Analysis

  • max time kernel
    152s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 06:45

General

  • Target

    b76f9a670a906e0b03014700ed435666d51383228262412625305bfd10bb2004.exe

  • Size

    512KB

  • MD5

    648f8d4d250edbc26eefc0bfdba3dcfb

  • SHA1

    8e93e054797353fe92755e4a9b9a4287cd2074b3

  • SHA256

    b76f9a670a906e0b03014700ed435666d51383228262412625305bfd10bb2004

  • SHA512

    cbf26dbfa63c3b3a5d07a7e453a12c9d8be1381c1238729bb7174a71bf3b934e56f2d513cbc989a8e9ba0b3a619a76cc143ca94f20286be7dc8a8185eaaff92d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6u:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5L

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b76f9a670a906e0b03014700ed435666d51383228262412625305bfd10bb2004.exe
    "C:\Users\Admin\AppData\Local\Temp\b76f9a670a906e0b03014700ed435666d51383228262412625305bfd10bb2004.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\SysWOW64\bhrbwcycdx.exe
      bhrbwcycdx.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\jysxvmuc.exe
        C:\Windows\system32\jysxvmuc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2096
    • C:\Windows\SysWOW64\hwxkvvrsppsxnfw.exe
      hwxkvvrsppsxnfw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1448
    • C:\Windows\SysWOW64\jysxvmuc.exe
      jysxvmuc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2252
    • C:\Windows\SysWOW64\ovsecejhyxdwl.exe
      ovsecejhyxdwl.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3932
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\bhrbwcycdx.exe

    Filesize

    512KB

    MD5

    200067ddb3c9c3e23e2fe2a6c116e66b

    SHA1

    10241b20280a57b977853b2beb32abacf8ab5a0a

    SHA256

    87fb0f89be60bebea1f5c1e189719cfa78338bffbbd83bbe5c314ff87bd4e61a

    SHA512

    b74a8f825aa7d07558ca48c6a24350a19770cb17d945c5ba1c4fe8ec097c45f6e37e3f43e35f4680d6e017ed0cb9b2f2e09f828dce59b7a108b22ca4732d6a76

  • C:\Windows\SysWOW64\bhrbwcycdx.exe

    Filesize

    512KB

    MD5

    200067ddb3c9c3e23e2fe2a6c116e66b

    SHA1

    10241b20280a57b977853b2beb32abacf8ab5a0a

    SHA256

    87fb0f89be60bebea1f5c1e189719cfa78338bffbbd83bbe5c314ff87bd4e61a

    SHA512

    b74a8f825aa7d07558ca48c6a24350a19770cb17d945c5ba1c4fe8ec097c45f6e37e3f43e35f4680d6e017ed0cb9b2f2e09f828dce59b7a108b22ca4732d6a76

  • C:\Windows\SysWOW64\hwxkvvrsppsxnfw.exe

    Filesize

    512KB

    MD5

    85c1049ad6daebf2e6157ad44408e85a

    SHA1

    62257aaa7f1e64d3c46918aaf39031c65bb75bfa

    SHA256

    9300329bc1f92285f172440f891d178775daa387652f3c027ef9244a36fb88d3

    SHA512

    51f7659ac6aba8f8f441361089ec7822f966e05042d047ee3993532f33e2519086a71c866b2d7c4058cd08ea0757f8fb53e86460a3dab97db5ec0f310b4ed175

  • C:\Windows\SysWOW64\hwxkvvrsppsxnfw.exe

    Filesize

    512KB

    MD5

    85c1049ad6daebf2e6157ad44408e85a

    SHA1

    62257aaa7f1e64d3c46918aaf39031c65bb75bfa

    SHA256

    9300329bc1f92285f172440f891d178775daa387652f3c027ef9244a36fb88d3

    SHA512

    51f7659ac6aba8f8f441361089ec7822f966e05042d047ee3993532f33e2519086a71c866b2d7c4058cd08ea0757f8fb53e86460a3dab97db5ec0f310b4ed175

  • C:\Windows\SysWOW64\jysxvmuc.exe

    Filesize

    512KB

    MD5

    4119a99a43fd0238e970e06dcca2714b

    SHA1

    df92cdf20413119a24fc83d4d81af67762fc6aa0

    SHA256

    dfb64e97b5a0ba251627bc158d350e85e4158c63394d6de6264ac30f626128f7

    SHA512

    1c0f446dd6cc448f94a1701f478e677f6e989a65c5b696128f2ad81c20ee089a17c8e409e2a564a86c178e81e4484506c1fa32f6a18975e6a2bb098024eab880

