Analysis

  • max time kernel
    153s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 10:05

General

  • Target

    cbef281dd4dd1985240a1673b86c9b6bd462739d9f3fbc383d8460daf431e24f.exe

  • Size

    512KB

  • MD5

    02b990bdbb7a20576113c81bbe3956e1

  • SHA1

    f13a83c540aa9f85bd49655f4f70f309f7cebdd5

  • SHA256

    cbef281dd4dd1985240a1673b86c9b6bd462739d9f3fbc383d8460daf431e24f

  • SHA512

    84d58199a31069bae52318075c6a6c4478805d35636815ead78a182f49c18917be66ec937dfdbe804992820efedbb360529888c60e354c37512623c7c3aea1d1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6i:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbef281dd4dd1985240a1673b86c9b6bd462739d9f3fbc383d8460daf431e24f.exe
    "C:\Users\Admin\AppData\Local\Temp\cbef281dd4dd1985240a1673b86c9b6bd462739d9f3fbc383d8460daf431e24f.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\qgcqjrvrlh.exe
      qgcqjrvrlh.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Windows\SysWOW64\xtjfwkfs.exe
        C:\Windows\system32\xtjfwkfs.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3744
    • C:\Windows\SysWOW64\hixxvefbsdzqrym.exe
      hixxvefbsdzqrym.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3176
    • C:\Windows\SysWOW64\xtjfwkfs.exe
      xtjfwkfs.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1960
    • C:\Windows\SysWOW64\usctvbqgnplat.exe
      usctvbqgnplat.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:212
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    e50588e9bb18236ad3419153a4889343

    SHA1

    0f357272518889d1f8073f7c6baaad29f6204565

    SHA256

    009627fcf317a08909ce15be3352aca843f9f8ac8a18a9468e06b6746424d6a6

    SHA512

    1693239d1f84ab94d20746832427b224279cdbf3c7f46349ccbcecc625739a0bb14ad7e77f482da505a9c0feba789fd4126ca04869a176aa571127e51c7b1deb

  • C:\Windows\SysWOW64\hixxvefbsdzqrym.exe

    Filesize

    512KB

    MD5

    2d790f3cbb2690018fb81988023f9396

    SHA1

    c813ae5940ebaab440e8bac88dd6ea9f4f2b060c

    SHA256

    ac8335f0dea2092ea1740652e0d1bcd0c1e4efe326a025d909ffcb6f5e0c7eba

    SHA512

    d1692fcef72f3aa4a3ae8cdc196a575d614ddcf1b09cc48d9da9028c7632399e754289d4e9a3798bc523515255133b45ac99047c7908427128e277a26f049238

  • C:\Windows\SysWOW64\hixxvefbsdzqrym.exe

    Filesize

    512KB

    MD5

    2d790f3cbb2690018fb81988023f9396

    SHA1

    c813ae5940ebaab440e8bac88dd6ea9f4f2b060c

    SHA256

    ac8335f0dea2092ea1740652e0d1bcd0c1e4efe326a025d909ffcb6f5e0c7eba

    SHA512

    d1692fcef72f3aa4a3ae8cdc196a575d614ddcf1b09cc48d9da9028c7632399e754289d4e9a3798bc523515255133b45ac99047c7908427128e277a26f049238

  • C:\Windows\SysWOW64\qgcqjrvrlh.exe

    Filesize

    512KB

    MD5

    926f0a1f9a519c637b9cf6d9514b6f4f

    SHA1

    640fc17535e2f15080037ee11b0b08194df4ee30

    SHA256

    68ad3af12d134cedee7f821e81a0160ccb012ce6bf4611a821a0c1025ca45a9c

    SHA512

    339d7fe08d0ddca807af8c048a308cc4c5845c61f000baa44ba4ad6f2713520924ec9d34fccdb9f00a23ae1edeabfe97e36a173fd1784cbe1f008f6d1d98b2d7

  • C:\Windows\SysWOW64\qgcqjrvrlh.exe

    Filesize

    512KB

    MD5

    926f0a1f9a519c637b9cf6d9514b6f4f

    SHA1

    640fc17535e2f15080037ee11b0b08194df4ee30

    SHA256

    68ad3af12d134cedee7f821e81a0160ccb012ce6bf4611a821a0c1025ca45a9c

    SHA512

    339d7fe08d0ddca807af8c048a308cc4c5845c61f000baa44ba4ad6f2713520924ec9d34fccdb9f00a23ae1edeabfe97e36a173fd1784cbe1f008f6d1d98b2d7

  • C:\Windows\SysWOW64\usctvbqgnplat.exe

    Filesize

    512KB

    MD5

    9288773a1d06e08f085e112e4ded18ff

    SHA1

    1925ad1d6a9cebb41570271c39b84c7b1bf7af88

    SHA256

    e3993971d0430c88ca9c46d97493ec3835f161e0e62fc7fd6cc20ce8547b5481

    SHA512

    5fe85870acaaee8cde55d81873910ecf887536948b51561a506c8c72f6854734bdfeeeb81842ba22a9cc01f8682af789dd8acf21af7f83953f1f3e03abe9d36a

  • C:\Windows\SysWOW64\usctvbqgnplat.exe

    Filesize

    512KB

    MD5

    9288773a1d06e08f085e112e4ded18ff

    SHA1

    1925ad1d6a9cebb41570271c39b84c7b1bf7af88

    SHA256

    e3993971d0430c88ca9c46d97493ec3835f161e0e62fc7fd6cc20ce8547b5481

    SHA512

    5fe85870acaaee8cde55d81873910ecf887536948b51561a506c8c72f6854734bdfeeeb81842ba22a9cc01f8682af789dd8acf21af7f83953f1f3e03abe9d36a

  • C:\Windows\SysWOW64\xtjfwkfs.exe

    Filesize

    512KB

    MD5

    f3f748c117cd1bee7ca1fa68d7ef771b

    SHA1

    b7fc4b20746110edfcefca0c576cdd94b1e709c4

    SHA256

    ed11a1bef86bc77d6a2d70f9e55ae63ca9a80db177b02525717212c6bf942792

    SHA512

    09eb60a52cc72d2c1a991dcff55f061344892449b50663f9c34ce652d1d5ddeb269bdabaee487dae71927b77b62f6161fa29f6c13ecdab3e4deb687f3d60556e

  • C:\Windows\SysWOW64\xtjfwkfs.exe

    Filesize

    512KB

    MD5

    f3f748c117cd1bee7ca1fa68d7ef771b

    SHA1

    b7fc4b20746110edfcefca0c576cdd94b1e709c4

    SHA256

    ed11a1bef86bc77d6a2d70f9e55ae63ca9a80db177b02525717212c6bf942792

    SHA512

    09eb60a52cc72d2c1a991dcff55f061344892449b50663f9c34ce652d1d5ddeb269bdabaee487dae71927b77b62f6161fa29f6c13ecdab3e4deb687f3d60556e

  • C:\Windows\SysWOW64\xtjfwkfs.exe

    Filesize

    512KB

    MD5

    f3f748c117cd1bee7ca1fa68d7ef771b

    SHA1

    b7fc4b20746110edfcefca0c576cdd94b1e709c4

    SHA256

    ed11a1bef86bc77d6a2d70f9e55ae63ca9a80db177b02525717212c6bf942792

    SHA512

    09eb60a52cc72d2c1a991dcff55f061344892449b50663f9c34ce652d1d5ddeb269bdabaee487dae71927b77b62f6161fa29f6c13ecdab3e4deb687f3d60556e

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/3408-159-0x00007FFCA0730000-0x00007FFCA0740000-memory.dmp

    Filesize

    64KB

  • memory/3408-158-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-166-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-154-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-155-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-156-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-157-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-165-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-160-0x00007FFCA0730000-0x00007FFCA0740000-memory.dmp

    Filesize

    64KB

  • memory/3408-164-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/3408-163-0x00007FFCA2C70000-0x00007FFCA2C80000-memory.dmp

    Filesize

    64KB

  • memory/4900-132-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB