Analysis

  • max time kernel
    185s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 10:17

General

  • Target

    c7977767e1a764e9e932a67cd6defb5017381a4ba77a47d076f8b3727c272a8e.exe

  • Size

    255KB

  • MD5

    aef63b875d654513868990ee62cca6c2

  • SHA1

    0f697c91e559c6c34533439423c74cc35c968749

  • SHA256

    c7977767e1a764e9e932a67cd6defb5017381a4ba77a47d076f8b3727c272a8e

  • SHA512

    9ad272c6c24ffcf57660049e25f63ee9d1b6c5b363639cff4b72c9eb74fd5a6057d17aac4ead1421edf886976a0dd31ee132c69cc3d4df6bd9504e8b358dd8d3

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJJ:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7977767e1a764e9e932a67cd6defb5017381a4ba77a47d076f8b3727c272a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\c7977767e1a764e9e932a67cd6defb5017381a4ba77a47d076f8b3727c272a8e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\SysWOW64\jumuksjieu.exe
      jumuksjieu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\mfquvciq.exe
        C:\Windows\system32\mfquvciq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:776
    • C:\Windows\SysWOW64\vepdbqkkwxddfrp.exe
      vepdbqkkwxddfrp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1980
    • C:\Windows\SysWOW64\mfquvciq.exe
      mfquvciq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:976
    • C:\Windows\SysWOW64\grxqthzruimmk.exe
      grxqthzruimmk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:676
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1452

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\DismountEnter.doc.exe

      Filesize

      255KB

      MD5

      d8a99d72643223c57d538c71079c2189

      SHA1

      ef0b1cc150ac9e98c142362e0a952855a04da2c8

      SHA256

      833b8a756558c40aeb3b6389cb848fb5b03e6e261f02d379237ff4e82910469c

      SHA512

      d506fc8a3f7d5dacdc5bac7dfc5c333b79fefb7155fc03ab4b2777be150bd4e3bb663754e2b21eb8cc136a787fa64fde86d96f6ae7e28f3c353dba11d8c84fca

    • C:\Users\Admin\Desktop\DismountEnter.doc.exe

      Filesize

      255KB

      MD5

      d8a99d72643223c57d538c71079c2189

      SHA1

      ef0b1cc150ac9e98c142362e0a952855a04da2c8

      SHA256

      833b8a756558c40aeb3b6389cb848fb5b03e6e261f02d379237ff4e82910469c

      SHA512

      d506fc8a3f7d5dacdc5bac7dfc5c333b79fefb7155fc03ab4b2777be150bd4e3bb663754e2b21eb8cc136a787fa64fde86d96f6ae7e28f3c353dba11d8c84fca

    • C:\Users\Admin\Documents\CompleteFind.doc.exe

      Filesize

      255KB

      MD5

      cc87af6c7ec58f9124885e14dc37cc1a

      SHA1

      bbab38744d456b91e0af0557c269f02fb1e66f1a

      SHA256

      d3c5e1668a2e408e3d5da7c6d4d170e65d7f5fa816b7f3f9bfbef9c6dd89d7e1

      SHA512

      6f6816410215737673443a7a215885e78914f5f9ace274e13cd2c9985648cfdeb45f84d1211d7a228dab2eeee2a47c8bff3a0f3179c53eb6878cbae556cc4571

    • C:\Windows\SysWOW64\grxqthzruimmk.exe

      Filesize

      255KB

      MD5

      d746235afa99711f63c1faa8316a5f9a

      SHA1

      70742a9de42e2cadd6db6203a252055bca9c8b63

      SHA256

      e8dc61ecb7003abd857f270b7bcdf6ae451a927cf881c5f6929f276ceb1a9166

      SHA512

      2dc33d03e4092f0744d15678098af7a6f70ddaf5d66198ec3111ecacce8deb1d34dea87748b0c20e807364786e9bb5bb8826cf526e883191ae808b47e4ed4919

    • C:\Windows\SysWOW64\grxqthzruimmk.exe

      Filesize

      255KB

      MD5

      d746235afa99711f63c1faa8316a5f9a

      SHA1

      70742a9de42e2cadd6db6203a252055bca9c8b63

      SHA256

      e8dc61ecb7003abd857f270b7bcdf6ae451a927cf881c5f6929f276ceb1a9166

      SHA512

      2dc33d03e4092f0744d15678098af7a6f70ddaf5d66198ec3111ecacce8deb1d34dea87748b0c20e807364786e9bb5bb8826cf526e883191ae808b47e4ed4919

    • C:\Windows\SysWOW64\jumuksjieu.exe

      Filesize

      255KB

      MD5

      021a449549bfaa19efc5673f7cf89489

      SHA1

      a17f9e4f3c02eb1ef4bf19843a2cd29f6cefee3d

      SHA256

      19825ec826d0e4c2415b87fea6356401a423c52dba1036e9cf6c1f8ebe833ad6

      SHA512

      22f1e0fe266ed4774a4520dc8e2db1ea05bc7d523759206c70828470f0ba8b1448f91a46f3a60c546619714e06bd40273f39ce84002107e371038b1b0895a3c7

    • C:\Windows\SysWOW64\jumuksjieu.exe

      Filesize

      255KB

      MD5

      021a449549bfaa19efc5673f7cf89489

      SHA1

      a17f9e4f3c02eb1ef4bf19843a2cd29f6cefee3d

      SHA256

      19825ec826d0e4c2415b87fea6356401a423c52dba1036e9cf6c1f8ebe833ad6

      SHA512

      22f1e0fe266ed4774a4520dc8e2db1ea05bc7d523759206c70828470f0ba8b1448f91a46f3a60c546619714e06bd40273f39ce84002107e371038b1b0895a3c7

    • C:\Windows\SysWOW64\mfquvciq.exe

      Filesize

      255KB

      MD5

      750dbf3dc22fe8e8b1545646807cfc71

      SHA1

      c8f640252378fdb175bc0b0e4dc42a91eafd31bc

      SHA256

      eb749aa15d3502484146f48fa9a06dae5a3e2d7ffeb031c0e95e7fad254cb4de

      SHA512

      f9a06a3dbce918b26cc01619dc38a38b2c28f084adebf138b7a520617f299ab7dbdcf03845b3d9df56fc0c83ba2a5b3aaeb18dbd26cff728fe1033a37b153421

    • C:\Windows\SysWOW64\mfquvciq.exe

      Filesize

      255KB

      MD5

      750dbf3dc22fe8e8b1545646807cfc71

      SHA1

      c8f640252378fdb175bc0b0e4dc42a91eafd31bc

      SHA256

      eb749aa15d3502484146f48fa9a06dae5a3e2d7ffeb031c0e95e7fad254cb4de

      SHA512

      f9a06a3dbce918b26cc01619dc38a38b2c28f084adebf138b7a520617f299ab7dbdcf03845b3d9df56fc0c83ba2a5b3aaeb18dbd26cff728fe1033a37b153421

    • C:\Windows\SysWOW64\mfquvciq.exe

      Filesize

      255KB

      MD5

      750dbf3dc22fe8e8b1545646807cfc71

      SHA1

      c8f640252378fdb175bc0b0e4dc42a91eafd31bc

      SHA256

      eb749aa15d3502484146f48fa9a06dae5a3e2d7ffeb031c0e95e7fad254cb4de

      SHA512

      f9a06a3dbce918b26cc01619dc38a38b2c28f084adebf138b7a520617f299ab7dbdcf03845b3d9df56fc0c83ba2a5b3aaeb18dbd26cff728fe1033a37b153421

    • C:\Windows\SysWOW64\vepdbqkkwxddfrp.exe

      Filesize

      255KB

      MD5

      81c3a73ec822aff5be2aed8d4ca0ca8a

      SHA1

      f16dd6ac63a113d2a3e072727919e693fb852afa

      SHA256

      af0655bdf1dff8cd28c0b68e695ebc3215d56dc93c29a13ef534c7d429ade663

      SHA512

      8554678fd1a2d71cbc07195c4a2973ff3be4aef89581e83d20358664590b6579eb7ddc5dc3a81717d2fa00adbf537fc19b68524fe6ba2657449f153bf2fc9970

    • C:\Windows\SysWOW64\vepdbqkkwxddfrp.exe

      Filesize

      255KB

      MD5

      81c3a73ec822aff5be2aed8d4ca0ca8a

      SHA1

      f16dd6ac63a113d2a3e072727919e693fb852afa

      SHA256

      af0655bdf1dff8cd28c0b68e695ebc3215d56dc93c29a13ef534c7d429ade663

      SHA512

      8554678fd1a2d71cbc07195c4a2973ff3be4aef89581e83d20358664590b6579eb7ddc5dc3a81717d2fa00adbf537fc19b68524fe6ba2657449f153bf2fc9970

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\grxqthzruimmk.exe

      Filesize

      255KB

      MD5

      d746235afa99711f63c1faa8316a5f9a

      SHA1

      70742a9de42e2cadd6db6203a252055bca9c8b63

      SHA256

      e8dc61ecb7003abd857f270b7bcdf6ae451a927cf881c5f6929f276ceb1a9166

      SHA512

      2dc33d03e4092f0744d15678098af7a6f70ddaf5d66198ec3111ecacce8deb1d34dea87748b0c20e807364786e9bb5bb8826cf526e883191ae808b47e4ed4919

    • \Windows\SysWOW64\jumuksjieu.exe

      Filesize

      255KB

      MD5

      021a449549bfaa19efc5673f7cf89489

      SHA1

      a17f9e4f3c02eb1ef4bf19843a2cd29f6cefee3d

      SHA256

      19825ec826d0e4c2415b87fea6356401a423c52dba1036e9cf6c1f8ebe833ad6

      SHA512

      22f1e0fe266ed4774a4520dc8e2db1ea05bc7d523759206c70828470f0ba8b1448f91a46f3a60c546619714e06bd40273f39ce84002107e371038b1b0895a3c7

    • \Windows\SysWOW64\mfquvciq.exe

      Filesize

      255KB

      MD5

      750dbf3dc22fe8e8b1545646807cfc71

      SHA1

      c8f640252378fdb175bc0b0e4dc42a91eafd31bc

      SHA256

      eb749aa15d3502484146f48fa9a06dae5a3e2d7ffeb031c0e95e7fad254cb4de

      SHA512

      f9a06a3dbce918b26cc01619dc38a38b2c28f084adebf138b7a520617f299ab7dbdcf03845b3d9df56fc0c83ba2a5b3aaeb18dbd26cff728fe1033a37b153421

    • \Windows\SysWOW64\mfquvciq.exe

      Filesize

      255KB

      MD5

      750dbf3dc22fe8e8b1545646807cfc71

      SHA1

      c8f640252378fdb175bc0b0e4dc42a91eafd31bc

      SHA256

      eb749aa15d3502484146f48fa9a06dae5a3e2d7ffeb031c0e95e7fad254cb4de

      SHA512

      f9a06a3dbce918b26cc01619dc38a38b2c28f084adebf138b7a520617f299ab7dbdcf03845b3d9df56fc0c83ba2a5b3aaeb18dbd26cff728fe1033a37b153421

    • \Windows\SysWOW64\vepdbqkkwxddfrp.exe

      Filesize

      255KB

      MD5

      81c3a73ec822aff5be2aed8d4ca0ca8a

      SHA1

      f16dd6ac63a113d2a3e072727919e693fb852afa

      SHA256

      af0655bdf1dff8cd28c0b68e695ebc3215d56dc93c29a13ef534c7d429ade663

      SHA512

      8554678fd1a2d71cbc07195c4a2973ff3be4aef89581e83d20358664590b6579eb7ddc5dc3a81717d2fa00adbf537fc19b68524fe6ba2657449f153bf2fc9970

    • memory/676-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/676-84-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/776-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/776-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/976-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/976-83-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1168-55-0x0000000075571000-0x0000000075573000-memory.dmp

      Filesize

      8KB

    • memory/1168-54-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1168-78-0x0000000003350000-0x00000000033F0000-memory.dmp

      Filesize

      640KB

    • memory/1168-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1452-100-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

      Filesize

      8KB

    • memory/1756-88-0x00000000720B1000-0x00000000720B4000-memory.dmp

      Filesize

      12KB

    • memory/1756-106-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1756-105-0x0000000070B1D000-0x0000000070B28000-memory.dmp

      Filesize

      44KB

    • memory/1756-94-0x0000000070B1D000-0x0000000070B28000-memory.dmp

      Filesize

      44KB

    • memory/1756-90-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1756-89-0x000000006FB31000-0x000000006FB33000-memory.dmp

      Filesize

      8KB

    • memory/1928-99-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1928-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1928-85-0x0000000003830000-0x00000000038D0000-memory.dmp

      Filesize

      640KB

    • memory/1980-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1980-82-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB