Overview
overview
10Static
static
10VSNKLGuzoF...2).exe
windows7-x64
3VSNKLGuzoF...2).exe
windows10-2004-x64
3VSNKLGuzoF...5w.exe
windows7-x64
3VSNKLGuzoF...5w.exe
windows10-2004-x64
3VideoCodeCX.exe
windows7-x64
10VideoCodeCX.exe
windows10-2004-x64
10WcsPlugInS...ex.exe
windows7-x64
5WcsPlugInS...ex.exe
windows10-2004-x64
7WinLocker Builder.exe
windows7-x64
5WinLocker Builder.exe
windows10-2004-x64
5WinLocker_Builder.exe
windows7-x64
5WinLocker_Builder.exe
windows10-2004-x64
5_003E0000.exe.vir.exe
windows7-x64
9_003E0000.exe.vir.exe
windows10-2004-x64
7vmem02.exe
windows7-x64
3vmem02.exe
windows10-2004-x64
3w8i9eHkHOwWwQlX.exe
windows7-x64
3w8i9eHkHOwWwQlX.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
10wpbt0.exe
windows10-2004-x64
10xpiofrbtkzhr.exe
windows7-x64
xpiofrbtkzhr.exe
windows10-2004-x64
xxx_video (2).exe
windows7-x64
7xxx_video (2).exe
windows10-2004-x64
7xxx_video.exe
windows7-x64
5xxx_video.exe
windows10-2004-x64
5xxx_video_...vi.exe
windows7-x64
10xxx_video_...vi.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
10Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:48
Behavioral task
behavioral1
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VideoCodeCX.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
VideoCodeCX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WcsPlugInService.ex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WcsPlugInService.ex.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WinLocker Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
WinLocker Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WinLocker_Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WinLocker_Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
_003E0000.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
_003E0000.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
vmem02.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
vmem02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
w8i9eHkHOwWwQlX.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
w8i9eHkHOwWwQlX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
wpbt0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wpbt0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
xpiofrbtkzhr.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
xpiofrbtkzhr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
xxx_video (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
xxx_video (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
xxx_video.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
xxx_video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
xxx_video_26726.avi.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
xxx_video_26726.avi.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
xpiofrbtkzhr.exe
-
Size
46KB
-
MD5
25a11c9dd8d3eb6ecf8544e95d866a98
-
SHA1
b462e8f5a05dba7328885af7646f9229d09656fb
-
SHA256
6a298fd7189f63d29fb4c4cc342844a98c10945f8e0700363b0d078111568528
-
SHA512
2483c4b7dad5bf273c955c70716dcb61a7f61ea1047de6f03ab867e549a3791a1c93291ef9d81e6308eecffb3a05f963b45f8b539ab31f84c5520844cb8a8992
-
SSDEEP
768:1ySfi5TqmFi4tuXnKtgYr/TOsex9PEMBex6BHmRGBNc1uobW80vOA4N:dK5TbUayYLTOh9PEMEx+O150vOPN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
2509819211.exepid process 2904 2509819211.exe -
Loads dropped DLL 2 IoCs
Processes:
xpiofrbtkzhr.exepid process 2440 xpiofrbtkzhr.exe 2440 xpiofrbtkzhr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\2509819211 = "C:\\Users\\Admin\\2509819211\\2509819211.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\2509819211_del = "cmd /c del \"C:\\Users\\Admin\\AppData\\Local\\Temp\\xpiofrbtkzhr.exe\"" reg.exe -
Processes:
resource yara_rule behavioral21/memory/2440-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral21/memory/2440-424-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exeshutdown.exetaskkill.exetaskkill.exexpiofrbtkzhr.execmd.exe2509819211.execmd.exetaskkill.exereg.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpiofrbtkzhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2509819211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2680 taskkill.exe 1132 taskkill.exe 2676 taskkill.exe 2728 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
2509819211.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveActive = "0" 2509819211.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
shutdown.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeShutdownPrivilege 2740 shutdown.exe Token: SeRemoteShutdownPrivilege 2740 shutdown.exe Token: SeDebugPrivilege 2680 taskkill.exe Token: SeDebugPrivilege 1132 taskkill.exe Token: SeDebugPrivilege 2676 taskkill.exe Token: SeDebugPrivilege 2728 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2509819211.exepid process 2904 2509819211.exe 2904 2509819211.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
xpiofrbtkzhr.execmd.exe2509819211.execmd.exedescription pid process target process PID 2440 wrote to memory of 3016 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 3016 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 3016 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 3016 2440 xpiofrbtkzhr.exe cmd.exe PID 3016 wrote to memory of 1780 3016 cmd.exe reg.exe PID 3016 wrote to memory of 1780 3016 cmd.exe reg.exe PID 3016 wrote to memory of 1780 3016 cmd.exe reg.exe PID 3016 wrote to memory of 1780 3016 cmd.exe reg.exe PID 2440 wrote to memory of 2356 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 2356 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 2356 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 2356 2440 xpiofrbtkzhr.exe cmd.exe PID 2440 wrote to memory of 2904 2440 xpiofrbtkzhr.exe 2509819211.exe PID 2440 wrote to memory of 2904 2440 xpiofrbtkzhr.exe 2509819211.exe PID 2440 wrote to memory of 2904 2440 xpiofrbtkzhr.exe 2509819211.exe PID 2440 wrote to memory of 2904 2440 xpiofrbtkzhr.exe 2509819211.exe PID 2904 wrote to memory of 2680 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2680 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2680 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2680 2904 2509819211.exe taskkill.exe PID 2440 wrote to memory of 2740 2440 xpiofrbtkzhr.exe shutdown.exe PID 2440 wrote to memory of 2740 2440 xpiofrbtkzhr.exe shutdown.exe PID 2440 wrote to memory of 2740 2440 xpiofrbtkzhr.exe shutdown.exe PID 2440 wrote to memory of 2740 2440 xpiofrbtkzhr.exe shutdown.exe PID 2356 wrote to memory of 2856 2356 cmd.exe reg.exe PID 2356 wrote to memory of 2856 2356 cmd.exe reg.exe PID 2356 wrote to memory of 2856 2356 cmd.exe reg.exe PID 2356 wrote to memory of 2856 2356 cmd.exe reg.exe PID 2904 wrote to memory of 1132 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 1132 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 1132 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 1132 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2676 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2676 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2676 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2676 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2728 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2728 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2728 2904 2509819211.exe taskkill.exe PID 2904 wrote to memory of 2728 2904 2509819211.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\2509819211\2509819211.exe"C:\Users\Admin\2509819211\2509819211.exe" f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 42⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1720
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58ce930987752f9790864543b6da34317
SHA17d89ae64e1dae59e8e85749b875aa712a4fc5e36
SHA2565bce08b97565564ccdebec5b9c45ac680e0b3f01ddde2461f1dff4a9bbe50836
SHA512456c1eb90d51145a785ee47c15d49b0bc9ce9a14f636bbac69e4df19fb2ab8b6e4f785657797042561e0d12e237fc223537220493d9a4ef3f1b29cda373fb65d