Overview
overview
10Static
static
10foo/0044d6...f7.exe
windows7-x64
1foo/0044d6...f7.exe
windows10-2004-x64
3foo/034e4c...a9.exe
windows7-x64
4foo/034e4c...a9.exe
windows10-2004-x64
4foo/035fa2...72.exe
windows7-x64
6foo/035fa2...72.exe
windows10-2004-x64
6foo/04884a...1b.exe
windows7-x64
7foo/04884a...1b.exe
windows10-2004-x64
7foo/06ed82...59.exe
windows7-x64
7foo/06ed82...59.exe
windows10-2004-x64
7foo/07470b...68.exe
windows7-x64
7foo/07470b...68.exe
windows10-2004-x64
7foo/078adb...c0.exe
windows7-x64
10foo/078adb...c0.exe
windows10-2004-x64
10foo/09e5c8...b4.exe
windows7-x64
3foo/09e5c8...b4.exe
windows10-2004-x64
3foo/0becfe...f4.exe
windows7-x64
10foo/0becfe...f4.exe
windows10-2004-x64
10foo/1a78d3...a3.exe
windows7-x64
5foo/1a78d3...a3.exe
windows10-2004-x64
7foo/1ffe82...a6.exe
windows7-x64
10foo/1ffe82...a6.exe
windows10-2004-x64
10foo/255028...e1.dll
windows7-x64
3foo/255028...e1.dll
windows10-2004-x64
3foo/27601d...cc.exe
windows7-x64
7foo/27601d...cc.exe
windows10-2004-x64
7foo/27f911...49.exe
windows7-x64
10foo/27f911...49.exe
windows10-2004-x64
10foo/28408c...c5.exe
windows7-x64
10foo/28408c...c5.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
foo/27601d095e5b3761d9289584415a73cc.exe
-
Size
565KB
-
MD5
27601d095e5b3761d9289584415a73cc
-
SHA1
9570f23b5abe2ef46a23ded17adb2fb6c203a201
-
SHA256
749f5e042b317dc4e989c174d92936ef83d9d4fbf4c190f0e5b759b858b15cf4
-
SHA512
066263bf8f11d48b4e3715b8962686e0ca32aa8647b642a193b5331513538a44bb49edad5ef6a08ae6cc6401504fadc7adf38efb07c9ae9560e947aac443e0e7
-
SSDEEP
12288:REqmA0wfzInoQJUi1KHvQtzDNfo1arLaLRvs+Jkp/eH:RHmSyo+Ui13zZCI7+up/eH
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2532 WombatStarter.exe 2900 HPWombatSrv.exe 2588 WombatStarter.exe -
Loads dropped DLL 13 IoCs
pid Process 2560 27601d095e5b3761d9289584415a73cc.exe 2560 27601d095e5b3761d9289584415a73cc.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2900 HPWombatSrv.exe 2560 27601d095e5b3761d9289584415a73cc.exe 2560 27601d095e5b3761d9289584415a73cc.exe 2560 27601d095e5b3761d9289584415a73cc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\4.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\5.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\HPWombatSrv.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\WombatStarter.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\uninstaller.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\1.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\2.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\3.ico 27601d095e5b3761d9289584415a73cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WombatStarter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27601d095e5b3761d9289584415a73cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WombatStarter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HPWombatSrv.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 HPWombatSrv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." HPWombatSrv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%windir%\System32\ie4uinit.exe",-738 = "Start Internet Explorer without ActiveX controls or browser extensions." HPWombatSrv.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" HPWombatSrv.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2560 27601d095e5b3761d9289584415a73cc.exe 2560 27601d095e5b3761d9289584415a73cc.exe 2560 27601d095e5b3761d9289584415a73cc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2532 2560 27601d095e5b3761d9289584415a73cc.exe 31 PID 2560 wrote to memory of 2532 2560 27601d095e5b3761d9289584415a73cc.exe 31 PID 2560 wrote to memory of 2532 2560 27601d095e5b3761d9289584415a73cc.exe 31 PID 2560 wrote to memory of 2532 2560 27601d095e5b3761d9289584415a73cc.exe 31 PID 2560 wrote to memory of 2588 2560 27601d095e5b3761d9289584415a73cc.exe 34 PID 2560 wrote to memory of 2588 2560 27601d095e5b3761d9289584415a73cc.exe 34 PID 2560 wrote to memory of 2588 2560 27601d095e5b3761d9289584415a73cc.exe 34 PID 2560 wrote to memory of 2588 2560 27601d095e5b3761d9289584415a73cc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\HPWombat\WombatStarter.exe"C:\Program Files (x86)\HPWombat\WombatStarter.exe" "install_and_start_srv" "C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Program Files (x86)\HPWombat\WombatStarter.exe"C:\Program Files (x86)\HPWombat\WombatStarter.exe" "write_patch_str_to_reg" "C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe" "HKLM" Software\HPWombat "jeromu"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Program Files (x86)\HPWombat\HPWombatSrv.exe"C:\Program Files (x86)\HPWombat\HPWombatSrv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5bac2e4856879885af0251cb4cbb3d521
SHA1a8d3f6492e20e775c84f16a8ca6683a2c1aabc2d
SHA25618dd7fe65140120d10004e475effb1ce386d8f280094429f4654882120899d73
SHA5125d550a67764a54145808a12953435a5dd75d1bea8200f2872e288f1eb9f8c0b798db539289950b2c42a0cac4a55689fc65427d1c97afdf83a10881a74d7a1935
-
Filesize
1KB
MD535bd6063a561ad015bcd563d19f8b4da
SHA16ba50ce4dbbd1247b5a638f725118310503e136a
SHA25637fc3f46607e4652d3731f5c93612cb92754ed6b24f8877f0ecac3fc95b41976
SHA5127ae551ea865ea94e4a4b1e2b5c90bd8268d04168fde046e5b70e4b2c79255dc82e315321c677794a698d82f4fc17329afb018d76cc01e02c568428d105af21ac
-
Filesize
1KB
MD5075cce33e5b9021a3b2c980e4834166f
SHA1890480d71a652e81593661b42767084b369f91c2
SHA256cfe88e1f889997f3c65116644786da7e83e5cb545d533bbe0300c4b7cc727c6c
SHA512af29a79f7b8ffd93a0c52219d943e147a94bef65abae2c36d596ead29ea506060e4e9b09600adc8661de16c525d55a31c91d633fbf1d29e4483996273f3be742
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Gооglе Сhrоmе.lnk
Filesize2KB
MD5b9d6f634543a509daf4baf7193736d7b
SHA18856ba024a44c39737111dae84e1dc121990edd7
SHA2561fe24d28bf663495a86fd5244f1d8794a07155212c1bc3e68bc5e1816d5ea843
SHA512b5d67b54e31c494a49a9960c2d365af7005ec8734bfef7996d6d155d3894840254cad19b7250e28f3e318609fb01ad8a966bccec422d862068a86d4a053ad0a3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Intеrnеt Ехрlоrеr.lnk
Filesize1KB
MD5437968550cae0e72ce66b13cf3dd9f99
SHA17d8f6fb157e8305a511007715627d72b05b0fca3
SHA2568c588e1b47951680c7e0e1c22c369fcf3cbba2d9a825bf06a6cb6869984c9a94
SHA512046d42415ca557709391aef0fe95fe63b24621e3292c26e3ab6764c578d333478ffbe65e61ada2250f3c799b85326d6258395e1e0317ff8ebf205a55258a9867
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Intеrnеt Ехрlоrеr (Nо Аdd-оns).lnk
Filesize2KB
MD5387fe4555fffb7b85e3b506077917fab
SHA1457076fbbcb873edccba6d139401863ac298fd90
SHA256b37c83e616dc86b7746b78250f25ca3442acff810bfb7a724afc74b94b3099d3
SHA5120d4e966050930298d948075432cb2ab59e81ae9d382a9489994004ba28510b1d65d0d763fcc427330a75fe95b84167a11ce4939f68666acbeb2335544c196019
-
Filesize
2KB
MD510248b48a514f37dbf4a62ce4a38d555
SHA157ecf64257fa645981033acd180aea1d6f21b2c9
SHA256bd38dc543adbeac40775965dacb591d6ac2382a24edd99b7b091e547d9758fdb
SHA512b016e8902aff1a4f9fe698df792f86d37e903d53d218b6ab44b3193db7c992ed3eef685d919e649435eb4f5723547ffba47d5fb0cfbdbf9e12343d9c0a911e70
-
Filesize
1KB
MD57bb3af462004ba82592ce6ae32626b1b
SHA1f26e083c0c097c1fe5dc3a9b44ed73ac3f0d6a21
SHA25612ef0b9ddcabfe85d8134c98012f270c78f129bcc49940b92c09a149532dcd1c
SHA512d8b8d287bec0952491262f2fdc4db7704e68fdccf90856fe7245a79e30e18be4c121687a63be3ca4d3493e4d9081235851d7c987c162eb163fdec05e95e0ff9e
-
Filesize
1KB
MD52c41db46c366f974c1eb249531005fab
SHA1fb39130715f9478db18a310b969b79669a7ae906
SHA256ebfd317940a0c941f6c4747f3cae40e304566ecb5d92aa4babb3aed80bf18210
SHA512a745a24783c225a02e7198bc68f8e13502a4970f15272b45c10ce09428027f1f5683e530714319e2d52937d7dab49e575143912f717e393c1b782094ca60b1ce
-
Filesize
1.3MB
MD5d23253f3a323a0a7c8ecfb08e1e0aa74
SHA1497bbf7fa1655f7fd921239a00d46c32acebf59d
SHA25678d7891f42d40171373088aff1bda3fbd5ed4275ac0166a0cfcc7c8001ed4b70
SHA512cc5072793d2bcefda3d59e145996bbeb47eac8a6887b7472d2ce3d64bcf46a3c9cd97a663920f4510e1ca6626258354dbc4e758a759b089f58d86fa8a4cb7b3d
-
Filesize
24KB
MD50f70de5c22874df2323f937f7b588bd4
SHA1ed306624cd687d9e506c7ecd2ac97b7aaf556ff6
SHA2567f5429361e0195d599ee05643e26985490b2ad85a08943e561898db3b365997b
SHA5129cc23c1c5fbd07d991adf002fcdfdc3118b5d3648ac2387ef255ddd1377e1f94926f6e466ffe61657858df8e50179f52d647c75637beb2cd833b4ee6e5dc556e
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7