Analysis

  • max time kernel
    151s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 22:57

General

  • Target

    a92514ed93e63ae328a4d76c881a975b8baebfcc17fb19c4428e0eae2c01ba78.exe

  • Size

    255KB

  • MD5

    96a1693ba62d67320cd3dc074f3ce804

  • SHA1

    da55e99e4e15df86ef5c81ba60e334352bbff2ea

  • SHA256

    a92514ed93e63ae328a4d76c881a975b8baebfcc17fb19c4428e0eae2c01ba78

  • SHA512

    7ac579a74e6658a83cfcc43453f23c861479885f3fb9779a8ccf9639c852a9248a61bb98514a74c940232da82c2277f67e414385575acd8679c1433a92f42bcd

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJN:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIy

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 41 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a92514ed93e63ae328a4d76c881a975b8baebfcc17fb19c4428e0eae2c01ba78.exe
    "C:\Users\Admin\AppData\Local\Temp\a92514ed93e63ae328a4d76c881a975b8baebfcc17fb19c4428e0eae2c01ba78.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\guwnuglbyv.exe
      guwnuglbyv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\etxejjuw.exe
        C:\Windows\system32\etxejjuw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:1676
    • C:\Windows\SysWOW64\yqibxrycsdtwnli.exe
      yqibxrycsdtwnli.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c mgxkzaztfqiww.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SysWOW64\mgxkzaztfqiww.exe
          mgxkzaztfqiww.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:1788
    • C:\Windows\SysWOW64\etxejjuw.exe
      etxejjuw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1152
    • C:\Windows\SysWOW64\mgxkzaztfqiww.exe
      mgxkzaztfqiww.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1116
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:560
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1528
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x598
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:268

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

2
T1060

Winlogon Helper DLL

1
T1004

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

8
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe
    Filesize

    255KB

    MD5

    2ecea368036e95912332cb5318a66665

    SHA1

    f0dc6819c370eb8c39ec863d0aa41691eb224aa1

    SHA256

    f4967889a1e947c511f1718bba457662489a9d4fa9aaf4b67de849f08da129e5

    SHA512

    15f934c1b74225e402935db4805be4bbe09f9bf187a9ae588063ae61ec8fd3df83586a03fa5d9b6b68f89c0e5336e94b5951f07863c3637630aeb0c7a0cf57c8

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe
    Filesize

    255KB

    MD5

    844834a557b8135250bab951d1996f81

    SHA1

    0bc5dfcebc7518d83891d7c5bc3efea02b8b8f35

    SHA256

    0d06333303ff8341eb79c5c5ce9e2135d0c0100f65b409878680dd1d7e2f6f6e

    SHA512

    3b444ff6e4d5e4a0938fa1c804414cd01cd9b354631126b405e46311a64b3f2d16fc046e661381f2086fb71c52f7be5bed5ceec6d895d171d4a6f432b399aa85

  • C:\Windows\SysWOW64\etxejjuw.exe
    Filesize

    255KB

    MD5

    f94d674a91ec38e870baed8253765994

    SHA1

    10d7b0681e48aa82465e6915d299847bec701c6f

    SHA256

    cbb8fb4b3093bad7e5ed10499d8c37634dbf913c7e23fbe8a4fca799a33903cb

    SHA512

    e0777ca431832da7e7b7c6ef48d048adb94e28e0084661d0a1befddcf89570f7484aad6da957752897e26a9aacff63b86f0f12b90658a8da4021358e8b0e1967

  • C:\Windows\SysWOW64\etxejjuw.exe
    Filesize

    255KB

    MD5

    f94d674a91ec38e870baed8253765994

    SHA1

    10d7b0681e48aa82465e6915d299847bec701c6f

    SHA256

    cbb8fb4b3093bad7e5ed10499d8c37634dbf913c7e23fbe8a4fca799a33903cb

    SHA512

    e0777ca431832da7e7b7c6ef48d048adb94e28e0084661d0a1befddcf89570f7484aad6da957752897e26a9aacff63b86f0f12b90658a8da4021358e8b0e1967

  • C:\Windows\SysWOW64\etxejjuw.exe
    Filesize

    255KB

    MD5

    f94d674a91ec38e870baed8253765994

    SHA1

    10d7b0681e48aa82465e6915d299847bec701c6f

    SHA256

    cbb8fb4b3093bad7e5ed10499d8c37634dbf913c7e23fbe8a4fca799a33903cb

    SHA512

    e0777ca431832da7e7b7c6ef48d048adb94e28e0084661d0a1befddcf89570f7484aad6da957752897e26a9aacff63b86f0f12b90658a8da4021358e8b0e1967

  • C:\Windows\SysWOW64\guwnuglbyv.exe
    Filesize

    255KB

    MD5

    2bb81a2b18e4175ddb3a69baf6702d5d

    SHA1

    da82daedcaef411b23fc96e759705cba4211de25

    SHA256

    8d470d415a83821d474c95a450d6c06433c0e311a5925ee35aa3a288cbf6ba02

    SHA512

    259430bd90425afb8a1bc372aa15c4e6e42ceb27383fc407e2f7c321c16cda02970b413628e37ee396940f76ed861a4d0247b082430537e7cfb31695b66f8796

  • C:\Windows\SysWOW64\guwnuglbyv.exe
    Filesize

    255KB

    MD5

    2bb81a2b18e4175ddb3a69baf6702d5d

    SHA1

    da82daedcaef411b23fc96e759705cba4211de25

    SHA256

    8d470d415a83821d474c95a450d6c06433c0e311a5925ee35aa3a288cbf6ba02

    SHA512

    259430bd90425afb8a1bc372aa15c4e6e42ceb27383fc407e2f7c321c16cda02970b413628e37ee396940f76ed861a4d0247b082430537e7cfb31695b66f8796

  • C:\Windows\SysWOW64\mgxkzaztfqiww.exe
    Filesize

    255KB

    MD5

    1d494fb97b1173af2ada43b18cb3fdc3

    SHA1

    2fda4aea53ffdbdc4744e0339667a759f265a111

    SHA256

    e1e0523e73b3b74f53eaad7da3d516ebd4ec745145eec4188d9fb66246a5c41d

    SHA512

    7507fc4a1e1192b75dc3be02dcfd62396380542b06df608a83d6aeeaf058f3c92e0aa6c6df1c902ba02540a9b89296898ed3f6102cfdfe386900fdb1675e17b7

  • C:\Windows\SysWOW64\mgxkzaztfqiww.exe
    Filesize

    255KB

    MD5

    1d494fb97b1173af2ada43b18cb3fdc3

    SHA1

    2fda4aea53ffdbdc4744e0339667a759f265a111

    SHA256

    e1e0523e73b3b74f53eaad7da3d516ebd4ec745145eec4188d9fb66246a5c41d

    SHA512

    7507fc4a1e1192b75dc3be02dcfd62396380542b06df608a83d6aeeaf058f3c92e0aa6c6df1c902ba02540a9b89296898ed3f6102cfdfe386900fdb1675e17b7

  • C:\Windows\SysWOW64\mgxkzaztfqiww.exe
    Filesize

    255KB

    MD5

    1d494fb97b1173af2ada43b18cb3fdc3

    SHA1

    2fda4aea53ffdbdc4744e0339667a759f265a111

    SHA256

    e1e0523e73b3b74f53eaad7da3d516ebd4ec745145eec4188d9fb66246a5c41d

    SHA512

    7507fc4a1e1192b75dc3be02dcfd62396380542b06df608a83d6aeeaf058f3c92e0aa6c6df1c902ba02540a9b89296898ed3f6102cfdfe386900fdb1675e17b7

  • C:\Windows\SysWOW64\yqibxrycsdtwnli.exe
    Filesize

    255KB

    MD5

    fe9414349c77d1317d87ff8e9c1c0216

    SHA1

    74b1b6616d5cf1713ca5bca03686d7e9965b3884

    SHA256

    25cf8ee77b84d14e7d8cbc6ee7302a272c0fbd9e8239766fcf8385762427d241

    SHA512

    6843a28b674191f46173f0cf895a977a2d9a0a5230738de76e60521d8d0cb9e149fc3bd176aab34cfce4303f691996277c0c09af6e4184121378ada0bb7afd4c

  • C:\Windows\SysWOW64\yqibxrycsdtwnli.exe
    Filesize

    255KB

    MD5

    fe9414349c77d1317d87ff8e9c1c0216

    SHA1

    74b1b6616d5cf1713ca5bca03686d7e9965b3884

    SHA256

    25cf8ee77b84d14e7d8cbc6ee7302a272c0fbd9e8239766fcf8385762427d241

    SHA512

    6843a28b674191f46173f0cf895a977a2d9a0a5230738de76e60521d8d0cb9e149fc3bd176aab34cfce4303f691996277c0c09af6e4184121378ada0bb7afd4c

  • C:\Windows\mydoc.rtf
    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \Windows\SysWOW64\etxejjuw.exe
    Filesize

    255KB

    MD5

    f94d674a91ec38e870baed8253765994

    SHA1

    10d7b0681e48aa82465e6915d299847bec701c6f

    SHA256

    cbb8fb4b3093bad7e5ed10499d8c37634dbf913c7e23fbe8a4fca799a33903cb

    SHA512

    e0777ca431832da7e7b7c6ef48d048adb94e28e0084661d0a1befddcf89570f7484aad6da957752897e26a9aacff63b86f0f12b90658a8da4021358e8b0e1967

