Overview
overview
7Static
static
3WinThruster/En.chm
windows7-x64
1WinThruster/En.chm
windows10-2004-x64
1WinThruste...ge.url
windows7-x64
6WinThruste...ge.url
windows10-2004-x64
3WinThruste...ns.exe
windows7-x64
7WinThruste...ns.exe
windows10-2004-x64
7WinThruste...er.exe
windows7-x64
7WinThruste...er.exe
windows10-2004-x64
7WinThruste...e3.dll
windows7-x64
3WinThruste...e3.dll
windows10-2004-x64
3WinThruste...00.exe
windows7-x64
7WinThruste...00.exe
windows10-2004-x64
7Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
WinThruster/En.chm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
WinThruster/En.chm
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
WinThruster/HomePage.url
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
WinThruster/HomePage.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
WinThruster/WTNotifications.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
WinThruster/WTNotifications.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
WinThruster/WinThruster.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
WinThruster/WinThruster.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
WinThruster/sqlite3.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
WinThruster/sqlite3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
WinThruster/unins000.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
WinThruster/unins000.exe
Resource
win10v2004-20240508-en
General
-
Target
WinThruster/unins000.exe
-
Size
3.1MB
-
MD5
b0e00a066ca1d50cd7e20e89ae392070
-
SHA1
ca272060ab5cce765849e482f663d2d6d14cb8e9
-
SHA256
23ac412357b91ca18622d1e10762ef4aa6f056711bafd01f7ee5b989a2d1f599
-
SHA512
507026af984db33ab06477d17634bf9eb120c340e02049a9908380d175a77051e4c483f605b1015eea5f15a8808ab9b477f2e76f834272c346d0abb535e756ee
-
SSDEEP
49152:aEA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTVM3338O:q92bz2Eb6pd7B6bAGx7C333T
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
_iu14D2N.tmppid process 904 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
Processes:
_iu14D2N.tmppid process 904 _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
_iu14D2N.tmppid process 904 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
unins000.exe_iu14D2N.tmpdescription pid process target process PID 4456 wrote to memory of 904 4456 unins000.exe _iu14D2N.tmp PID 4456 wrote to memory of 904 4456 unins000.exe _iu14D2N.tmp PID 4456 wrote to memory of 904 4456 unins000.exe _iu14D2N.tmp PID 904 wrote to memory of 4472 904 _iu14D2N.tmp Schtasks.exe PID 904 wrote to memory of 4472 904 _iu14D2N.tmp Schtasks.exe PID 904 wrote to memory of 4472 904 _iu14D2N.tmp Schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinThruster\unins000.exe"C:\Users\Admin\AppData\Local\Temp\WinThruster\unins000.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\WinThruster\unins000.exe" /FIRSTPHASEWND=$900DE2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Schtasks.exe"Schtasks" /Delete /TN "WinThruster automatic scan and notifications" /F3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmpFilesize
3.1MB
MD5b0e00a066ca1d50cd7e20e89ae392070
SHA1ca272060ab5cce765849e482f663d2d6d14cb8e9
SHA25623ac412357b91ca18622d1e10762ef4aa6f056711bafd01f7ee5b989a2d1f599
SHA512507026af984db33ab06477d17634bf9eb120c340e02049a9908380d175a77051e4c483f605b1015eea5f15a8808ab9b477f2e76f834272c346d0abb535e756ee
-
memory/904-6-0x0000000000C80000-0x0000000000C81000-memory.dmpFilesize
4KB
-
memory/904-9-0x0000000000400000-0x000000000071D000-memory.dmpFilesize
3.1MB
-
memory/904-11-0x0000000000400000-0x000000000071D000-memory.dmpFilesize
3.1MB
-
memory/4456-0-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/4456-8-0x0000000000400000-0x000000000071D000-memory.dmpFilesize
3.1MB