Analysis

  • max time kernel
    156s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 16:44

General

  • Target

    1e23132b8db1e56d20c9e915cd8cfac60e1cb85d70a1272355f0af7fc097ced2.exe

  • Size

    255KB

  • MD5

    8459365432914e1c8d8ee9f7788f8f50

  • SHA1

    cc92ee546f3d3c5748a515ac1f7714a814edaf31

  • SHA256

    1e23132b8db1e56d20c9e915cd8cfac60e1cb85d70a1272355f0af7fc097ced2

  • SHA512

    e3d40d89482d3a2d01b503feaf19fde64d0917f86073550cacf1acf4bf99b35f2b88a18b448228aa39f79496febce22d5e566e609ec02feb2d16b8a73a389ecb

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJB:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e23132b8db1e56d20c9e915cd8cfac60e1cb85d70a1272355f0af7fc097ced2.exe
    "C:\Users\Admin\AppData\Local\Temp\1e23132b8db1e56d20c9e915cd8cfac60e1cb85d70a1272355f0af7fc097ced2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\SysWOW64\zqbnwvfgau.exe
      zqbnwvfgau.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\kjvrhpfr.exe
        C:\Windows\system32\kjvrhpfr.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1540
    • C:\Windows\SysWOW64\modnjizlduotrpf.exe
      modnjizlduotrpf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ipllqdtdttqdi.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Windows\SysWOW64\ipllqdtdttqdi.exe
          ipllqdtdttqdi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1068
    • C:\Windows\SysWOW64\kjvrhpfr.exe
      kjvrhpfr.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:276
    • C:\Windows\SysWOW64\ipllqdtdttqdi.exe
      ipllqdtdttqdi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:520
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ipllqdtdttqdi.exe

      Filesize

      255KB

      MD5

      d7fb450d56e88fd0ce4e0c9cb7c88c58

      SHA1

      6662796732b4c0c46c63ffa76a8d249f9dde2de7

      SHA256

      ff4797e4f9a55efe40f5ec7ffae66f7d4d386b0a06b56a1b36d9f499ef418c42

      SHA512

      b2fb2732362a9eb22e38193ef910e97651f9e921e8f1fda442e6ca5b070500d51b04472e5b4a5f99b042a8765dede484e7dc162aec80669a8f04f69015f03828

    • C:\Windows\SysWOW64\ipllqdtdttqdi.exe

      Filesize

      255KB

      MD5

      d7fb450d56e88fd0ce4e0c9cb7c88c58

      SHA1

      6662796732b4c0c46c63ffa76a8d249f9dde2de7

      SHA256

      ff4797e4f9a55efe40f5ec7ffae66f7d4d386b0a06b56a1b36d9f499ef418c42

      SHA512

      b2fb2732362a9eb22e38193ef910e97651f9e921e8f1fda442e6ca5b070500d51b04472e5b4a5f99b042a8765dede484e7dc162aec80669a8f04f69015f03828

    • C:\Windows\SysWOW64\ipllqdtdttqdi.exe

      Filesize

      255KB

      MD5

      d7fb450d56e88fd0ce4e0c9cb7c88c58

      SHA1

      6662796732b4c0c46c63ffa76a8d249f9dde2de7

      SHA256

      ff4797e4f9a55efe40f5ec7ffae66f7d4d386b0a06b56a1b36d9f499ef418c42

      SHA512

      b2fb2732362a9eb22e38193ef910e97651f9e921e8f1fda442e6ca5b070500d51b04472e5b4a5f99b042a8765dede484e7dc162aec80669a8f04f69015f03828

    • C:\Windows\SysWOW64\kjvrhpfr.exe

      Filesize

      255KB

      MD5

      ca2ee9522fa4cbdcd83c8de40f84fb94

      SHA1

      3f5b23b5cd47e09ab3c771bf84349d4bef9d0af0

      SHA256

      a7be2eefd439cb8363a4749569200e986bfc770bde5f7c4034a0a4661ac12f90

      SHA512

      b38194dba95f8d1c66e69b8593111d24293dcc2498ab2d8d91d7840a02c2ca21961e42aaac2eef2ddae94a65fda12b8f2cf2729a0b86f1f2330cc3366bc596d5

