Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 02:11

General

  • Target

    8df9c8bcf5098270dc1012b8a6563596e44c8dcfc6423a52fd0185c35260112a.exe

  • Size

    255KB

  • MD5

    79a6fe42576922b7fc950809bdaa3b9d

  • SHA1

    96298b68c1242ef6c489b98b55caeb7b64c3f0a7

  • SHA256

    8df9c8bcf5098270dc1012b8a6563596e44c8dcfc6423a52fd0185c35260112a

  • SHA512

    2522fb0a084cab2be12cc926b9ad898a8c7755d28677a469a1dfd3dfb56d8d91c68441dcb3ee1eede17648b4fe8a9b47ea559939d7eea01fec385b834ba1cdf1

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJd:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIc

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8df9c8bcf5098270dc1012b8a6563596e44c8dcfc6423a52fd0185c35260112a.exe
    "C:\Users\Admin\AppData\Local\Temp\8df9c8bcf5098270dc1012b8a6563596e44c8dcfc6423a52fd0185c35260112a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\wquqqwmmup.exe
      wquqqwmmup.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\SysWOW64\acjrxajx.exe
        C:\Windows\system32\acjrxajx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:684
    • C:\Windows\SysWOW64\bbdiynghnxthqop.exe
      bbdiynghnxthqop.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1232
    • C:\Windows\SysWOW64\acjrxajx.exe
      acjrxajx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1228
    • C:\Windows\SysWOW64\inebnpttkslpw.exe
      inebnpttkslpw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1716
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      3ab40f245cec2f11a5e62fa1f68d5bba

      SHA1

      cd13219229f1dfdbc21964b3219e66e68e65874e

      SHA256

      aea4acc465ed2e72b8b6d6dc29e9f7f6fb331ddd538a7510c70cb9d9770c00df

      SHA512

      804c3907abb1767ec8ccf692b2756b37a9eef547bb6955a95be3f94577eb71165167d6a399a8a545a9622bd8379ce3b9e1f94bdd8728b8d8dcae99c456f4c826

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      3ab40f245cec2f11a5e62fa1f68d5bba

      SHA1

      cd13219229f1dfdbc21964b3219e66e68e65874e

      SHA256

      aea4acc465ed2e72b8b6d6dc29e9f7f6fb331ddd538a7510c70cb9d9770c00df

      SHA512

      804c3907abb1767ec8ccf692b2756b37a9eef547bb6955a95be3f94577eb71165167d6a399a8a545a9622bd8379ce3b9e1f94bdd8728b8d8dcae99c456f4c826

    • C:\Program Files\InstallApprove.doc.exe

      Filesize

      255KB

      MD5

      5841b3733f63c10260d4f71125db2485

      SHA1

      a43ea6c0b293f4ee5948c29c988589c0509af7fd

      SHA256

      f048e2adda832396becac8956f58cf2ed29cc805e27eef465c2215512acf7758

      SHA512

      66b4364bae2255439ba69be3d5bf406989e7dffe01076c13d6e421d98a49c392cb0f8db2bae78148e056419f9e62e15983cebd876430563efcbd7e006396d89a

    • C:\Windows\SysWOW64\acjrxajx.exe

      Filesize

      255KB

      MD5

      6fdc39c3bc3a4a7aaf38af20381c0970

      SHA1

      9116e19662f5665b93d8033a4246fb4f6dd874a2

      SHA256

      fbcfd80899c6fd34bb4776aa6a5ba4b16911fe75c68d505f2647a1b721eca26a

      SHA512

      0568629feaa7364c4057d290ae7757f272b223a51f645d7b07ea34b13623e148da233ab79c96872a706430e4e185bba156e78d5e324bcdfbebce17d78e7929c2

    • C:\Windows\SysWOW64\acjrxajx.exe

      Filesize

      255KB

      MD5

      6fdc39c3bc3a4a7aaf38af20381c0970

      SHA1

      9116e19662f5665b93d8033a4246fb4f6dd874a2

      SHA256

      fbcfd80899c6fd34bb4776aa6a5ba4b16911fe75c68d505f2647a1b721eca26a

      SHA512

      0568629feaa7364c4057d290ae7757f272b223a51f645d7b07ea34b13623e148da233ab79c96872a706430e4e185bba156e78d5e324bcdfbebce17d78e7929c2

    • C:\Windows\SysWOW64\acjrxajx.exe

      Filesize

      255KB

      MD5

      6fdc39c3bc3a4a7aaf38af20381c0970

      SHA1

      9116e19662f5665b93d8033a4246fb4f6dd874a2

      SHA256

      fbcfd80899c6fd34bb4776aa6a5ba4b16911fe75c68d505f2647a1b721eca26a

      SHA512

      0568629feaa7364c4057d290ae7757f272b223a51f645d7b07ea34b13623e148da233ab79c96872a706430e4e185bba156e78d5e324bcdfbebce17d78e7929c2

    • C:\Windows\SysWOW64\bbdiynghnxthqop.exe

      Filesize

      255KB

      MD5

      1e43678b57ef9aebc80a4ddbfdef3a08

      SHA1

      fce4a98dde1661e5ec603d8565f5789359e97218

      SHA256

      a868f93a68b1bb5f8a97f9b96fdf94af9e54ef4d87b390f9dc330b847878ab23

      SHA512

      f23a8df08d1f99a39dc6ac2edd19a73bf99d61a61bc3fc3a4c7af0114bef82b05accf02628109fe2d7976fafa308ef9dcce8c623acf0001b7f00e4b097d3773f

    • C:\Windows\SysWOW64\bbdiynghnxthqop.exe

      Filesize

      255KB

      MD5

      1e43678b57ef9aebc80a4ddbfdef3a08

      SHA1

      fce4a98dde1661e5ec603d8565f5789359e97218

      SHA256

      a868f93a68b1bb5f8a97f9b96fdf94af9e54ef4d87b390f9dc330b847878ab23

      SHA512

      f23a8df08d1f99a39dc6ac2edd19a73bf99d61a61bc3fc3a4c7af0114bef82b05accf02628109fe2d7976fafa308ef9dcce8c623acf0001b7f00e4b097d3773f

    • C:\Windows\SysWOW64\inebnpttkslpw.exe

      Filesize

      255KB

      MD5

      2030fbe5c7810d0fb2ff190658278880

      SHA1

      276c6094a72a9792e447d0345a2cbe5a6cbaa6e6

      SHA256

      c193f16d4e1e72f6a5dd603b73c6a3a6f0f538000be031f9d59b04aeccae3e66

      SHA512

      17d4291ab5dc29d5fee353bf4ec36c20c5f8dc805f3bf21aed6fc8ae29f994b65b6d75400a26ddc8542a6c6dd847fcea48df1d3604d2d6bbf891781b76757dec

    • C:\Windows\SysWOW64\inebnpttkslpw.exe

      Filesize

      255KB

      MD5

      2030fbe5c7810d0fb2ff190658278880

      SHA1

      276c6094a72a9792e447d0345a2cbe5a6cbaa6e6

      SHA256

      c193f16d4e1e72f6a5dd603b73c6a3a6f0f538000be031f9d59b04aeccae3e66

      SHA512

      17d4291ab5dc29d5fee353bf4ec36c20c5f8dc805f3bf21aed6fc8ae29f994b65b6d75400a26ddc8542a6c6dd847fcea48df1d3604d2d6bbf891781b76757dec

    • C:\Windows\SysWOW64\wquqqwmmup.exe

      Filesize

      255KB

      MD5

      9acea6b7b62e9a53eb0f54c472ff0b32

      SHA1

      5ffc53d50c06f38d8d12d0f27ca4699a05e76a23

      SHA256

      db7e0dd7b16158f0f99f579db1837d86da3bf8b9561e1396f0a879d9b5bd3769

      SHA512

      47e10c1b39115e2b5cb7eaf6d57c4fd4d74795968b99b7dd887e6e5264d3fffe43b7cdaa357a844e7487eb69672227c1ca148b0de4f2daa33643e0a0b26ddf50

    • C:\Windows\SysWOW64\wquqqwmmup.exe

      Filesize

      255KB

      MD5

      9acea6b7b62e9a53eb0f54c472ff0b32

      SHA1

      5ffc53d50c06f38d8d12d0f27ca4699a05e76a23

      SHA256

      db7e0dd7b16158f0f99f579db1837d86da3bf8b9561e1396f0a879d9b5bd3769

      SHA512

      47e10c1b39115e2b5cb7eaf6d57c4fd4d74795968b99b7dd887e6e5264d3fffe43b7cdaa357a844e7487eb69672227c1ca148b0de4f2daa33643e0a0b26ddf50

