Overview
overview
10Static
static
10foo/0044d6...f7.exe
windows7-x64
1foo/0044d6...f7.exe
windows10-2004-x64
3foo/034e4c...a9.exe
windows7-x64
4foo/034e4c...a9.exe
windows10-2004-x64
4foo/035fa2...72.exe
windows7-x64
6foo/035fa2...72.exe
windows10-2004-x64
6foo/04884a...1b.exe
windows7-x64
7foo/04884a...1b.exe
windows10-2004-x64
7foo/06ed82...59.exe
windows7-x64
7foo/06ed82...59.exe
windows10-2004-x64
7foo/07470b...68.exe
windows7-x64
7foo/07470b...68.exe
windows10-2004-x64
7foo/078adb...c0.exe
windows7-x64
10foo/078adb...c0.exe
windows10-2004-x64
10foo/09e5c8...b4.exe
windows7-x64
3foo/09e5c8...b4.exe
windows10-2004-x64
3foo/0becfe...f4.exe
windows7-x64
10foo/0becfe...f4.exe
windows10-2004-x64
10foo/1a78d3...a3.exe
windows7-x64
5foo/1a78d3...a3.exe
windows10-2004-x64
7foo/1ffe82...a6.exe
windows7-x64
10foo/1ffe82...a6.exe
windows10-2004-x64
10foo/255028...e1.dll
windows7-x64
3foo/255028...e1.dll
windows10-2004-x64
3foo/27601d...cc.exe
windows7-x64
7foo/27601d...cc.exe
windows10-2004-x64
7foo/27f911...49.exe
windows7-x64
10foo/27f911...49.exe
windows10-2004-x64
10foo/28408c...c5.exe
windows7-x64
10foo/28408c...c5.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
foo/0044d66e4abf7c4af6b5d207065320f7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
foo/034e4c62965f8d5dd5d5a2ce34a53ba9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
foo/035fa2f2fae0a8fad733686a7d9ea772.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
foo/04884a82d01d733f245d921e1f74fb1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
foo/07470b6ede84f02ec31ab0a601cdc068.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
foo/078adb95b1a0a6449d8c4ece796deac0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
foo/09e5c88a0592763e0c4f30fb88d663b4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
foo/0becfedf4d0b9ad5251aca33274a4cf4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
foo/1a78d313f2891bd468f78694814a28a3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
foo/1ffe827beb75335731cb6f052a8ec3a6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
foo/255028f2f37838e92f84f27c68aaf4e1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
foo/27601d095e5b3761d9289584415a73cc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
foo/27f9116902c35a9b784c703762bbd249.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
foo/28408caa2961caecd35c9f8f7c1aecc5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
foo/27601d095e5b3761d9289584415a73cc.exe
-
Size
565KB
-
MD5
27601d095e5b3761d9289584415a73cc
-
SHA1
9570f23b5abe2ef46a23ded17adb2fb6c203a201
-
SHA256
749f5e042b317dc4e989c174d92936ef83d9d4fbf4c190f0e5b759b858b15cf4
-
SHA512
066263bf8f11d48b4e3715b8962686e0ca32aa8647b642a193b5331513538a44bb49edad5ef6a08ae6cc6401504fadc7adf38efb07c9ae9560e947aac443e0e7
-
SSDEEP
12288:REqmA0wfzInoQJUi1KHvQtzDNfo1arLaLRvs+Jkp/eH:RHmSyo+Ui13zZCI7+up/eH
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3956 WombatStarter.exe 3436 HPWombatSrv.exe 3752 WombatStarter.exe -
Loads dropped DLL 3 IoCs
pid Process 4732 27601d095e5b3761d9289584415a73cc.exe 4732 27601d095e5b3761d9289584415a73cc.exe 4732 27601d095e5b3761d9289584415a73cc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\4.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\5.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\HPWombatSrv.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\WombatStarter.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\uninstaller.exe 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\1.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\2.ico 27601d095e5b3761d9289584415a73cc.exe File created C:\Program Files (x86)\HPWombat\Resources\Icons\Browsers\3.ico 27601d095e5b3761d9289584415a73cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WombatStarter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27601d095e5b3761d9289584415a73cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WombatStarter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HPWombatSrv.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." HPWombatSrv.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4732 27601d095e5b3761d9289584415a73cc.exe 4732 27601d095e5b3761d9289584415a73cc.exe 4732 27601d095e5b3761d9289584415a73cc.exe 4732 27601d095e5b3761d9289584415a73cc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3956 4732 27601d095e5b3761d9289584415a73cc.exe 82 PID 4732 wrote to memory of 3956 4732 27601d095e5b3761d9289584415a73cc.exe 82 PID 4732 wrote to memory of 3956 4732 27601d095e5b3761d9289584415a73cc.exe 82 PID 4732 wrote to memory of 3752 4732 27601d095e5b3761d9289584415a73cc.exe 86 PID 4732 wrote to memory of 3752 4732 27601d095e5b3761d9289584415a73cc.exe 86 PID 4732 wrote to memory of 3752 4732 27601d095e5b3761d9289584415a73cc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\HPWombat\WombatStarter.exe"C:\Program Files (x86)\HPWombat\WombatStarter.exe" "install_and_start_srv" "C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3956
-
-
C:\Program Files (x86)\HPWombat\WombatStarter.exe"C:\Program Files (x86)\HPWombat\WombatStarter.exe" "write_patch_str_to_reg" "C:\Users\Admin\AppData\Local\Temp\foo\27601d095e5b3761d9289584415a73cc.exe" "HKLM" Software\HPWombat "jeromu"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Program Files (x86)\HPWombat\HPWombatSrv.exe"C:\Program Files (x86)\HPWombat\HPWombatSrv.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5bac2e4856879885af0251cb4cbb3d521
SHA1a8d3f6492e20e775c84f16a8ca6683a2c1aabc2d
SHA25618dd7fe65140120d10004e475effb1ce386d8f280094429f4654882120899d73
SHA5125d550a67764a54145808a12953435a5dd75d1bea8200f2872e288f1eb9f8c0b798db539289950b2c42a0cac4a55689fc65427d1c97afdf83a10881a74d7a1935
-
Filesize
1.3MB
MD5d23253f3a323a0a7c8ecfb08e1e0aa74
SHA1497bbf7fa1655f7fd921239a00d46c32acebf59d
SHA25678d7891f42d40171373088aff1bda3fbd5ed4275ac0166a0cfcc7c8001ed4b70
SHA512cc5072793d2bcefda3d59e145996bbeb47eac8a6887b7472d2ce3d64bcf46a3c9cd97a663920f4510e1ca6626258354dbc4e758a759b089f58d86fa8a4cb7b3d
-
Filesize
2KB
MD5011775df388c3f177e507dad060197d1
SHA18957b51506e75c7fca7817ab1d76b2fa6f6189d6
SHA2569c73ae85388adb7adc7d2e4a3fff4c4853b20435fd01097486afbf5099813999
SHA512b8b2ab9c15753db4b1396cf27c3b1a2a60e6dbf9cc687de771ecd8791f504b7fe3fcee265186c9c031675e162f7d84011636b940f5301a53bbf11e15f4e80e56
-
Filesize
2KB
MD5b366cfdee7903640f10470f870f213a6
SHA1a9d93346857d327cdc85efc8500299a07175b301
SHA2564c1f9f4a09a28048e8476e956c9a4032ccc7bb1c9eb5188dcc1bb297e5d5c5a9
SHA5125942160be6be90d48bc4f86d96abe61231f1aeefcc251eba766b112045c55df53e87e1b488a44ce8c682342e8489bc406f94faa639afcc9c75f905a7362ba6b8
-
Filesize
24KB
MD50f70de5c22874df2323f937f7b588bd4
SHA1ed306624cd687d9e506c7ecd2ac97b7aaf556ff6
SHA2567f5429361e0195d599ee05643e26985490b2ad85a08943e561898db3b365997b
SHA5129cc23c1c5fbd07d991adf002fcdfdc3118b5d3648ac2387ef255ddd1377e1f94926f6e466ffe61657858df8e50179f52d647c75637beb2cd833b4ee6e5dc556e
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firеfох.lnk
Filesize2KB
MD567c9e5c4ae60bfb6cd31fa5624cbc3b2
SHA135c6431447f3b635d04f3204f232557b37c8ca13
SHA256d52f973dd2e654238737b198d4624231da102bd40764bd07c73434fd43c00fd0
SHA512182adc6460472a9d5e886bc095d94928182440d655dfc87cbe9c2253b4fb7ff52d95c6ee49520c5a64dc4edb59772f6dca49840de9b76c54ada4b4c127c11c70
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Gооglе Сhrоmе.lnk
Filesize2KB
MD5ad84639109123778c808d4867853f9d8
SHA15371cbe48576c0abe911ec61df68b308538690f6
SHA2566261c3889dfbc6355aa7e1e78a3c158b31e4c4f8df499c6f09b4a3a72a6146ea
SHA512c4948e99bca0ed7d45a08d962e5b97d9d1b8fb4146ef53a69ac599abc3589500abee2118d534a11130bb2891eb4a6cdc58e607ddbe2e408f471c6d1cfd843b92
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Intеrnеt Ехрlоrеr.lnk
Filesize2KB
MD5b43e530bc507da9a7913afbf3f117e19
SHA1f2954c39c2d2cc97cc1e2a8ed6b7baa692cbb557
SHA256a31316c3ed73f06ab0ae78e387913d3eb81c5fe3606d74a271b6372dbd9df417
SHA5127fd5f8d7f8ace9052a5ec4eb35168bb30e9a6aa21eb1daa3817b2484561a20da0a505c86edf8d7219085f50cb156e1f8fa97807f840105fb943e9b7b54316d6a
-
Filesize
2KB
MD55b599ba1ca749dfe7f088a3670d1a4db
SHA15fb3e4b5ff9e0253d9f0e97b622d63b7e9e06f3f
SHA256b756e508f2374c4b50eee81567d0135adfd2db915899a2c7c67f5a13c9009c5a
SHA512cef0903409fec597c198ed5ad2765fef8559201dc5df5d8a1914c1c911a36ad5080b17838a3cadcd2e99f6ff73f33dedafc04dca99383ac4173dfef66447970d
-
Filesize
2KB
MD523de66f4d6b142328a6d1ad4b9c6d13b
SHA18a7a9d78b22b18c87b60ae22d830f534127eab21
SHA2568df52f37babbe3de36244688afc277ae48980fcec3c3362ed90eac353e579373
SHA512f01363ee2bbdbd6b7593608de4264dbfed18c94f6cdd148563828b6ce060505918bbafa9d99d9ddd33e6e70a7f31d9607dd4d71a37a340f1e4e79b0a273a62b2