Overview
overview
10Static
static
10VSNKLGuzoF...2).exe
windows7-x64
3VSNKLGuzoF...2).exe
windows10-2004-x64
3VSNKLGuzoF...5w.exe
windows7-x64
3VSNKLGuzoF...5w.exe
windows10-2004-x64
3VideoCodeCX.exe
windows7-x64
10VideoCodeCX.exe
windows10-2004-x64
10WcsPlugInS...ex.exe
windows7-x64
5WcsPlugInS...ex.exe
windows10-2004-x64
7WinLocker Builder.exe
windows7-x64
5WinLocker Builder.exe
windows10-2004-x64
5WinLocker_Builder.exe
windows7-x64
5WinLocker_Builder.exe
windows10-2004-x64
5_003E0000.exe.vir.exe
windows7-x64
9_003E0000.exe.vir.exe
windows10-2004-x64
7vmem02.exe
windows7-x64
3vmem02.exe
windows10-2004-x64
3w8i9eHkHOwWwQlX.exe
windows7-x64
3w8i9eHkHOwWwQlX.exe
windows10-2004-x64
3wpbt0.exe
windows7-x64
10wpbt0.exe
windows10-2004-x64
10xpiofrbtkzhr.exe
windows7-x64
xpiofrbtkzhr.exe
windows10-2004-x64
xxx_video (2).exe
windows7-x64
7xxx_video (2).exe
windows10-2004-x64
7xxx_video.exe
windows7-x64
5xxx_video.exe
windows10-2004-x64
5xxx_video_...vi.exe
windows7-x64
10xxx_video_...vi.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
5xxx_video_...ir.exe
windows7-x64
10xxx_video_...ir.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:48
Behavioral task
behavioral1
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
VSNKLGuzoFJgFHyEI15w (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
VSNKLGuzoFJgFHyEI15w.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VideoCodeCX.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
VideoCodeCX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
WcsPlugInService.ex.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
WcsPlugInService.ex.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
WinLocker Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
WinLocker Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
WinLocker_Builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
WinLocker_Builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
_003E0000.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
_003E0000.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
vmem02.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
vmem02.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
w8i9eHkHOwWwQlX.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
w8i9eHkHOwWwQlX.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
wpbt0.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
wpbt0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
xpiofrbtkzhr.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
xpiofrbtkzhr.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
xxx_video (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
xxx_video (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
xxx_video.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
xxx_video.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
xxx_video_26726.avi.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
xxx_video_26726.avi.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
xxx_video_35942.avi.exe.vir.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
xxx_video_35942.avi_unpacked_.exe.vir.exe
Resource
win10v2004-20241007-en
General
-
Target
WcsPlugInService.ex.exe
-
Size
113KB
-
MD5
f9a974c8ed6793c226101c10af7542db
-
SHA1
5719e5b45721af9ac9652332f2001d984e1d9a45
-
SHA256
8f0c20eab317c9416ad6dd602013528dca8ee1467b111019fe6704ff8da6a241
-
SHA512
1f00ca5c9fdb1ca8fe6d9b9728da6b3aac57b72e17e528ec37e77cdf6ae1cd52384b0ae8256e2f74f88ba87c9e90c575a0a8ebf729f894590fe71d5e6ce608d3
-
SSDEEP
3072:pxuZMpyk7A79E6rdAXpRCxv/sqJ5SjTOaiZl7ObWlx+T:pYf79JAXKxHs0S3OaiZ1Oiv
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
msiexec.exepid process 3004 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysFxUI = "C:\\Users\\Admin\\AppData\\Local\\Microsoft Synchronization Services\\SysFxUI.exe" msiexec.exe -
Blocklisted process makes network request 40 IoCs
Processes:
msiexec.exeflow pid process 7 3004 msiexec.exe 13 3004 msiexec.exe 16 3004 msiexec.exe 17 3004 msiexec.exe 18 3004 msiexec.exe 22 3004 msiexec.exe 23 3004 msiexec.exe 24 3004 msiexec.exe 25 3004 msiexec.exe 26 3004 msiexec.exe 27 3004 msiexec.exe 28 3004 msiexec.exe 29 3004 msiexec.exe 30 3004 msiexec.exe 31 3004 msiexec.exe 32 3004 msiexec.exe 33 3004 msiexec.exe 34 3004 msiexec.exe 35 3004 msiexec.exe 36 3004 msiexec.exe 37 3004 msiexec.exe 38 3004 msiexec.exe 39 3004 msiexec.exe 40 3004 msiexec.exe 41 3004 msiexec.exe 42 3004 msiexec.exe 43 3004 msiexec.exe 44 3004 msiexec.exe 45 3004 msiexec.exe 46 3004 msiexec.exe 47 3004 msiexec.exe 48 3004 msiexec.exe 49 3004 msiexec.exe 50 3004 msiexec.exe 51 3004 msiexec.exe 52 3004 msiexec.exe 53 3004 msiexec.exe 56 3004 msiexec.exe 57 3004 msiexec.exe 58 3004 msiexec.exe -
Processes:
resource yara_rule behavioral8/memory/4676-0-0x0000000000E00000-0x0000000000E39000-memory.dmp upx behavioral8/memory/4676-11-0x0000000000E00000-0x0000000000E39000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
WcsPlugInService.ex.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WcsPlugInService.ex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
WcsPlugInService.ex.exepid process 4676 WcsPlugInService.ex.exe 4676 WcsPlugInService.ex.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WcsPlugInService.ex.exedescription pid process target process PID 4676 wrote to memory of 3004 4676 WcsPlugInService.ex.exe msiexec.exe PID 4676 wrote to memory of 3004 4676 WcsPlugInService.ex.exe msiexec.exe PID 4676 wrote to memory of 3004 4676 WcsPlugInService.ex.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WcsPlugInService.ex.exe"C:\Users\Admin\AppData\Local\Temp\WcsPlugInService.ex.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Deletes itself
- Adds Run key to start application
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5a07295962a5d43fa11c8bab7971b0b06
SHA19721abcb3bb245c1e4707e618658af0381161e91
SHA25675825606662d3805cce161d3c6f932daed1fc08bf76445d053cf0c82c5f043fa
SHA512fe37383067704a6e5043c5d0ea32a36f4867fda50f6650fc2dcaf85f1d16be84cbfe0fcb93fc45e4098d8b25a100848aa3d04726fea55d6efaa7f8093745ad43
-
Filesize
116B
MD5f4d91ef9a7aae74391696cded3ac938d
SHA1e13c2c188937cd43abd1ab96d78dbc0178f6de06
SHA256461a6829b9d22277f4c9ad242f5c7d8355139b0b3555196648ab97e8b7162929
SHA5124b205c9a837ca538139f31f20d18a8d3e129d592a1e713dbfa36673409bdbf4deddb4fd7592e5097f25249667311c188406e29fb2edd1e4baddc7515d7c85f66