  • C:\Windows\SysWOW64\jysxvmuc.exe

    Filesize

    512KB

    MD5

    4119a99a43fd0238e970e06dcca2714b

    SHA1

    df92cdf20413119a24fc83d4d81af67762fc6aa0

    SHA256

    dfb64e97b5a0ba251627bc158d350e85e4158c63394d6de6264ac30f626128f7

    SHA512

    1c0f446dd6cc448f94a1701f478e677f6e989a65c5b696128f2ad81c20ee089a17c8e409e2a564a86c178e81e4484506c1fa32f6a18975e6a2bb098024eab880

  • C:\Windows\SysWOW64\jysxvmuc.exe

    Filesize

    512KB

    MD5

    4119a99a43fd0238e970e06dcca2714b

    SHA1

    df92cdf20413119a24fc83d4d81af67762fc6aa0

    SHA256

    dfb64e97b5a0ba251627bc158d350e85e4158c63394d6de6264ac30f626128f7

    SHA512

    1c0f446dd6cc448f94a1701f478e677f6e989a65c5b696128f2ad81c20ee089a17c8e409e2a564a86c178e81e4484506c1fa32f6a18975e6a2bb098024eab880

  • C:\Windows\SysWOW64\ovsecejhyxdwl.exe

    Filesize

    512KB

    MD5

    f2485814638ada9e8ef5c6795ecccede

    SHA1

    3672135079385e636d009e76da5e89ba0a7a1470

    SHA256

    8ee6bcca5ac41f17ff967baf8557333fdb5e901e014218660a00d56d4a48ac4a

    SHA512

    9e655f40424ef81036002d0459677c67fb72d94e88008da52ae73fca3d49feb5a91a11f9fb23d7f1a54c5da93d5ceb0a32edbc3e486b20a90c6c5d7a60c8bc3d

  • C:\Windows\SysWOW64\ovsecejhyxdwl.exe

    Filesize

    512KB

    MD5

    f2485814638ada9e8ef5c6795ecccede

    SHA1

    3672135079385e636d009e76da5e89ba0a7a1470

    SHA256

    8ee6bcca5ac41f17ff967baf8557333fdb5e901e014218660a00d56d4a48ac4a

    SHA512

    9e655f40424ef81036002d0459677c67fb72d94e88008da52ae73fca3d49feb5a91a11f9fb23d7f1a54c5da93d5ceb0a32edbc3e486b20a90c6c5d7a60c8bc3d

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    773a52ddaf02453769bbd79d788544f4

    SHA1

    b9b1db78cd379d918b04850264fefe058f3ae7f5

    SHA256

    7f84d3b737ed3446fde79f1711f2f1c5201b2586ff967be20239f6e0b77e79d0

    SHA512

    672f5140b589e20571acc2bc0aeb66c2a74e278c0acdcf900599c695caa7f985e8334832864f960f5cd36997a2c680575547e98ea473c90d137ebffcc0633708

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f6544f2e6bd87438db4fdf098fc4ed14

    SHA1

    2d6ef523038817d04ae318b32f00f5134c16f8c2

    SHA256

    039950ebb17a984aad38a25955c21eefe9ae57cc641fbe640be685af5cc0b8ba

    SHA512

    634a830351077b67fba07efdd2ba4f8bbc2abcb43c7e5afdaf8f3c66e3cfe51f70e2998e4d1947dc98908a4e2675d7a18b2291044fc32736c18c6521f3a5690a

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f6544f2e6bd87438db4fdf098fc4ed14

    SHA1

    2d6ef523038817d04ae318b32f00f5134c16f8c2

    SHA256

    039950ebb17a984aad38a25955c21eefe9ae57cc641fbe640be685af5cc0b8ba

    SHA512

    634a830351077b67fba07efdd2ba4f8bbc2abcb43c7e5afdaf8f3c66e3cfe51f70e2998e4d1947dc98908a4e2675d7a18b2291044fc32736c18c6521f3a5690a

  • memory/636-132-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2656-153-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-156-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-157-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-158-0x00007FFD2D9C0000-0x00007FFD2D9D0000-memory.dmp

    Filesize

    64KB

  • memory/2656-159-0x00007FFD2D9C0000-0x00007FFD2D9D0000-memory.dmp

    Filesize

    64KB

  • memory/2656-154-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-155-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-166-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-165-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-168-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB

  • memory/2656-167-0x00007FFD2FEF0000-0x00007FFD2FF00000-memory.dmp

    Filesize

    64KB