440f1a3344d953d7204a187b29d2091313201f46833761603bf877b2246d3cb4c515e149667248618bef54fe85f74d43b7c80

  • C:\Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\4713b1991\1c460c8f5\log_start0.txt

    Filesize

    972B

    MD5

    279ebc44a0fc862056e012a3b15a0fcd

    SHA1

    32cbd4b7f425e62ba8861e26c59b3a7bf1f13ee3

    SHA256

    4912b70bd8abe0d9edfbe49341abbac6f0394c10d805071a6a403b62a248f2c8

    SHA512

    ca5821f15dc2bff5e4f9820a06d4edb84531cc50b0bb8079f824c965429f5e5651e4c7f876bc0d02af652e9a4bad8e3ce651a3be54faa7f52594972e3abc80f8

  • \Users\Admin\AppData\Local\Temp\is-QC1RR.tmp\PTOTAC_WINCASIHD_17.50.58.tmp

    Filesize

    3.2MB

    MD5

    5adbbe41edfdb7509a7bca5c8bbb494c

    SHA1

    9b69991e71d700c8fb1f77dc20f702e43ac7e5b0

    SHA256

    842dae30f95fb76e9309616d2a2fa18080663d60477f9c960041d1592b0f8414

    SHA512

    d2ab280d728113be6036c6d0d11234dacf93b54fc2e3d5b13390848cddd04ef67dc8df3ae5b8ab2ada7ab38209498bbad6c62774028530816ef007512ffee2a3

  • \Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\KRShmq.dll

    Filesize

    44KB

    MD5

    0f74b11cfb900e448a44652305eaf43a

    SHA1

    d89fb77b6e8c90595811d1c46f48f1165cdc9bb4

    SHA256

    fff63d3d2758d5b9ca93a1fce7773deedfd99ecdeb8c77ecb15733fa387b185c

    SHA512

    862247be086ac879981af68776e29d5c11f3fe3c8bcd3b78987b77e9df519a6055c68b6e90bfdc202c1780997ef00a758fa084cbf2522cd32cf5d4a51270643e

  • \Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\msvcp140.dll

    Filesize

    553KB

    MD5

    6da7f4530edb350cf9d967d969ccecf8

    SHA1

    3e2681ea91f60a7a9ef2407399d13c1ca6aa71e9

    SHA256

    9fee6f36547d6f6ea7ca0338655555dba6bb0f798bc60334d29b94d1547da4da

    SHA512

    1f77f900215a4966f7f4e5d23b4aaad203136cb8561f4e36f03f13659fe1ff4b81caa75fef557c890e108f28f0484ad2baa825559114c0daa588cf1de6c1afab

  • \Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\svbonxh3.exe

    Filesize

    5.3MB

    MD5

    cefc4527be9855271deb935a24242d09

    SHA1

    7532dd28082459ee1a3ba9566fa136478144b4a4

    SHA256

    301a4520035bfa1f0f0b3e988f2a148795935a73593a755b65821c4db868541b

    SHA512

    855097e9cae1767a1c1dbe127626cbe5b7369efdb5382fa8b8f5ef330aca4ffee3bc8d48cd3dd64bb1e9b2bb781ff0ec3f28aa6381ae5f75722a58a7efcc0008

  • \Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\vcruntime140.dll

    Filesize

    95KB

    MD5

    f34eb034aa4a9735218686590cba2e8b

    SHA1

    2bc20acdcb201676b77a66fa7ec6b53fa2644713

    SHA256

    9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

    SHA512

    d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

  • \Users\Admin\AppData\Roaming\6745787ff863f3839ea2c261db669180\28e6c3ebd\a5420de614\vcruntime140_1.dll

    Filesize

    36KB

    MD5

    135359d350f72ad4bf716b764d39e749

    SHA1

    2e59d9bbcce356f0fece56c9c4917a5cacec63d7

    SHA256

    34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32

    SHA512

    cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

  • memory/1104-47-0x00000000002E0000-0x0000000003EB0000-memory.dmp

    Filesize

    59.8MB

  • memory/1104-42-0x00000000002E0000-0x0000000003EB0000-memory.dmp

    Filesize

    59.8MB

  • memory/2212-80-0x0000000000950000-0x0000000001642000-memory.dmp

    Filesize

    12.9MB

  • memory/2212-76-0x000007FEF5E90000-0x000007FEF62A6000-memory.dmp

    Filesize

    4.1MB

  • memory/2212-81-0x0000000003060000-0x0000000004884000-memory.dmp

    Filesize

    24.1MB

  • memory/2212-85-0x0000000003060000-0x0000000004884000-memory.dmp

    Filesize

    24.1MB

  • memory/2760-36-0x0000000000400000-0x000000000074C000-memory.dmp

    Filesize

    3.3MB

  • memory/2760-33-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/2760-9-0x0000000000400000-0x000000000074C000-memory.dmp

    Filesize

    3.3MB

  • memory/2988-38-0x0000000000400000-0x0000000000518000-memory.dmp

    Filesize

    1.1MB

  • memory/2988-1-0x0000000000401000-0x00000000004A9000-memory.dmp

    Filesize

    672KB

  • memory/2988-0-0x0000000000400000-0x0000000000518000-memory.dmp

    Filesize

    1.1MB