Analysis

  • max time kernel
    153s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 20:59

General

  • Target

    c4923f03f3f01e8c30ffa7b00a8f8389d4d95d4766267873ce4600fd8a5bd5b1.exe

  • Size

    255KB

  • MD5

    91609dd90ac5b50f4aea186db4f57ed1

  • SHA1

    83d197a75e1d0eeba6e241755e7e3a90cfeac8f9

  • SHA256

    c4923f03f3f01e8c30ffa7b00a8f8389d4d95d4766267873ce4600fd8a5bd5b1

  • SHA512

    ac5a178aa63d8896ef1647a66ebdf35a9f08b85624c3f67580b35d9d0be72f5d29941cc986b85b805def13612401b26d96bae6bd530d0612b4becd739f795f75

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJk:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI3

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4923f03f3f01e8c30ffa7b00a8f8389d4d95d4766267873ce4600fd8a5bd5b1.exe
    "C:\Users\Admin\AppData\Local\Temp\c4923f03f3f01e8c30ffa7b00a8f8389d4d95d4766267873ce4600fd8a5bd5b1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Windows\SysWOW64\sqggswapab.exe
      sqggswapab.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\SysWOW64\wabadtrt.exe
        C:\Windows\system32\wabadtrt.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:920
    • C:\Windows\SysWOW64\eikpyrmgruwidpa.exe
      eikpyrmgruwidpa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c rrrgimrfoxaxm.exe
        3⤵
          PID:1704
      • C:\Windows\SysWOW64\wabadtrt.exe
        wabadtrt.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:324
      • C:\Windows\SysWOW64\rrrgimrfoxaxm.exe
        rrrgimrfoxaxm.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1888
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:364
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

        Filesize

        255KB

        MD5

        cce0916f1429b056e3ef745b86eac808

        SHA1

        3dd391340b7e252d1d1d0496a320650703732578

        SHA256

        ec75f7fcd0a5fa88d36dba1da76263c833920a2b5420d447664e7ec91fffe059

        SHA512

        d87cc3c113712eb291287e15710379d266f04b8d6623be28eeb5c03db023425bb04f37d2a20adcf35eefe6c11ddf76ac3ac3296a795333704733d8f10c4f0368

      • C:\Windows\SysWOW64\eikpyrmgruwidpa.exe

        Filesize

        255KB

        MD5

        d99cf1f8279d50bcb57eb31d53f60521

        SHA1

        21c57ba40979abfc7fb25ea44ad4c0e8af0be90b

        SHA256

        2f58f4d667b2da2224902a253cc90485de498dc292a03408cc52c52a84b7b7d6

        SHA512

        c11848338e4b3d17eb7de8bbe2345cd9b9739237f604a04802ad6ee533a16a2196ac9551e11d8a21cb02abe7376e8deafa0cdaa55814d562ad108172e7946745

      • C:\Windows\SysWOW64\eikpyrmgruwidpa.exe

        Filesize

        255KB

        MD5

        d99cf1f8279d50bcb57eb31d53f60521

        SHA1

        21c57ba40979abfc7fb25ea44ad4c0e8af0be90b

        SHA256

        2f58f4d667b2da2224902a253cc90485de498dc292a03408cc52c52a84b7b7d6

        SHA512

        c11848338e4b3d17eb7de8bbe2345cd9b9739237f604a04802ad6ee533a16a2196ac9551e11d8a21cb02abe7376e8deafa0cdaa55814d562ad108172e7946745

      • C:\Windows\SysWOW64\rrrgimrfoxaxm.exe

        Filesize

        255KB

        MD5

        be11153409b8d3aaee3f15c729c1599e

        SHA1

        9d17563080abd1f28e707cc570231fba5389285b

        SHA256

        2575a3117ceb5449def43d47b75e96739f6cd0c5c7eb9ed8a7a158a11e93d5e6

        SHA512

        82f01e7e54d6fe0ca5d1b7ded066f6f7fc4dc538bac8df5fa9262e6bbcf2f7409808ce00fa549a6d585710fb151139a2f387662a3fd56ed3788d99e543af3bf0

      • C:\Windows\SysWOW64\rrrgimrfoxaxm.exe

        Filesize

        255KB

        MD5

        be11153409b8d3aaee3f15c729c1599e

        SHA1

        9d17563080abd1f28e707cc570231fba5389285b

        SHA256

        2575a3117ceb5449def43d47b75e96739f6cd0c5c7eb9ed8a7a158a11e93d5e6

        SHA512

        82f01e7e54d6fe0ca5d1b7ded066f6f7fc4dc538bac8df5fa9262e6bbcf2f7409808ce00fa549a6d585710fb151139a2f387662a3fd56ed3788d99e543af3bf0

      • C:\Windows\SysWOW64\sqggswapab.exe

        Filesize

        255KB

        MD5

        2556fc85ab86ac4059b32eb31230245d

        SHA1

        2a7f00895256d4af279b36c78c4af698bad52db1

        SHA256

        9cc4a91540fde0c293af463c36e8b7fdc397af2da14a40f2bc149eb767e5b986

        SHA512

        8939749c94eb63fed4169804b26a15b71237364be25560d3a846fb8b408290c2d6cb4b05dc52df6e805855424402aac0948ba1dd1143db8244d6b239ee62f1d8

      • C:\Windows\SysWOW64\sqggswapab.exe

        Filesize

        255KB

        MD5

        2556fc85ab86ac4059b32eb31230245d

        SHA1

        2a7f00895256d4af279b36c78c4af698bad52db1

        SHA256

        9cc4a91540fde0c293af463c36e8b7fdc397af2da14a40f2bc149eb767e5b986

        SHA512

        8939749c94eb63fed4169804b26a15b71237364be25560d3a846fb8b408290c2d6cb4b05dc52df6e805855424402aac0948ba1dd1143db8244d6b239ee62f1d8

      • C:\Windows\SysWOW64\wabadtrt.exe

        Filesize

        255KB

        MD5

        26af22c986baabe186ba7023bed05ec3

        SHA1

        9e9f9d2d7bf18ca04716a0a7a6052f25f1279250

        SHA256

        2d3f8a651fb5602284d73bf3e27d48aceedb0da06ff332888aa87de49688511d

        SHA512

        fa82dd8ca9ff64fc624cf1cafe448104f2450b84b3d2f2fb63c43b24390657f3becf7a46bf7853f755801c14bd07f1385f7b950547defa92e15d8cd0c777b854

      • C:\Windows\SysWOW64\wabadtrt.exe

        Filesize

        255KB

        MD5

        26af22c986baabe186ba7023bed05ec3

        SHA1

        9e9f9d2d7bf18ca04716a0a7a6052f25f1279250

        SHA256

        2d3f8a651fb5602284d73bf3e27d48aceedb0da06ff332888aa87de49688511d

        SHA512

        fa82dd8ca9ff64fc624cf1cafe448104f2450b84b3d2f2fb63c43b24390657f3becf7a46bf7853f755801c14bd07f1385f7b950547defa92e15d8cd0c777b854

      • C:\Windows\SysWOW64\wabadtrt.exe

        Filesize

        255KB

        MD5

        26af22c986baabe186ba7023bed05ec3

        SHA1

        9e9f9d2d7bf18ca04716a0a7a6052f25f1279250

        SHA256

        2d3f8a651fb5602284d73bf3e27d48aceedb0da06ff332888aa87de49688511d

        SHA512

        fa82dd8ca9ff64fc624cf1cafe448104f2450b84b3d2f2fb63c43b24390657f3becf7a46bf7853f755801c14bd07f1385f7b950547defa92e15d8cd0c777b854

      • C:\Windows\mydoc.rtf

        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \Windows\SysWOW64\eikpyrmgruwidpa.exe

        Filesize

        255KB

        MD5

        d99cf1f8279d50bcb57eb31d53f60521

        SHA1

        21c57ba40979abfc7fb25ea44ad4c0e8af0be90b

        SHA256

        2f58f4d667b2da2224902a253cc90485de498dc292a03408cc52c52a84b7b7d6

        SHA512

        c11848338e4b3d17eb7de8bbe2345cd9b9739237f604a04802ad6ee533a16a2196ac9551e11d8a21cb02abe7376e8deafa0cdaa55814d562ad108172e7946745

      • \Windows\SysWOW64\rrrgimrfoxaxm.exe

        Filesize

        255KB

        MD5

        be11153409b8d3aaee3f15c729c1599e

        SHA1

        9d17563080abd1f28e707cc570231fba5389285b

        SHA256

        2575a3117ceb5449def43d47b75e96739f6cd0c5c7eb9ed8a7a158a11e93d5e6

        SHA512

        82f01e7e54d6fe0ca5d1b7ded066f6f7fc4dc538bac8df5fa9262e6bbcf2f7409808ce00fa549a6d585710fb151139a2f387662a3fd56ed3788d99e543af3bf0

      • \Windows\SysWOW64\sqggswapab.exe

        Filesize

        255KB

        MD5

        2556fc85ab86ac4059b32eb31230245d

        SHA1

        2a7f00895256d4af279b36c78c4af698bad52db1

        SHA256

        9cc4a91540fde0c293af463c36e8b7fdc397af2da14a40f2bc149eb767e5b986

        SHA512

        8939749c94eb63fed4169804b26a15b71237364be25560d3a846fb8b408290c2d6cb4b05dc52df6e805855424402aac0948ba1dd1143db8244d6b239ee62f1d8

      • \Windows\SysWOW64\wabadtrt.exe

        Filesize

        255KB

        MD5

        26af22c986baabe186ba7023bed05ec3

        SHA1

        9e9f9d2d7bf18ca04716a0a7a6052f25f1279250

        SHA256

        2d3f8a651fb5602284d73bf3e27d48aceedb0da06ff332888aa87de49688511d

        SHA512

        fa82dd8ca9ff64fc624cf1cafe448104f2450b84b3d2f2fb63c43b24390657f3becf7a46bf7853f755801c14bd07f1385f7b950547defa92e15d8cd0c777b854

      • \Windows\SysWOW64\wabadtrt.exe

        Filesize

        255KB

        MD5

        26af22c986baabe186ba7023bed05ec3

        SHA1

        9e9f9d2d7bf18ca04716a0a7a6052f25f1279250

        SHA256

        2d3f8a651fb5602284d73bf3e27d48aceedb0da06ff332888aa87de49688511d

        SHA512

        fa82dd8ca9ff64fc624cf1cafe448104f2450b84b3d2f2fb63c43b24390657f3becf7a46bf7853f755801c14bd07f1385f7b950547defa92e15d8cd0c777b854

      • memory/324-81-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/324-96-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/364-92-0x00000000726C1000-0x00000000726C4000-memory.dmp

        Filesize

        12KB

      • memory/364-108-0x000000007112D000-0x0000000071138000-memory.dmp

        Filesize

        44KB

      • memory/364-107-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/364-103-0x000000007112D000-0x0000000071138000-memory.dmp

        Filesize

        44KB

      • memory/364-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/364-93-0x0000000070141000-0x0000000070143000-memory.dmp

        Filesize

        8KB

      • memory/364-100-0x000000007112D000-0x0000000071138000-memory.dmp

        Filesize

        44KB

      • memory/920-98-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/920-89-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/936-106-0x000007FEFBD71000-0x000007FEFBD73000-memory.dmp

        Filesize

        8KB

      • memory/988-94-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/988-76-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1592-55-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1592-77-0x0000000002F60000-0x0000000003000000-memory.dmp

        Filesize

        640KB

      • memory/1592-75-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1592-80-0x0000000002F60000-0x0000000003000000-memory.dmp

        Filesize

        640KB

      • memory/1592-54-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

        Filesize

        8KB

      • memory/1592-91-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1592-57-0x0000000002F60000-0x0000000003000000-memory.dmp

        Filesize

        640KB

      • memory/1888-83-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/1888-97-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/2020-95-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB

      • memory/2020-78-0x0000000000400000-0x00000000004A0000-memory.dmp

        Filesize

        640KB