    • C:\Windows\SysWOW64\kjvrhpfr.exe

      Filesize

      255KB

      MD5

      ca2ee9522fa4cbdcd83c8de40f84fb94

      SHA1

      3f5b23b5cd47e09ab3c771bf84349d4bef9d0af0

      SHA256

      a7be2eefd439cb8363a4749569200e986bfc770bde5f7c4034a0a4661ac12f90

      SHA512

      b38194dba95f8d1c66e69b8593111d24293dcc2498ab2d8d91d7840a02c2ca21961e42aaac2eef2ddae94a65fda12b8f2cf2729a0b86f1f2330cc3366bc596d5

    • C:\Windows\SysWOW64\kjvrhpfr.exe

      Filesize

      255KB

      MD5

      ca2ee9522fa4cbdcd83c8de40f84fb94

      SHA1

      3f5b23b5cd47e09ab3c771bf84349d4bef9d0af0

      SHA256

      a7be2eefd439cb8363a4749569200e986bfc770bde5f7c4034a0a4661ac12f90

      SHA512

      b38194dba95f8d1c66e69b8593111d24293dcc2498ab2d8d91d7840a02c2ca21961e42aaac2eef2ddae94a65fda12b8f2cf2729a0b86f1f2330cc3366bc596d5

    • C:\Windows\SysWOW64\modnjizlduotrpf.exe

      Filesize

      255KB

      MD5

      a6dfff2bdc39377e855ad5b1889a29cd

      SHA1

      a861422029ec08421fbbc8935be17dac940221d0

      SHA256

      e0c65d3de72eb307e7f76fbbdf11d1d01cc0d2df87f028e525ef21e21e499e3b

      SHA512

      d2eac12bc34001ba09baaccc0331edfd5416c38ce6576d438dacfbbbbca05ca55fafd73e729c0ec6aa97672affd0ae3a3f87c35943c495e1e38ce01c065fe6b3

    • C:\Windows\SysWOW64\modnjizlduotrpf.exe

      Filesize

      255KB

      MD5

      a6dfff2bdc39377e855ad5b1889a29cd

      SHA1

      a861422029ec08421fbbc8935be17dac940221d0

      SHA256

      e0c65d3de72eb307e7f76fbbdf11d1d01cc0d2df87f028e525ef21e21e499e3b

      SHA512

      d2eac12bc34001ba09baaccc0331edfd5416c38ce6576d438dacfbbbbca05ca55fafd73e729c0ec6aa97672affd0ae3a3f87c35943c495e1e38ce01c065fe6b3

    • C:\Windows\SysWOW64\zqbnwvfgau.exe

      Filesize

      255KB

      MD5

      0e79dd433b26c391c496745e2b13e27c

      SHA1

      b68b3a20c549dea355afb5050908404de4a5085b

      SHA256

      03ef27397e8e332f00e12532b7508e39882b9dfe7cd96edec944b24deb387687

      SHA512

      886e03910b60908d90dd8f4705490b890ae3a4d047a11292afbc5af33aa9f4eb4c3967d11c3541721bc45714f06c89c2af3f795c16f422360fae158bf96d5f74

    • C:\Windows\SysWOW64\zqbnwvfgau.exe

      Filesize

      255KB

      MD5

      0e79dd433b26c391c496745e2b13e27c

      SHA1

      b68b3a20c549dea355afb5050908404de4a5085b

      SHA256

      03ef27397e8e332f00e12532b7508e39882b9dfe7cd96edec944b24deb387687

      SHA512

      886e03910b60908d90dd8f4705490b890ae3a4d047a11292afbc5af33aa9f4eb4c3967d11c3541721bc45714f06c89c2af3f795c16f422360fae158bf96d5f74

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\ipllqdtdttqdi.exe

      Filesize

      255KB

      MD5

      d7fb450d56e88fd0ce4e0c9cb7c88c58

      SHA1

      6662796732b4c0c46c63ffa76a8d249f9dde2de7

      SHA256

      ff4797e4f9a55efe40f5ec7ffae66f7d4d386b0a06b56a1b36d9f499ef418c42

      SHA512

      b2fb2732362a9eb22e38193ef910e97651f9e921e8f1fda442e6ca5b070500d51b04472e5b4a5f99b042a8765dede484e7dc162aec80669a8f04f69015f03828

    • \Windows\SysWOW64\ipllqdtdttqdi.exe

      Filesize

      255KB

      MD5

      d7fb450d56e88fd0ce4e0c9cb7c88c58

      SHA1

      6662796732b4c0c46c63ffa76a8d249f9dde2de7

      SHA256

      ff4797e4f9a55efe40f5ec7ffae66f7d4d386b0a06b56a1b36d9f499ef418c42

      SHA512

      b2fb2732362a9eb22e38193ef910e97651f9e921e8f1fda442e6ca5b070500d51b04472e5b4a5f99b042a8765dede484e7dc162aec80669a8f04f69015f03828

    • \Windows\SysWOW64\kjvrhpfr.exe

      Filesize

      255KB

      MD5

      ca2ee9522fa4cbdcd83c8de40f84fb94

      SHA1

      3f5b23b5cd47e09ab3c771bf84349d4bef9d0af0

      SHA256

      a7be2eefd439cb8363a4749569200e986bfc770bde5f7c4034a0a4661ac12f90

      SHA512

      b38194dba95f8d1c66e69b8593111d24293dcc2498ab2d8d91d7840a02c2ca21961e42aaac2eef2ddae94a65fda12b8f2cf2729a0b86f1f2330cc3366bc596d5

    • \Windows\SysWOW64\kjvrhpfr.exe

      Filesize

      255KB

      MD5

      ca2ee9522fa4cbdcd83c8de40f84fb94

      SHA1

      3f5b23b5cd47e09ab3c771bf84349d4bef9d0af0

      SHA256

      a7be2eefd439cb8363a4749569200e986bfc770bde5f7c4034a0a4661ac12f90

      SHA512

      b38194dba95f8d1c66e69b8593111d24293dcc2498ab2d8d91d7840a02c2ca21961e42aaac2eef2ddae94a65fda12b8f2cf2729a0b86f1f2330cc3366bc596d5

    • \Windows\SysWOW64\modnjizlduotrpf.exe

      Filesize

      255KB

      MD5

      a6dfff2bdc39377e855ad5b1889a29cd

      SHA1

      a861422029ec08421fbbc8935be17dac940221d0

      SHA256

      e0c65d3de72eb307e7f76fbbdf11d1d01cc0d2df87f028e525ef21e21e499e3b

      SHA512

      d2eac12bc34001ba09baaccc0331edfd5416c38ce6576d438dacfbbbbca05ca55fafd73e729c0ec6aa97672affd0ae3a3f87c35943c495e1e38ce01c065fe6b3

    • \Windows\SysWOW64\zqbnwvfgau.exe

      Filesize

      255KB

      MD5

      0e79dd433b26c391c496745e2b13e27c

      SHA1

      b68b3a20c549dea355afb5050908404de4a5085b

      SHA256

      03ef27397e8e332f00e12532b7508e39882b9dfe7cd96edec944b24deb387687

      SHA512

      886e03910b60908d90dd8f4705490b890ae3a4d047a11292afbc5af33aa9f4eb4c3967d11c3541721bc45714f06c89c2af3f795c16f422360fae158bf96d5f74

    • memory/276-81-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/276-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/520-82-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/520-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/844-78-0x00000000023E0000-0x0000000002480000-memory.dmp

      Filesize

      640KB

    • memory/844-54-0x0000000076401000-0x0000000076403000-memory.dmp

      Filesize

      8KB

    • memory/844-92-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/844-55-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/844-56-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1068-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1068-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1112-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1112-80-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1540-106-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1540-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1612-109-0x000007FEFC341000-0x000007FEFC343000-memory.dmp

      Filesize

      8KB

    • memory/1772-93-0x0000000072F11000-0x0000000072F14000-memory.dmp

      Filesize

      12KB

    • memory/1772-94-0x0000000070991000-0x0000000070993000-memory.dmp

      Filesize

      8KB

    • memory/1772-107-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1772-99-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/1772-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1772-110-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1772-111-0x000000007197D000-0x0000000071988000-memory.dmp

      Filesize

      44KB

    • memory/2036-77-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2036-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB