Overview
overview
10Static
static
10Tear.exe
windows7-x64
10adochi.exe
windows7-x64
7autoit.exe
windows7-x64
10autoit2.exe
windows7-x64
10autoit3.exe
windows7-x64
10deviation.exe
windows7-x64
8encoder.exe
windows7-x64
10encoder2.exe
windows7-x64
9encoder3.exe
windows7-x64
10encoder4.exe
windows7-x64
5encoder5.exe
windows7-x64
10erebus.exe
windows7-x64
9myxaha.exe
windows7-x64
7$LOCALAPPD...er.exe
windows7-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows7-x64
7$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...om.dll
windows7-x64
5trucry.exe
windows7-x64
10wlock.exe
windows7-x64
3wlock2.exe
windows7-x64
8Analysis
-
max time kernel
299s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 00:15
Behavioral task
behavioral1
Sample
Tear.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
adochi.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
autoit.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
autoit2.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
autoit3.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
deviation.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
encoder.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
encoder2.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
encoder3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
encoder4.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
encoder5.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
erebus.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
myxaha.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$LOCALAPPDATA/ConduitInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/md5dll.dll
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsRandom.dll
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
trucry.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
wlock.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
wlock2.exe
Resource
win7-20240903-en
General
-
Target
wlock2.exe
-
Size
229KB
-
MD5
6e7d32b6a66ba7d6b6dbfe0adc5a7eff
-
SHA1
394b5f38d3a5a1ce2d3d0f3b046898f1a5519543
-
SHA256
e4e452529a55436c7608482ef47687ef48ece4b068a989ae5f86ef6c59ff49fc
-
SHA512
648b4f95b02b7e2e5e0aba3439066ab766ff6c01e9fc2d3b05d44b4a8862d7c8a88d27a8572d7fe5e3a8471bb217cf9c7179bd7ab8bacfd4a3d42dcf1f4699c2
-
SSDEEP
6144:6NjkWhUh1S4A05cYNe/8xXWwK80i6F+eco+Sxaat:8jkS50G5cXg66F+eeSQ
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wlock2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlock2.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wlock2.exepid process 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe 2792 wlock2.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
wlock2.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2792 wlock2.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
explorer.exepid process 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
explorer.exepid process 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wlock2.exe"C:\Users\Admin\AppData\Local\Temp\wlock2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2748
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1052