Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 13:58

General

  • Target

    872de1f88890b188659f5420741b5484cb885b85945a8e224ed74873bd9fb266.exe

  • Size

    255KB

  • MD5

    640a930480b7f31226546436130aee04

  • SHA1

    16d18a54c3a746fb6bab7a39064042eda5a2e94d

  • SHA256

    872de1f88890b188659f5420741b5484cb885b85945a8e224ed74873bd9fb266

  • SHA512

    0f2d39f183599c6c29fd5d97c3143c8f47d3b457517b67d758368acb68f0bbfeb09b243a13339728dd19fa7f1c5c1735f4e85a0749c3a8d3b5080dca485766e0

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJt:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI4

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\872de1f88890b188659f5420741b5484cb885b85945a8e224ed74873bd9fb266.exe
    "C:\Users\Admin\AppData\Local\Temp\872de1f88890b188659f5420741b5484cb885b85945a8e224ed74873bd9fb266.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\ylerdhrukb.exe
      ylerdhrukb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\canamoyw.exe
        C:\Windows\system32\canamoyw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1588
    • C:\Windows\SysWOW64\gqalctxygxkpshv.exe
      gqalctxygxkpshv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2392
    • C:\Windows\SysWOW64\canamoyw.exe
      canamoyw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2892
    • C:\Windows\SysWOW64\vrchwdfnvwiqr.exe
      vrchwdfnvwiqr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4312
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    7f44a4b06972dba4bd153b050d638a15

    SHA1

    734970423c805dc9af2e0dd9030c7a1c27abc198

    SHA256

    a3012d2f4a5b4c19cabef14bb48bf45093fb00e42dc34708cc421564006c617d

    SHA512

    13b54e88908ee1deb179bd5790faac28d8c61929feeee6d5e30eeaf5db324581af71d155990fb27652ce6eb63d17ed126a71965abd66c1548df2dbea6245ef7c

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    dbdf4b7b4da96b53cc2b907060932e65

    SHA1

    0eca4677f9611e3fa5ed2cf82b54791b819d7db6

    SHA256

    5bf90b8964122544eef5d4e902641822ccfde79deb01ced3f3e36c6c6cbebf51

    SHA512

    06aba05567b9e97a32d306a5005afb2eaa5530218d873a1a07e7855c1221c639ae3be207bdabd7c8061502194d405509491ef05328d2bc067ced4e85bf9b3742

  • C:\Users\Admin\Music\MeasureCopy.doc.exe

    Filesize

    255KB

    MD5

    68e7210994824eb91cb8571a861b76ae

    SHA1

    4d6262dda7ae187cfc5e1d2c56ca531a410a8a42

    SHA256

    7a3e810ce35fb93ce6592bf268fd70130f22eb7344c4e7decca337b57ce8a0f0

    SHA512

    bac419c8f79f2be67173785f3a67cfbbb61bd9b5d585a6bbc319e49dd4905d11d9f65bf8d34debe275c36be3664de93c3e841cc80055c55a9e37d52c9b126c13

  • C:\Windows\SysWOW64\canamoyw.exe

    Filesize

    255KB

    MD5

    a82aff4cf667d0431b1262a22bd8d292

    SHA1

    10a121e081433aa16f479019ee050cd8dded9e69

    SHA256

    7d9f7e0db1b1977c9cf841e6a70896995516c66a695d8fe04ba8a291dc5e146e

    SHA512

    9bcd9c1a50bce331bd821699e9ca18485ea7b9dd9020603807b1fe298a999dab187ed593203d06f47148ca5bd03b3fca49aa2a2798a8e72c4266b1829d8ff68b

  • C:\Windows\SysWOW64\canamoyw.exe

    Filesize

    255KB

    MD5

    a82aff4cf667d0431b1262a22bd8d292

    SHA1

    10a121e081433aa16f479019ee050cd8dded9e69

    SHA256

    7d9f7e0db1b1977c9cf841e6a70896995516c66a695d8fe04ba8a291dc5e146e

    SHA512

    9bcd9c1a50bce331bd821699e9ca18485ea7b9dd9020603807b1fe298a999dab187ed593203d06f47148ca5bd03b3fca49aa2a2798a8e72c4266b1829d8ff68b

  • C:\Windows\SysWOW64\canamoyw.exe

    Filesize

    255KB

    MD5

    a82aff4cf667d0431b1262a22bd8d292

    SHA1

    10a121e081433aa16f479019ee050cd8dded9e69

    SHA256

    7d9f7e0db1b1977c9cf841e6a70896995516c66a695d8fe04ba8a291dc5e146e

    SHA512

    9bcd9c1a50bce331bd821699e9ca18485ea7b9dd9020603807b1fe298a999dab187ed593203d06f47148ca5bd03b3fca49aa2a2798a8e72c4266b1829d8ff68b

  • C:\Windows\SysWOW64\gqalctxygxkpshv.exe

    Filesize

    255KB

    MD5

    a9a7147b8388196e124fddc63142b752

    SHA1

    b4f9f801fb5cac70477ede22cca7b344ad68ae64

    SHA256

    2d08a0c3a077f2cd8e6b778c82b37388a1435f05751427148b4c0cc9d50a9594

    SHA512

    dfbd26abda68f29c00c88e856c67e67892589be1c9c8dde3ee8745b4332162d2d5f5bb723b38a5723958bd207e3dd246c9281f971d4b804a27b2dd56ac568141

  • C:\Windows\SysWOW64\gqalctxygxkpshv.exe

    Filesize

    255KB

    MD5

    a9a7147b8388196e124fddc63142b752

    SHA1

    b4f9f801fb5cac70477ede22cca7b344ad68ae64

    SHA256

    2d08a0c3a077f2cd8e6b778c82b37388a1435f05751427148b4c0cc9d50a9594

    SHA512

    dfbd26abda68f29c00c88e856c67e67892589be1c9c8dde3ee8745b4332162d2d5f5bb723b38a5723958bd207e3dd246c9281f971d4b804a27b2dd56ac568141

  • C:\Windows\SysWOW64\vrchwdfnvwiqr.exe

    Filesize

    255KB

    MD5

    0591a024c92221a5935fc2dcc276cb1c

    SHA1

    bfdb71445090a9ed2eaad280a416ff016f9f369b

    SHA256

    c2965106be3a2ede764733fe0128d81e7e64d84f122c11eb9e3aca616392fb7d

    SHA512

    67cd690b9ab8621c97b5768e1cf9a749e2de018eb8e5c9e39e6080569263c9dc892acb3f44de95ecbbf0bb73bb2e9ff6a57df45e6a93e80163711c62d0cb2fae

  • C:\Windows\SysWOW64\vrchwdfnvwiqr.exe

    Filesize

    255KB

    MD5

    0591a024c92221a5935fc2dcc276cb1c

    SHA1

    bfdb71445090a9ed2eaad280a416ff016f9f369b

    SHA256

    c2965106be3a2ede764733fe0128d81e7e64d84f122c11eb9e3aca616392fb7d

    SHA512

    67cd690b9ab8621c97b5768e1cf9a749e2de018eb8e5c9e39e6080569263c9dc892acb3f44de95ecbbf0bb73bb2e9ff6a57df45e6a93e80163711c62d0cb2fae

  • C:\Windows\SysWOW64\ylerdhrukb.exe

    Filesize

    255KB

    MD5

    bb242820a90914615b35e5073e6433e2

    SHA1

    dd69d4e0074af631058266c4235a31322a3c5b28

    SHA256

    6a8a5c6443b2bf699261bc397d4a139542cfbf7665f251728c8ccb4c6884578e

    SHA512

    ae7e20a288b18025caf0bdb65c45e5b93601c3936f18714a937667706f33c2bd31ed8ace60a95ad13f809f4899226599a0961912060ee86098f9b402fb5ea8e1

  • C:\Windows\SysWOW64\ylerdhrukb.exe

    Filesize

    255KB

    MD5

    bb242820a90914615b35e5073e6433e2

    SHA1

    dd69d4e0074af631058266c4235a31322a3c5b28

    SHA256

    6a8a5c6443b2bf699261bc397d4a139542cfbf7665f251728c8ccb4c6884578e

    SHA512

    ae7e20a288b18025caf0bdb65c45e5b93601c3936f18714a937667706f33c2bd31ed8ace60a95ad13f809f4899226599a0961912060ee86098f9b402fb5ea8e1

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    549189ed0858972cf31a7b11e51faa5f

    SHA1

    6bdda34645c5f24ab6442c8de2b5ab6f96a7f78f

    SHA256

    5d9440160e5da605e0b8df0c08fbbdf4a351f52198d6dec13c5f127f13f51450

    SHA512

    3cdf4301827433a34f55a54390d3b44066e46b5c5819ed06e7e5d9bbe2d1660a4575f15ab2cf80f01cbb570a9ed87f6f454c2df9e5aa43bd5f592694575a2c17

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    560e463d672929796ddef79523682744

    SHA1

    59bead314f81457d20973b00e30a7a8d5efeb122

    SHA256

    b05899485ed0b7e3fde4616b4a37708ba6e620f70d6b32f4b42b850bdd33de4f

    SHA512

    24965034370efb9bdb6413b92a5a6bd3d7dd9c0cef50d9792ae749b8c14da175024f91b18f24d4121ee3e0f5cb627a921793069c8dfcc1239d7aba021e10c342

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    560e463d672929796ddef79523682744

    SHA1

    59bead314f81457d20973b00e30a7a8d5efeb122

    SHA256

    b05899485ed0b7e3fde4616b4a37708ba6e620f70d6b32f4b42b850bdd33de4f

    SHA512

    24965034370efb9bdb6413b92a5a6bd3d7dd9c0cef50d9792ae749b8c14da175024f91b18f24d4121ee3e0f5cb627a921793069c8dfcc1239d7aba021e10c342

  • memory/1052-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1052-149-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1588-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1588-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1588-179-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2392-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2392-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2884-143-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2884-164-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2892-178-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2892-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2892-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4312-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4312-168-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5032-154-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-155-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-160-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmp

    Filesize

    64KB

  • memory/5032-159-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmp

    Filesize

    64KB

  • memory/5032-158-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-175-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-176-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-174-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-177-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-157-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-156-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmp

    Filesize

    64KB