Analysis

  • max time kernel
    153s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 10:49

General

  • Target

    a41cf80c9a56d72b2ef372d7da1ae94124f14871b6a5960cbbdd797705298f37.exe

  • Size

    255KB

  • MD5

    426895388467fdeb07a42bfe91e6bc86

  • SHA1

    e3c94bb5fde59a105e6967fec07a2ec23692d207

  • SHA256

    a41cf80c9a56d72b2ef372d7da1ae94124f14871b6a5960cbbdd797705298f37

  • SHA512

    ecd776b0d1b81b6a50564a1bfcd4c7c6f6a61b5d1173fb5715f547a725cea0c5c1e50fdd9abc55996173ed15541fdaf3ad82a6db6c8744a0b48c4b0c8c2da56c

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6Z:Plf5j6zCNa0xeE3m2

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a41cf80c9a56d72b2ef372d7da1ae94124f14871b6a5960cbbdd797705298f37.exe
    "C:\Users\Admin\AppData\Local\Temp\a41cf80c9a56d72b2ef372d7da1ae94124f14871b6a5960cbbdd797705298f37.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\SysWOW64\tfgrgntfnj.exe
      tfgrgntfnj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\jdwgkjxb.exe
        C:\Windows\system32\jdwgkjxb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1496
    • C:\Windows\SysWOW64\paiqjslhcliuldm.exe
      paiqjslhcliuldm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1960
    • C:\Windows\SysWOW64\jdwgkjxb.exe
      jdwgkjxb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1664
    • C:\Windows\SysWOW64\ogdxqwebjwlat.exe
      ogdxqwebjwlat.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1288
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1236

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      ee9c6dfe8c2d3a2061d811fc2376d84c

      SHA1

      63864d780ce37cdbd6826f072bdff078fc16ef2b

      SHA256

      dac0351e86b3eea5b93dea93a6f326a1e59ed9f123ddf6067a718d639b234b96

      SHA512

      72403b5d9e70fabb91a80565a9eb92f306ef53b0f5edf81071c09be82d31d077458c880d7e04dddfc7da10da55cec805f9d6f2a8025cade733b760b315fc1aa8

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      ee9c6dfe8c2d3a2061d811fc2376d84c

      SHA1

      63864d780ce37cdbd6826f072bdff078fc16ef2b

      SHA256

      dac0351e86b3eea5b93dea93a6f326a1e59ed9f123ddf6067a718d639b234b96

      SHA512

      72403b5d9e70fabb91a80565a9eb92f306ef53b0f5edf81071c09be82d31d077458c880d7e04dddfc7da10da55cec805f9d6f2a8025cade733b760b315fc1aa8

    • C:\Windows\SysWOW64\jdwgkjxb.exe

      Filesize

      255KB

      MD5

      7bda95848a45ccfb839e73393ce2613b

      SHA1

      4018b1805cc66acf207b9a44c78a9fee2a988405

      SHA256

      9a0743f2f3cf9ba29807df90f9c4663cbd2b5e62187637fa9dd6b25f0576de40

      SHA512

      d241c793291550f5f5f1a3f5f4d6669110bac696d83e01df3ba1a37a59868019fff2b50b066ab4f59597a069bf71a8d50f4e6e062ae416faefaa231ff241ee3a

    • C:\Windows\SysWOW64\jdwgkjxb.exe

      Filesize

      255KB

      MD5

      7bda95848a45ccfb839e73393ce2613b

      SHA1

      4018b1805cc66acf207b9a44c78a9fee2a988405

      SHA256

      9a0743f2f3cf9ba29807df90f9c4663cbd2b5e62187637fa9dd6b25f0576de40

      SHA512

      d241c793291550f5f5f1a3f5f4d6669110bac696d83e01df3ba1a37a59868019fff2b50b066ab4f59597a069bf71a8d50f4e6e062ae416faefaa231ff241ee3a

    • C:\Windows\SysWOW64\jdwgkjxb.exe

      Filesize

      255KB

      MD5

      7bda95848a45ccfb839e73393ce2613b

      SHA1

      4018b1805cc66acf207b9a44c78a9fee2a988405

      SHA256

      9a0743f2f3cf9ba29807df90f9c4663cbd2b5e62187637fa9dd6b25f0576de40

      SHA512

      d241c793291550f5f5f1a3f5f4d6669110bac696d83e01df3ba1a37a59868019fff2b50b066ab4f59597a069bf71a8d50f4e6e062ae416faefaa231ff241ee3a

    • C:\Windows\SysWOW64\ogdxqwebjwlat.exe

      Filesize

      255KB

      MD5

      3812457e95e54f9eb67271d1d8ac2919

      SHA1

      e082a232490b42cdbe89ca8d4654a2e0df14253f

      SHA256

      3ec92cc8d3f4918ea473b2350a7426dae09b7e6fddc34ec66f3459fe8445d2a4

      SHA512

      30fdc83492e3948360f794c12029c80d4e16d87dc53dd39019fa4ddfdabffa9cbb358909380cc538d5073fae0d6a7145c2f209ce84db20cd5b0a98b96ee8494c

    • C:\Windows\SysWOW64\ogdxqwebjwlat.exe

      Filesize

      255KB

      MD5

      3812457e95e54f9eb67271d1d8ac2919

      SHA1

      e082a232490b42cdbe89ca8d4654a2e0df14253f

      SHA256

      3ec92cc8d3f4918ea473b2350a7426dae09b7e6fddc34ec66f3459fe8445d2a4

      SHA512

      30fdc83492e3948360f794c12029c80d4e16d87dc53dd39019fa4ddfdabffa9cbb358909380cc538d5073fae0d6a7145c2f209ce84db20cd5b0a98b96ee8494c

    • C:\Windows\SysWOW64\paiqjslhcliuldm.exe

      Filesize

      255KB

      MD5

      825b16ce83fbb5d6a0fb7438f9614a16

      SHA1

      855f27f99a8026562160dab4fd1e7810ffd32384

      SHA256

      a5fd51a125ed64212c0194f526eb8ce0363a2cf1c0cba5226da8e48040564b82

      SHA512

      4258f02e28f7c82c55b50384dd4dab9718e95bda176c44623b84bcb12591ee96c7e071d831acad7625121e4479f869cde6b1257434d3d0d48606093677c96111

    • C:\Windows\SysWOW64\paiqjslhcliuldm.exe

      Filesize

      255KB

      MD5

      825b16ce83fbb5d6a0fb7438f9614a16

      SHA1

      855f27f99a8026562160dab4fd1e7810ffd32384

      SHA256

      a5fd51a125ed64212c0194f526eb8ce0363a2cf1c0cba5226da8e48040564b82

      SHA512

      4258f02e28f7c82c55b50384dd4dab9718e95bda176c44623b84bcb12591ee96c7e071d831acad7625121e4479f869cde6b1257434d3d0d48606093677c96111

    • C:\Windows\SysWOW64\tfgrgntfnj.exe

      Filesize

      255KB

      MD5

      467ada58acbf93341d70cad4b2c0993a

      SHA1

      e3c3ea4f4589070e68f2b66943397862ba28ef45

      SHA256

      d8f659da4f2110ce8ab041f2ece8b24652acaab6539894d72b6d8ecdbbc1e9ac

      SHA512

      a0bfd4e4dae5d79f3348bff6ef9d336c321bd3dc980828ee5f6be997011e7cd6aea61ed2bc48f161b3e9189cd885db7266e40b51454748a73707b762c37a020a

    • C:\Windows\SysWOW64\tfgrgntfnj.exe

      Filesize

      255KB

      MD5

      467ada58acbf93341d70cad4b2c0993a

      SHA1

      e3c3ea4f4589070e68f2b66943397862ba28ef45

      SHA256

      d8f659da4f2110ce8ab041f2ece8b24652acaab6539894d72b6d8ecdbbc1e9ac

      SHA512

      a0bfd4e4dae5d79f3348bff6ef9d336c321bd3dc980828ee5f6be997011e7cd6aea61ed2bc48f161b3e9189cd885db7266e40b51454748a73707b762c37a020a

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\jdwgkjxb.exe

      Filesize

      255KB

      MD5

      7bda95848a45ccfb839e73393ce2613b

      SHA1

      4018b1805cc66acf207b9a44c78a9fee2a988405

      SHA256

      9a0743f2f3cf9ba29807df90f9c4663cbd2b5e62187637fa9dd6b25f0576de40

      SHA512

      d241c793291550f5f5f1a3f5f4d6669110bac696d83e01df3ba1a37a59868019fff2b50b066ab4f59597a069bf71a8d50f4e6e062ae416faefaa231ff241ee3a

    • \Windows\SysWOW64\jdwgkjxb.exe

      Filesize

      255KB

      MD5

      7bda95848a45ccfb839e73393ce2613b

      SHA1

      4018b1805cc66acf207b9a44c78a9fee2a988405

      SHA256

      9a0743f2f3cf9ba29807df90f9c4663cbd2b5e62187637fa9dd6b25f0576de40

      SHA512

      d241c793291550f5f5f1a3f5f4d6669110bac696d83e01df3ba1a37a59868019fff2b50b066ab4f59597a069bf71a8d50f4e6e062ae416faefaa231ff241ee3a

    • \Windows\SysWOW64\ogdxqwebjwlat.exe

      Filesize

      255KB

      MD5

      3812457e95e54f9eb67271d1d8ac2919

      SHA1

      e082a232490b42cdbe89ca8d4654a2e0df14253f

      SHA256

      3ec92cc8d3f4918ea473b2350a7426dae09b7e6fddc34ec66f3459fe8445d2a4

      SHA512

      30fdc83492e3948360f794c12029c80d4e16d87dc53dd39019fa4ddfdabffa9cbb358909380cc538d5073fae0d6a7145c2f209ce84db20cd5b0a98b96ee8494c

    • \Windows\SysWOW64\paiqjslhcliuldm.exe

      Filesize

      255KB

      MD5

      825b16ce83fbb5d6a0fb7438f9614a16

      SHA1

      855f27f99a8026562160dab4fd1e7810ffd32384

      SHA256

      a5fd51a125ed64212c0194f526eb8ce0363a2cf1c0cba5226da8e48040564b82

      SHA512

      4258f02e28f7c82c55b50384dd4dab9718e95bda176c44623b84bcb12591ee96c7e071d831acad7625121e4479f869cde6b1257434d3d0d48606093677c96111

    • \Windows\SysWOW64\tfgrgntfnj.exe

      Filesize

      255KB

      MD5

      467ada58acbf93341d70cad4b2c0993a

      SHA1

      e3c3ea4f4589070e68f2b66943397862ba28ef45

      SHA256

      d8f659da4f2110ce8ab041f2ece8b24652acaab6539894d72b6d8ecdbbc1e9ac

      SHA512

      a0bfd4e4dae5d79f3348bff6ef9d336c321bd3dc980828ee5f6be997011e7cd6aea61ed2bc48f161b3e9189cd885db7266e40b51454748a73707b762c37a020a

    • memory/1204-76-0x0000000002F50000-0x0000000002FF0000-memory.dmp

      Filesize

      640KB

    • memory/1204-78-0x0000000002F50000-0x0000000002FF0000-memory.dmp

      Filesize

      640KB

    • memory/1204-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-55-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1204-54-0x0000000075601000-0x0000000075603000-memory.dmp

      Filesize

      8KB

    • memory/1236-105-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp

      Filesize

      8KB

    • memory/1288-81-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1288-98-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1496-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1496-109-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1496-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1532-107-0x0000000070F3D000-0x0000000070F48000-memory.dmp

      Filesize

      44KB

    • memory/1532-91-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1532-92-0x0000000070F3D000-0x0000000070F48000-memory.dmp

      Filesize

      44KB

    • memory/1532-106-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1532-89-0x000000006FF51000-0x000000006FF53000-memory.dmp

      Filesize

      8KB

    • memory/1532-101-0x0000000070F3D000-0x0000000070F48000-memory.dmp

      Filesize

      44KB

    • memory/1532-88-0x00000000724D1000-0x00000000724D4000-memory.dmp

      Filesize

      12KB

    • memory/1664-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1664-108-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1664-80-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1772-99-0x0000000003850000-0x00000000038F0000-memory.dmp

      Filesize

      640KB

    • memory/1772-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1772-77-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1960-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1960-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB