Overview
overview
10Static
static
10VSNKLGuzoF...2).exe
windows7-x64
3VSNKLGuzoF...2).exe
windows10-2004-x64
3VSNKLGuzoF...5w.exe
windows7-x64
3VSNKLGuzoF...5w.exe
windows10-2004-x64
3VideoCodeCX.exe
windows7-x64
10VideoCodeCX.exe
windows10-2004-x64
10WcsPlugInS...ex.exe
windows7-x64
5WcsPlugInS...ex.exe
windows10-2004-x64
7WinLocker Builder.exe
windows7-x64
5WinLocker Builder.exe
windows10-2004-x64
5WinLocker_Builder.exe
windows7-x64
5WinLocker_Builder.exe
windows10-2004-x64
5_003E0000.exe.vir.exe
windows7-x64
9_003E0000.exe.vir.exe
windows10-2004-x64
7vmem02.exe
windows7-x64
3vmem02.exe
windows10-2004-x64
3w8i9eHkHOwWwQlX.exe
windows7-x64
3w8i9eHkHOwWwQlX.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
10wpbt0.exe
windows10-2004-x64
10xpiofrbtkzhr.exe
windows7-x64
xpiofrbtkzhr.exe
windows10-2004-x64
xxx_video (2).exe
windows7-x64
7xxx_video (2).exe
windows10-2004-x64
7xxx_video.exe
windows7-x64
5xxx_video.exe
windows10-2004-x64
5xxx_video_...vi.exe
windows7-x64
10xxx_video_...vi.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
10Analysis
-
max time kernel
9s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:48
Behavioral task
behavioral1
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VideoCodeCX.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
VideoCodeCX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WcsPlugInService.ex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WcsPlugInService.ex.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WinLocker Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
WinLocker Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WinLocker_Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WinLocker_Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
_003E0000.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
_003E0000.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
vmem02.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
vmem02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
w8i9eHkHOwWwQlX.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
w8i9eHkHOwWwQlX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
wpbt0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wpbt0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
xpiofrbtkzhr.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
xpiofrbtkzhr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
xxx_video (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
xxx_video (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
xxx_video.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
xxx_video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
xxx_video_26726.avi.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
xxx_video_26726.avi.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
xpiofrbtkzhr.exe
-
Size
46KB
-
MD5
25a11c9dd8d3eb6ecf8544e95d866a98
-
SHA1
b462e8f5a05dba7328885af7646f9229d09656fb
-
SHA256
6a298fd7189f63d29fb4c4cc342844a98c10945f8e0700363b0d078111568528
-
SHA512
2483c4b7dad5bf273c955c70716dcb61a7f61ea1047de6f03ab867e549a3791a1c93291ef9d81e6308eecffb3a05f963b45f8b539ab31f84c5520844cb8a8992
-
SSDEEP
768:1ySfi5TqmFi4tuXnKtgYr/TOsex9PEMBex6BHmRGBNc1uobW80vOA4N:dK5TbUayYLTOh9PEMEx+O150vOPN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xpiofrbtkzhr.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation xpiofrbtkzhr.exe -
Executes dropped EXE 1 IoCs
Processes:
2509819211.exepid process 2004 2509819211.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2509819211 = "C:\\Users\\Admin\\2509819211\\2509819211.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\2509819211_del = "cmd /c del \"C:\\Users\\Admin\\AppData\\Local\\Temp\\xpiofrbtkzhr.exe\"" reg.exe -
Processes:
resource yara_rule behavioral22/memory/116-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral22/memory/116-5295-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2509819211.execmd.exeshutdown.exereg.exexpiofrbtkzhr.execmd.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2509819211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpiofrbtkzhr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies Control Panel 1 IoCs
Processes:
2509819211.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\ScreenSaveActive = "0" 2509819211.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "157" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
2509819211.exepid process 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe 2004 2509819211.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2509819211.exeshutdown.exedescription pid process Token: SeDebugPrivilege 2004 2509819211.exe Token: SeShutdownPrivilege 4812 shutdown.exe Token: SeRemoteShutdownPrivilege 4812 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2509819211.exepid process 2004 2509819211.exe 2004 2509819211.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
xpiofrbtkzhr.execmd.execmd.exedescription pid process target process PID 116 wrote to memory of 4448 116 xpiofrbtkzhr.exe cmd.exe PID 116 wrote to memory of 4448 116 xpiofrbtkzhr.exe cmd.exe PID 116 wrote to memory of 4448 116 xpiofrbtkzhr.exe cmd.exe PID 4448 wrote to memory of 4208 4448 cmd.exe reg.exe PID 4448 wrote to memory of 4208 4448 cmd.exe reg.exe PID 4448 wrote to memory of 4208 4448 cmd.exe reg.exe PID 116 wrote to memory of 1996 116 xpiofrbtkzhr.exe cmd.exe PID 116 wrote to memory of 1996 116 xpiofrbtkzhr.exe cmd.exe PID 116 wrote to memory of 1996 116 xpiofrbtkzhr.exe cmd.exe PID 116 wrote to memory of 2004 116 xpiofrbtkzhr.exe 2509819211.exe PID 116 wrote to memory of 2004 116 xpiofrbtkzhr.exe 2509819211.exe PID 116 wrote to memory of 2004 116 xpiofrbtkzhr.exe 2509819211.exe PID 116 wrote to memory of 4812 116 xpiofrbtkzhr.exe shutdown.exe PID 116 wrote to memory of 4812 116 xpiofrbtkzhr.exe shutdown.exe PID 116 wrote to memory of 4812 116 xpiofrbtkzhr.exe shutdown.exe PID 1996 wrote to memory of 2224 1996 cmd.exe reg.exe PID 1996 wrote to memory of 2224 1996 cmd.exe reg.exe PID 1996 wrote to memory of 2224 1996 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2509819211 /t REG_SZ /d "C:\Users\Admin\2509819211\2509819211.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2509819211_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\xpiofrbtkzhr.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
C:\Users\Admin\2509819211\2509819211.exe"C:\Users\Admin\2509819211\2509819211.exe" f2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 42⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39a8055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58ce930987752f9790864543b6da34317
SHA17d89ae64e1dae59e8e85749b875aa712a4fc5e36
SHA2565bce08b97565564ccdebec5b9c45ac680e0b3f01ddde2461f1dff4a9bbe50836
SHA512456c1eb90d51145a785ee47c15d49b0bc9ce9a14f636bbac69e4df19fb2ab8b6e4f785657797042561e0d12e237fc223537220493d9a4ef3f1b29cda373fb65d