  • \Windows\SysWOW64\etxejjuw.exe
    Filesize

    255KB

    MD5

    f94d674a91ec38e870baed8253765994

    SHA1

    10d7b0681e48aa82465e6915d299847bec701c6f

    SHA256

    cbb8fb4b3093bad7e5ed10499d8c37634dbf913c7e23fbe8a4fca799a33903cb

    SHA512

    e0777ca431832da7e7b7c6ef48d048adb94e28e0084661d0a1befddcf89570f7484aad6da957752897e26a9aacff63b86f0f12b90658a8da4021358e8b0e1967

  • \Windows\SysWOW64\guwnuglbyv.exe
    Filesize

    255KB

    MD5

    2bb81a2b18e4175ddb3a69baf6702d5d

    SHA1

    da82daedcaef411b23fc96e759705cba4211de25

    SHA256

    8d470d415a83821d474c95a450d6c06433c0e311a5925ee35aa3a288cbf6ba02

    SHA512

    259430bd90425afb8a1bc372aa15c4e6e42ceb27383fc407e2f7c321c16cda02970b413628e37ee396940f76ed861a4d0247b082430537e7cfb31695b66f8796

  • \Windows\SysWOW64\mgxkzaztfqiww.exe
    Filesize

    255KB

    MD5

    1d494fb97b1173af2ada43b18cb3fdc3

    SHA1

    2fda4aea53ffdbdc4744e0339667a759f265a111

    SHA256

    e1e0523e73b3b74f53eaad7da3d516ebd4ec745145eec4188d9fb66246a5c41d

    SHA512

    7507fc4a1e1192b75dc3be02dcfd62396380542b06df608a83d6aeeaf058f3c92e0aa6c6df1c902ba02540a9b89296898ed3f6102cfdfe386900fdb1675e17b7

  • \Windows\SysWOW64\mgxkzaztfqiww.exe
    Filesize

    255KB

    MD5

    1d494fb97b1173af2ada43b18cb3fdc3

    SHA1

    2fda4aea53ffdbdc4744e0339667a759f265a111

    SHA256

    e1e0523e73b3b74f53eaad7da3d516ebd4ec745145eec4188d9fb66246a5c41d

    SHA512

    7507fc4a1e1192b75dc3be02dcfd62396380542b06df608a83d6aeeaf058f3c92e0aa6c6df1c902ba02540a9b89296898ed3f6102cfdfe386900fdb1675e17b7

  • \Windows\SysWOW64\yqibxrycsdtwnli.exe
    Filesize

    255KB

    MD5

    fe9414349c77d1317d87ff8e9c1c0216

    SHA1

    74b1b6616d5cf1713ca5bca03686d7e9965b3884

    SHA256

    25cf8ee77b84d14e7d8cbc6ee7302a272c0fbd9e8239766fcf8385762427d241

    SHA512

    6843a28b674191f46173f0cf895a977a2d9a0a5230738de76e60521d8d0cb9e149fc3bd176aab34cfce4303f691996277c0c09af6e4184121378ada0bb7afd4c

  • memory/560-98-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/560-92-0x0000000000000000-mapping.dmp
  • memory/560-109-0x000000007186D000-0x0000000071878000-memory.dmp
    Filesize

    44KB

  • memory/560-99-0x000000007186D000-0x0000000071878000-memory.dmp
    Filesize

    44KB

  • memory/560-96-0x0000000070881000-0x0000000070883000-memory.dmp
    Filesize

    8KB

  • memory/560-94-0x0000000072E01000-0x0000000072E04000-memory.dmp
    Filesize

    12KB

  • memory/1116-73-0x0000000000000000-mapping.dmp
  • memory/1116-105-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1116-86-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1152-104-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1152-85-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1152-67-0x0000000000000000-mapping.dmp
  • memory/1424-62-0x0000000000000000-mapping.dmp
  • memory/1424-103-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1424-84-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1476-83-0x0000000002FA0000-0x0000000003040000-memory.dmp
    Filesize

    640KB

  • memory/1476-93-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1476-54-0x0000000075E51000-0x0000000075E53000-memory.dmp
    Filesize

    8KB

  • memory/1476-56-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1476-57-0x0000000002FA0000-0x0000000003040000-memory.dmp
    Filesize

    640KB

  • memory/1528-97-0x000007FEFBE51000-0x000007FEFBE53000-memory.dmp
    Filesize

    8KB

  • memory/1528-112-0x0000000002680000-0x0000000002690000-memory.dmp
    Filesize

    64KB

  • memory/1676-108-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1676-95-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1676-89-0x0000000000000000-mapping.dmp
  • memory/1788-87-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1788-106-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1788-79-0x0000000000000000-mapping.dmp
  • memory/1816-77-0x0000000000000000-mapping.dmp
  • memory/1992-107-0x0000000003830000-0x00000000038D0000-memory.dmp
    Filesize

    640KB

  • memory/1992-82-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1992-102-0x0000000000400000-0x00000000004A0000-memory.dmp
    Filesize

    640KB

  • memory/1992-58-0x0000000000000000-mapping.dmp