Analysis

  • max time kernel
    176s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:07

General

  • Target

    15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe

  • Size

    255KB

  • MD5

    88f4d95cd04a4e8243ccb4c0d11bb9ca

  • SHA1

    c819d5a1d9857db7f951630b774c60f62566e8d5

  • SHA256

    15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2

  • SHA512

    5c377d65bcb89a49b348845ea012e5020c88bdbf667be132c5695f1051c5df17c94c018b5872ec9b60cb08264af539bc4da629f2030a54b5731cca8f873005c2

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJU:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIJ

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\ztshkowyov.exe
      ztshkowyov.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4320
      • C:\Windows\SysWOW64\lebodrqc.exe
        C:\Windows\system32\lebodrqc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3716
    • C:\Windows\SysWOW64\wgkcshktygfoppy.exe
      wgkcshktygfoppy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c bfqkkjygccisw.exe
        3⤵
          PID:224
      • C:\Windows\SysWOW64\lebodrqc.exe
        lebodrqc.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2940
      • C:\Windows\SysWOW64\bfqkkjygccisw.exe
        bfqkkjygccisw.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5116
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      7eac9a687898530ca423916ebfec8b77

      SHA1

      f184491e28d8c0ebaa0adac6e654fee3137a5501

      SHA256

      3fe05157865c278c99b319189c3a96f1e4b5cc16eeb2c32a815a94ac42be1c71

      SHA512

      13a6065ea62fe0ed4374c3faa95975f53392732fef6879a959b34b1835d8c1559aadd54fb4164bb436981f035e22075dd0bb265bb24e093c20ba163ad9e04400

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      7eac9a687898530ca423916ebfec8b77

      SHA1

      f184491e28d8c0ebaa0adac6e654fee3137a5501

      SHA256

      3fe05157865c278c99b319189c3a96f1e4b5cc16eeb2c32a815a94ac42be1c71

      SHA512

      13a6065ea62fe0ed4374c3faa95975f53392732fef6879a959b34b1835d8c1559aadd54fb4164bb436981f035e22075dd0bb265bb24e093c20ba163ad9e04400

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      a6c0aa0ddd1f72cb87a8f10e8a4fd52b

      SHA1

      5041f39f5d4a619b2ac92e912ce28ef63b5dc6fe

      SHA256

      83550a7a0d982ec82de9717c0720d139a0039797e3f9ab44ca1f6cc98c3deecc

      SHA512

      010126d38cdeb88007d7fff75be33c72eda8bac5f3a17fb597bc29f5ac97ba4505db19faff382939a5836ec45a16ce8d2a117f2bb2b92cef459b46ed1a76754b

    • C:\Windows\SysWOW64\bfqkkjygccisw.exe

      Filesize

      255KB

      MD5

      34d955c4267036f2a10b5fef4456fcb3

      SHA1

      3a2b8f51cb8e4132ed9d3dd77c0474c9818ce855

      SHA256

      d04ff7f0d70373a0a49730b9f0de55c807a14292aad5b31451d7b4dbd63747cd

      SHA512

      a0fba41fab69171c3bae55ccec1f1e4640672fbabb741e4ba017a8776420fde97c78a1ce145a34171e7758050fc87f5dc763294abd22c4a5af2b0763731a27d8

    • C:\Windows\SysWOW64\bfqkkjygccisw.exe

      Filesize

      255KB

      MD5

      34d955c4267036f2a10b5fef4456fcb3

      SHA1

      3a2b8f51cb8e4132ed9d3dd77c0474c9818ce855

      SHA256

      d04ff7f0d70373a0a49730b9f0de55c807a14292aad5b31451d7b4dbd63747cd

      SHA512

      a0fba41fab69171c3bae55ccec1f1e4640672fbabb741e4ba017a8776420fde97c78a1ce145a34171e7758050fc87f5dc763294abd22c4a5af2b0763731a27d8

    • C:\Windows\SysWOW64\lebodrqc.exe

      Filesize

      255KB

      MD5

      e90647943e01d8f855a248957ff0bfa6

      SHA1

      c7f6e5215c1c4bddc39a11858158e191aa5dd0c0

      SHA256

      9f172f1f3423585d889a8fddad560750a0f54402fa9d9592944a30684d73f5fe

      SHA512

      533285b38d7b1d83c46d53fbceae88605a94d9bd7b2bc7d3470b6970463489ced0004c03672e0638dea0d37d44b43ac390628ea6d3adb6609e790472676f64af

    • C:\Windows\SysWOW64\lebodrqc.exe

      Filesize

      255KB

      MD5

      e90647943e01d8f855a248957ff0bfa6

      SHA1

      c7f6e5215c1c4bddc39a11858158e191aa5dd0c0

      SHA256

      9f172f1f3423585d889a8fddad560750a0f54402fa9d9592944a30684d73f5fe

      SHA512

      533285b38d7b1d83c46d53fbceae88605a94d9bd7b2bc7d3470b6970463489ced0004c03672e0638dea0d37d44b43ac390628ea6d3adb6609e790472676f64af

    • C:\Windows\SysWOW64\lebodrqc.exe

      Filesize

      255KB

      MD5

      e90647943e01d8f855a248957ff0bfa6

      SHA1

      c7f6e5215c1c4bddc39a11858158e191aa5dd0c0

      SHA256

      9f172f1f3423585d889a8fddad560750a0f54402fa9d9592944a30684d73f5fe

      SHA512

      533285b38d7b1d83c46d53fbceae88605a94d9bd7b2bc7d3470b6970463489ced0004c03672e0638dea0d37d44b43ac390628ea6d3adb6609e790472676f64af

    • C:\Windows\SysWOW64\wgkcshktygfoppy.exe

      Filesize

      255KB

      MD5

      08efe7a1cc7482fe8fc32d3bc6dfbc77

      SHA1

      aa8f8e83d7dffc393fa0811f8945797fa806bd32

      SHA256

      1f15ac07ccee2959b9a10f4507648ac076daba4b839b8d40c070b296ed52ccde

      SHA512

      6e75124d4a5f566f2f888ed6fbaddd321c8a63ab185863bdc4974007f2041fafeeef0e8e30be013fd5173e8aa757d0a58895bed33c08bace4e874b9678ef02db

    • C:\Windows\SysWOW64\wgkcshktygfoppy.exe

      Filesize

      255KB

      MD5

      08efe7a1cc7482fe8fc32d3bc6dfbc77

      SHA1

      aa8f8e83d7dffc393fa0811f8945797fa806bd32

      SHA256

      1f15ac07ccee2959b9a10f4507648ac076daba4b839b8d40c070b296ed52ccde

      SHA512

      6e75124d4a5f566f2f888ed6fbaddd321c8a63ab185863bdc4974007f2041fafeeef0e8e30be013fd5173e8aa757d0a58895bed33c08bace4e874b9678ef02db

    • C:\Windows\SysWOW64\ztshkowyov.exe

      Filesize

      255KB

      MD5

      1975ec7c59c2f67024f0fc5d313176cd

      SHA1

      7d8258c1790150553055df860ea1dd75e2ba6744

      SHA256

      d55a612aa65afa2acec7c7eeee10da7694d7339b15b67d4c80087faf7ba1cd9f

      SHA512

      dc190c89b633fb95461c1b8ef2a2d427f58602ed137313759213be417fd06d4a439da1d7b445d4636b0d1706498865690cd54c85b5959b1791d3a306c17ca37b

    • C:\Windows\SysWOW64\ztshkowyov.exe

      Filesize

      255KB

      MD5

      1975ec7c59c2f67024f0fc5d313176cd

      SHA1

      7d8258c1790150553055df860ea1dd75e2ba6744

      SHA256

      d55a612aa65afa2acec7c7eeee10da7694d7339b15b67d4c80087faf7ba1cd9f

      SHA512

      dc190c89b633fb95461c1b8ef2a2d427f58602ed137313759213be417fd06d4a439da1d7b445d4636b0d1706498865690cd54c85b5959b1791d3a306c17ca37b

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/224-144-0x0000000000000000-mapping.dmp

    • memory/1124-132-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1124-153-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2748-152-0x0000000000000000-mapping.dmp

    • memory/2748-173-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-172-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-169-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp

      Filesize

      64KB

    • memory/2748-175-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-162-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp

      Filesize

      64KB

    • memory/2748-174-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-156-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-155-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-157-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-158-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2748-159-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

      Filesize

      64KB

    • memory/2940-141-0x0000000000000000-mapping.dmp

    • memory/2940-148-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2940-166-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3716-154-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3716-150-0x0000000000000000-mapping.dmp

    • memory/3716-168-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3960-140-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3960-136-0x0000000000000000-mapping.dmp

    • memory/3960-165-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4320-139-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4320-133-0x0000000000000000-mapping.dmp

    • memory/4320-164-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/5116-167-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/5116-149-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/5116-145-0x0000000000000000-mapping.dmp