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\acjrxajx.exe

      Filesize

      255KB

      MD5

      6fdc39c3bc3a4a7aaf38af20381c0970

      SHA1

      9116e19662f5665b93d8033a4246fb4f6dd874a2

      SHA256

      fbcfd80899c6fd34bb4776aa6a5ba4b16911fe75c68d505f2647a1b721eca26a

      SHA512

      0568629feaa7364c4057d290ae7757f272b223a51f645d7b07ea34b13623e148da233ab79c96872a706430e4e185bba156e78d5e324bcdfbebce17d78e7929c2

    • \Windows\SysWOW64\acjrxajx.exe

      Filesize

      255KB

      MD5

      6fdc39c3bc3a4a7aaf38af20381c0970

      SHA1

      9116e19662f5665b93d8033a4246fb4f6dd874a2

      SHA256

      fbcfd80899c6fd34bb4776aa6a5ba4b16911fe75c68d505f2647a1b721eca26a

      SHA512

      0568629feaa7364c4057d290ae7757f272b223a51f645d7b07ea34b13623e148da233ab79c96872a706430e4e185bba156e78d5e324bcdfbebce17d78e7929c2

    • \Windows\SysWOW64\bbdiynghnxthqop.exe

      Filesize

      255KB

      MD5

      1e43678b57ef9aebc80a4ddbfdef3a08

      SHA1

      fce4a98dde1661e5ec603d8565f5789359e97218

      SHA256

      a868f93a68b1bb5f8a97f9b96fdf94af9e54ef4d87b390f9dc330b847878ab23

      SHA512

      f23a8df08d1f99a39dc6ac2edd19a73bf99d61a61bc3fc3a4c7af0114bef82b05accf02628109fe2d7976fafa308ef9dcce8c623acf0001b7f00e4b097d3773f

    • \Windows\SysWOW64\inebnpttkslpw.exe

      Filesize

      255KB

      MD5

      2030fbe5c7810d0fb2ff190658278880

      SHA1

      276c6094a72a9792e447d0345a2cbe5a6cbaa6e6

      SHA256

      c193f16d4e1e72f6a5dd603b73c6a3a6f0f538000be031f9d59b04aeccae3e66

      SHA512

      17d4291ab5dc29d5fee353bf4ec36c20c5f8dc805f3bf21aed6fc8ae29f994b65b6d75400a26ddc8542a6c6dd847fcea48df1d3604d2d6bbf891781b76757dec

    • \Windows\SysWOW64\wquqqwmmup.exe

      Filesize

      255KB

      MD5

      9acea6b7b62e9a53eb0f54c472ff0b32

      SHA1

      5ffc53d50c06f38d8d12d0f27ca4699a05e76a23

      SHA256

      db7e0dd7b16158f0f99f579db1837d86da3bf8b9561e1396f0a879d9b5bd3769

      SHA512

      47e10c1b39115e2b5cb7eaf6d57c4fd4d74795968b99b7dd887e6e5264d3fffe43b7cdaa357a844e7487eb69672227c1ca148b0de4f2daa33643e0a0b26ddf50

    • memory/684-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/684-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1228-84-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1228-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1232-83-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1232-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1388-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1388-88-0x0000000003830000-0x00000000038D0000-memory.dmp

      Filesize

      640KB

    • memory/1388-81-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1556-97-0x00000000715AD000-0x00000000715B8000-memory.dmp

      Filesize

      44KB

    • memory/1556-105-0x00000000715AD000-0x00000000715B8000-memory.dmp

      Filesize

      44KB

    • memory/1556-92-0x0000000072B41000-0x0000000072B44000-memory.dmp

      Filesize

      12KB

    • memory/1556-93-0x00000000705C1000-0x00000000705C3000-memory.dmp

      Filesize

      8KB

    • memory/1556-94-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1556-109-0x00000000715AD000-0x00000000715B8000-memory.dmp

      Filesize

      44KB

    • memory/1556-108-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1584-107-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmp

      Filesize

      8KB

    • memory/1716-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1716-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1896-86-0x0000000002EE0000-0x0000000002F80000-memory.dmp

      Filesize

      640KB

    • memory/1896-56-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1896-57-0x0000000002EE0000-0x0000000002F80000-memory.dmp

      Filesize

      640KB

    • memory/1896-82-0x0000000002EE0000-0x0000000002F80000-memory.dmp

      Filesize

      640KB

    • memory/1896-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1896-54-0x00000000763F1000-0x00000000763F3000-memory.dmp

      Filesize

      8KB