Analysis

  • max time kernel
    154s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 21:03

General

  • Target

    80e6879c65ddc99979b659f90f47ebff9a7f248b550b2a789e4228490fcc7d90.exe

  • Size

    255KB

  • MD5

    9fb988c0d598b2a2cd32cedbcc3bde6b

  • SHA1

    d5bb6cb805c3edb68e32298e78440779d3b89263

  • SHA256

    80e6879c65ddc99979b659f90f47ebff9a7f248b550b2a789e4228490fcc7d90

  • SHA512

    941f7e08b41d1b1fafdb5246e3c03385923909937fcc0008de3ca341afbbe39071fe55496b236888282bd4b88f4b19ee36b8e8b8cbb9d79501cc29229971de1e

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJz:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIu

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80e6879c65ddc99979b659f90f47ebff9a7f248b550b2a789e4228490fcc7d90.exe
    "C:\Users\Admin\AppData\Local\Temp\80e6879c65ddc99979b659f90f47ebff9a7f248b550b2a789e4228490fcc7d90.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\qbizsqzrkh.exe
      qbizsqzrkh.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\myzsowox.exe
        C:\Windows\system32\myzsowox.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4092
    • C:\Windows\SysWOW64\sseqzjrnewxknze.exe
      sseqzjrnewxknze.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2576
    • C:\Windows\SysWOW64\myzsowox.exe
      myzsowox.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5028
    • C:\Windows\SysWOW64\wiyodkjyjdvkv.exe
      wiyodkjyjdvkv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5004
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    868a896726ed8a3e06800133ef72ce82

    SHA1

    bd9aba9bc92bb83d5355a33db64098ac97c1183b

    SHA256

    f2bbb3c5af2f5434549aa87eced8816c842a9a571188fcbb788ff2c48aaef5b5

    SHA512

    8182caa3d0dc80ac728eaf0d434cb29b6a4e36c14965a6d60efb847748cadd42e33fde9f69d9bd6c1c6cfe48aa2c9555d5a8a159499112f7ad3025031a8cbba8

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    80b9d250f995a580af3037e5f6673aee

    SHA1

    d80eb783ef18bc94d997f3049148e817c4480d31

    SHA256

    9c09d8157fa540548c52c47e3163aae71a8e0fe9ed11a9b51d50f024eb18030a

    SHA512

    8dbda8ed2c26dfa0448abe269cb7afb2914d775c9b31fa77bc441385bf3b68e427d1365587069fd0dfc704d214c524f41dc1909d694565029c79ae76d3da5943

  • C:\Users\Admin\AppData\Roaming\DisconnectCompare.doc.exe

    Filesize

    255KB

    MD5

    44e5ccf3718af3027b7e0a34636c2828

    SHA1

    c2856dfb0a468729873feace78c60a05df456e2f

    SHA256

    fb04a7597b3da39ac01081f0ff506ed044e056b501fed417ddaa079e16b640a8

    SHA512

    46067479e09d0f1e18db0d5d7751de9b6309c0433e006a44ea4a1ca4a5cd242f26abae44c5d603e6c6cdd889e641f8634442daefd9fbe2061fdcb75ea3244554

  • C:\Users\Admin\Documents\ProtectClose.doc.exe

    Filesize

    255KB

    MD5

    f37dea72caf32bea75d158fa79b8d1d4

    SHA1

    f20cda09a20ef7b20b89e1a53511596bb31e8350

    SHA256

    a2d97578d0827dec35a50dd05c62b17527626b8d680629a67b53c7a7401ca313

    SHA512

    50c6832acce8645fdf71e833652fcd514c67bc442bffa5fec2a7e0cbd150b6329b9fe4bbc43c68de3ca59f135786dfbf46b9b13722bb50f924b8a93e21683099

  • C:\Users\Admin\Documents\WaitSend.doc.exe

    Filesize

    255KB

    MD5

    cc5a7a87654769653094206e4b182349

    SHA1

    56267a563567a41ff32d0b51a10cb997498045dd

    SHA256

    52dba3953210a1e5a5239f1cbe0fc971c2c539fe3fe154e7fcfda8ef10c1b692

    SHA512

    69927e8f8a6581d30c1a2b0c9468d0f09c120a40514aed954bb1fc438b21ceb2e29f6e0cd7e1501cc62255866a428377b4406e4db3f9bb0d9c4cd3241f598b54

  • C:\Windows\SysWOW64\myzsowox.exe

    Filesize

    255KB

    MD5

    da1bafb65b72c6abbf696522a2e38375

    SHA1

    b2e5076b489a16ed313940e3270912749acb5a0c

    SHA256

    389a3e285e7503f76df5252e519d34d2f9fe30127011d87f24bdb95ad812597c

    SHA512

    d7b85c18215a050b10a621b2844208f35c946fad1905904ae77a9a76d33120f34e82eead4d300795dc4b8d6881f8a83684c305f8e009a30f72bc4e261e6b791c

  • C:\Windows\SysWOW64\myzsowox.exe

    Filesize

    255KB

    MD5

    da1bafb65b72c6abbf696522a2e38375

    SHA1

    b2e5076b489a16ed313940e3270912749acb5a0c

    SHA256

    389a3e285e7503f76df5252e519d34d2f9fe30127011d87f24bdb95ad812597c

    SHA512

    d7b85c18215a050b10a621b2844208f35c946fad1905904ae77a9a76d33120f34e82eead4d300795dc4b8d6881f8a83684c305f8e009a30f72bc4e261e6b791c

