Overview
overview
10Static
static
10VSNKLGuzoF...2).exe
windows7-x64
3VSNKLGuzoF...5w.exe
windows7-x64
3VideoCodeCX.exe
windows7-x64
10WcsPlugInS...ex.exe
windows7-x64
5WinLocker Builder.exe
windows7-x64
5WinLocker_Builder.exe
windows7-x64
5_003E0000.exe.vir.exe
windows7-x64
9vmem02.exe
windows7-x64
3w8i9eHkHOwWwQlX.exe
windows7-x64
3wpbt0.exe
windows7-x64
10xpiofrbtkzhr.exe
windows7-x64
xxx_video (2).exe
windows7-x64
7xxx_video.exe
windows7-x64
5xxx_video_...vi.exe
windows7-x64
10xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows7-x64
10xxx_video_...vi.exe
windows7-x64
10xxx_video_...ir.exe
windows7-x64
10zcrypt.exe
windows7-x64
7{71257279-...a}.exe
windows7-x64
10Analysis
-
max time kernel
7s -
max time network
9s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:41
Behavioral task
behavioral1
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
VideoCodeCX.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
WcsPlugInService.ex.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
WinLocker Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
WinLocker_Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
_003E0000.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
vmem02.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
w8i9eHkHOwWwQlX.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
wpbt0.exe
Resource
win7-20241023-en
Behavioral task
behavioral11
Sample
xpiofrbtkzhr.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
xxx_video (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
xxx_video.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
xxx_video_26726.avi.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
xxx_video_73240.avi____.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
xxx_video_77498.avi.exe
Resource
win7-20241010-en
Behavioral task
behavioral19
Sample
xxx_video_87279.avi.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
zcrypt.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe
Resource
win7-20240903-en
Errors
General
-
Target
xpiofrbtkzhr.exe
-
Size
46KB
-
MD5
25a11c9dd8d3eb6ecf8544e95d866a98
-
SHA1
b462e8f5a05dba7328885af7646f9229d09656fb
-
SHA256
6a298fd7189f63d29fb4c4cc342844a98c10945f8e0700363b0d078111568528
-
SHA512
2483c4b7dad5bf273c955c70716dcb61a7f61ea1047de6f03ab867e549a3791a1c93291ef9d81e6308eecffb3a05f963b45f8b539ab31f84c5520844cb8a8992
-
SSDEEP
768:1ySfi5TqmFi4tuXnKtgYr/TOsex9PEMBex6BHmRGBNc1uobW80vOA4N:dK5TbUayYLTOh9PEMEx+O150vOPN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2748 2509819211.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 xpiofrbtkzhr.exe 3060 xpiofrbtkzhr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\2509819211 = "C:\\Users\\Admin\\2509819211\\2509819211.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\2509819211_del = "cmd /c del \"C:\\Users\\Admin\\AppData\\Local\\Temp\\xpiofrbtkzhr.exe\"" reg.exe -
resource yara_rule behavioral11/memory/3060-1-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral11/memory/3060-376-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpiofrbtkzhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2509819211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 4 IoCs
pid Process 2660 taskkill.exe 2580 taskkill.exe 548 taskkill.exe 2028 taskkill.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\ScreenSaveActive = "0" 2509819211.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1492 shutdown.exe Token: SeRemoteShutdownPrivilege 1492 shutdown.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeDebugPrivilege 2028 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2580 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2748 2509819211.exe 2748 2509819211.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2148 3060 xpiofrbtkzhr.exe 30 PID 3060 wrote to memory of 2148 3060 xpiofrbtkzhr.exe 30 PID 3060 wrote to memory of 2148 3060 xpiofrbtkzhr.exe 30 PID 3060 wrote to memory of 2148 3060 xpiofrbtkzhr.exe 30 PID 2148 wrote to memory of 1876 2148 cmd.exe 32 PID 2148 wrote to memory of 1876 2148 cmd.exe 32 PID 2148 wrote to memory of 1876 2148 cmd.exe 32 PID 2148 wrote to memory of 1876 2148 cmd.exe 32 PID 3060 wrote to memory of 2760 3060 xpiofrbtkzhr.exe 33 PID 3060 wrote to memory of 2760 3060 xpiofrbtkzhr.exe 33 PID 3060 wrote to memory of 2760 3060 xpiofrbtkzhr.exe 33 PID 3060 wrote to memory of 2760 3060 xpiofrbtkzhr.exe 33 PID 3060 wrote to memory of 2748 3060 xpiofrbtkzhr.exe 35 PID 3060 wrote to memory of 2748 3060 xpiofrbtkzhr.exe 35 PID 3060 wrote to memory of 2748 3060 xpiofrbtkzhr.exe 35 PID 3060 wrote to memory of 2748 3060 xpiofrbtkzhr.exe 35 PID 2760 wrote to memory of 2132 2760 cmd.exe 36 PID 2760 wrote to memory of 2132 2760 cmd.exe 36 PID 2760 wrote to memory of 2132 2760 cmd.exe 36 PID 2760 wrote to memory of 2132 2760 cmd.exe 36 PID 3060 wrote to memory of 1492 3060 xpiofrbtkzhr.exe 37 PID 3060 wrote to memory of 1492 3060 xpiofrbtkzhr.exe 37 PID 3060 wrote to memory of 1492 3060 xpiofrbtkzhr.exe 37 PID 3060 wrote to memory of 1492 3060 xpiofrbtkzhr.exe 37 PID 2748 wrote to memory of 548 2748 2509819211.exe 39 PID 2748 wrote to memory of 548 2748 2509819211.exe 39 PID 2748 wrote to memory of 548 2748 2509819211.exe 39 PID 2748 wrote to memory of 548 2748 2509819211.exe 39 PID 2748 wrote to memory of 2028 2748 2509819211.exe 43 PID 2748 wrote to memory of 2028 2748 2509819211.exe 43 PID 2748 wrote to memory of 2028 2748 2509819211.exe 43 PID 2748 wrote to memory of 2028 2748 2509819211.exe 43 PID 2748 wrote to memory of 2660 2748 2509819211.exe 45 PID 2748 wrote to memory of 2660 2748 2509819211.exe 45 PID 2748 wrote to memory of 2660 2748 2509819211.exe 45 PID 2748 wrote to memory of 2660 2748 2509819211.exe 45 PID 2748 wrote to memory of 2580 2748 2509819211.exe 47 PID 2748 wrote to memory of 2580 2748 2509819211.exe 47 PID 2748 wrote to memory of 2580 2748 2509819211.exe 47 PID 2748 wrote to memory of 2580 2748 2509819211.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
C:\Users\Admin\2509819211\2509819211.exe"C:\Users\Admin\2509819211\2509819211.exe" f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 42⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2620
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58ce930987752f9790864543b6da34317
SHA17d89ae64e1dae59e8e85749b875aa712a4fc5e36
SHA2565bce08b97565564ccdebec5b9c45ac680e0b3f01ddde2461f1dff4a9bbe50836
SHA512456c1eb90d51145a785ee47c15d49b0bc9ce9a14f636bbac69e4df19fb2ab8b6e4f785657797042561e0d12e237fc223537220493d9a4ef3f1b29cda373fb65d