  • C:\Windows\SysWOW64\myzsowox.exe

    Filesize

    255KB

    MD5

    da1bafb65b72c6abbf696522a2e38375

    SHA1

    b2e5076b489a16ed313940e3270912749acb5a0c

    SHA256

    389a3e285e7503f76df5252e519d34d2f9fe30127011d87f24bdb95ad812597c

    SHA512

    d7b85c18215a050b10a621b2844208f35c946fad1905904ae77a9a76d33120f34e82eead4d300795dc4b8d6881f8a83684c305f8e009a30f72bc4e261e6b791c

  • C:\Windows\SysWOW64\qbizsqzrkh.exe

    Filesize

    255KB

    MD5

    fec71a629022ee9f346bd3e691149ac8

    SHA1

    bf85497e489171097511eab4bd4a675f8b574a15

    SHA256

    e6ec5521be23c815c15e1f6011fe736d421f4cfc4793afcf32fb68f17d13faab

    SHA512

    0d5c8e7d4f184eb9b791ecedc7ea1b2c0aab8239ba2eda2dd8bde0628d490ce5a68794c3a7a7636615ed7a70b13a6195d4e494d27799a6773dd6cf5ecd9074d8

  • C:\Windows\SysWOW64\qbizsqzrkh.exe

    Filesize

    255KB

    MD5

    fec71a629022ee9f346bd3e691149ac8

    SHA1

    bf85497e489171097511eab4bd4a675f8b574a15

    SHA256

    e6ec5521be23c815c15e1f6011fe736d421f4cfc4793afcf32fb68f17d13faab

    SHA512

    0d5c8e7d4f184eb9b791ecedc7ea1b2c0aab8239ba2eda2dd8bde0628d490ce5a68794c3a7a7636615ed7a70b13a6195d4e494d27799a6773dd6cf5ecd9074d8

  • C:\Windows\SysWOW64\sseqzjrnewxknze.exe

    Filesize

    255KB

    MD5

    57707cb21454a1411dda5efab00d3197

    SHA1

    f17a7540ec5c2d096db4dc8018e290a02f1c62d9

    SHA256

    4d92379e5ef51d7f4bbc4813bd466cb6f49c7b818d53de6ec249ea6fc03e0ce6

    SHA512

    455d5f4b39eea55cb61738368cf93d1bbfc045c0f3b51800c711d6bbdc5df6ac3d3ada29ed3d8f6d096ab9c9e5445911d55aa76efd5c35526ccf5a3afd48dbc6

  • C:\Windows\SysWOW64\sseqzjrnewxknze.exe

    Filesize

    255KB

    MD5

    57707cb21454a1411dda5efab00d3197

    SHA1

    f17a7540ec5c2d096db4dc8018e290a02f1c62d9

    SHA256

    4d92379e5ef51d7f4bbc4813bd466cb6f49c7b818d53de6ec249ea6fc03e0ce6

    SHA512

    455d5f4b39eea55cb61738368cf93d1bbfc045c0f3b51800c711d6bbdc5df6ac3d3ada29ed3d8f6d096ab9c9e5445911d55aa76efd5c35526ccf5a3afd48dbc6

  • C:\Windows\SysWOW64\wiyodkjyjdvkv.exe

    Filesize

    255KB

    MD5

    638aa8fc0aa32aaa45696d24ec01d1e9

    SHA1

    f047697266e0f09c4002bfc4619297d10fd07c55

    SHA256

    4a7f968a2dd84c9739776cd7145f9a18ff2c66f7a73b5c35ca86153339bcd559

    SHA512

    91b07e1c3a7fea839bd4679554a30e162e4bc2d43318f9576e455e913d15ad0a76eeb0560c68d3647195f484e0815ece2bff389d8e41945c57b99ea3963d357b

  • C:\Windows\SysWOW64\wiyodkjyjdvkv.exe

    Filesize

    255KB

    MD5

    638aa8fc0aa32aaa45696d24ec01d1e9

    SHA1

    f047697266e0f09c4002bfc4619297d10fd07c55

    SHA256

    4a7f968a2dd84c9739776cd7145f9a18ff2c66f7a73b5c35ca86153339bcd559

    SHA512

    91b07e1c3a7fea839bd4679554a30e162e4bc2d43318f9576e455e913d15ad0a76eeb0560c68d3647195f484e0815ece2bff389d8e41945c57b99ea3963d357b

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/1584-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1584-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2240-167-0x00007FFDD0F00000-0x00007FFDD0F10000-memory.dmp

    Filesize

    64KB

  • memory/2240-173-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-176-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-175-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-163-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-174-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-164-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-162-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-161-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2240-166-0x00007FFDD0F00000-0x00007FFDD0F10000-memory.dmp

    Filesize

    64KB

  • memory/2240-165-0x00007FFDD3350000-0x00007FFDD3360000-memory.dmp

    Filesize

    64KB

  • memory/2576-157-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2576-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3036-156-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3036-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4092-160-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4092-151-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5004-159-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5004-150-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5028-158-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5028-149-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB