Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 16:24

General

  • Target

    68d19a1f01d6a2015000076f49b3123c19da3957963c5c63075f42c3f2fc86ab.exe

  • Size

    255KB

  • MD5

    9dbf65144e946041570dc0462acde0f2

  • SHA1

    cc0e3a5a42468efbf5d9092c64f6be6dffc766b5

  • SHA256

    68d19a1f01d6a2015000076f49b3123c19da3957963c5c63075f42c3f2fc86ab

  • SHA512

    be5bd04a30408258a82b4946f88f841f312c3aa839782f5b4699d8d7d16b450905b37b77795208821997baca75849cbe5424471bf70095159193cbbfa6e08918

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJI:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIh

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68d19a1f01d6a2015000076f49b3123c19da3957963c5c63075f42c3f2fc86ab.exe
    "C:\Users\Admin\AppData\Local\Temp\68d19a1f01d6a2015000076f49b3123c19da3957963c5c63075f42c3f2fc86ab.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\sngbjsnmxg.exe
      sngbjsnmxg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Windows\SysWOW64\baseahsh.exe
        C:\Windows\system32\baseahsh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2576
    • C:\Windows\SysWOW64\tfolfzejkhltyel.exe
      tfolfzejkhltyel.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4008
    • C:\Windows\SysWOW64\baseahsh.exe
      baseahsh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:256
    • C:\Windows\SysWOW64\xmznfmpugqutr.exe
      xmznfmpugqutr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4088
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    e18c60c4cf25baa39dd256f4c46e042c

    SHA1

    508d7c08a49321ae9366ba48dd08446b694731fe

    SHA256

    b545c0c6c339e1720dda35a9c4a82ba497f01e3064375863a2176d7ad70098a9

    SHA512

    76efd6135294bc7edf24bf2768100a42562128fdcbc1d14eb82dbb937dacd2446e9f4b100d6b5b3bbc7272d26d26af1f7d585f2e5e1cc248161655000fea6235

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    efd96d5e1ae1aa622f9269e5b16f653c

    SHA1

    3b418725f305b7771656424a1333162a86c1772d

    SHA256

    270ab685701715f501fe059e1b2a04f82c29efd32638d8828e73329d2963ed4d

    SHA512

    7566b048987cac571741ae0f98d8b93d723707e68c19fc3858f888e29cda0b5358120edd83593c5b6a1998b423b6bdab7dc7de892edf5c2efd85c59d0c7cbdb7

  • C:\Users\Admin\Documents\ApproveShow.doc.exe

    Filesize

    255KB

    MD5

    748a5086536ee5a1351894eca76f2301

    SHA1

    9db6b11e80fc2da4839f7ef41edaf20fe6b8b86b

    SHA256

    2c8af2afc0c288e31afa3136133d8dcb34643fb2efb9be3e6e7742a208fa18c3

    SHA512

    8553e4c2ca48f51d85c5b01d083e918cbf2e2d7b265fa1d60383459d71e566a7f65e10652c355c1f4d0d70c5e39a883655cd8b4c5e1406d2cb437747855e9800

  • C:\Users\Admin\Documents\ConvertToBackup.doc.exe

    Filesize

    255KB

    MD5

    8b0b507b769110904e0b5bc89caa95ce

    SHA1

    eec17a7e419f73d29ae6957e8aacb26a762cfd52

    SHA256

    87c4de9c0d9028a4fbfb78bdbde449414ff4d3c16340f176141844b788102e7d

    SHA512

    ce3fea754adeb3b67a2cd7fbefe531dc800d9cd74459835adaa6ce4e716d544f030240d020e97a545128fbf0dfaf6a2fc8cfb7ddc2a1c3f07b10676229651b9a

  • C:\Windows\SysWOW64\baseahsh.exe

    Filesize

    255KB

    MD5

    d9fac926f1e7540e4c485462550d8570

    SHA1

    382b669fa585fcc360aca9f7ce2fa3e2de46eb1c

    SHA256

    64ff6d18437d3b16aae65af2a97e87763bbab9a098b3aa430c120afec6924a05

    SHA512

    e0a09e1ac9cc21a02c7886023ebdeadfe45051a0d3985b517d1229f8e691e0d1c9562934247ea09796c566a401aa1ad655b2401eacfa97fbdda3a4fe79015d08

  • C:\Windows\SysWOW64\baseahsh.exe

    Filesize

    255KB

    MD5

    d9fac926f1e7540e4c485462550d8570

    SHA1

    382b669fa585fcc360aca9f7ce2fa3e2de46eb1c

    SHA256

    64ff6d18437d3b16aae65af2a97e87763bbab9a098b3aa430c120afec6924a05

    SHA512

    e0a09e1ac9cc21a02c7886023ebdeadfe45051a0d3985b517d1229f8e691e0d1c9562934247ea09796c566a401aa1ad655b2401eacfa97fbdda3a4fe79015d08

  • C:\Windows\SysWOW64\baseahsh.exe

    Filesize

    255KB

    MD5

    d9fac926f1e7540e4c485462550d8570

    SHA1

    382b669fa585fcc360aca9f7ce2fa3e2de46eb1c

    SHA256

    64ff6d18437d3b16aae65af2a97e87763bbab9a098b3aa430c120afec6924a05

    SHA512

    e0a09e1ac9cc21a02c7886023ebdeadfe45051a0d3985b517d1229f8e691e0d1c9562934247ea09796c566a401aa1ad655b2401eacfa97fbdda3a4fe79015d08

  • C:\Windows\SysWOW64\sngbjsnmxg.exe

    Filesize

    255KB

    MD5

    6d7c1d38da8725967daa0041efb2c6fd

    SHA1

    835c607c7843a1b4f385d6eddb0c28eea21784f8

    SHA256

    a413a0ffdb1c9951a1e9f458b9d7ac75802a54c7c3fa0ff067f5e8a1a715e44a

    SHA512

    3cb54032a0f47d768076897588e38d2923913af6dfa9e44ad220e4dbca6be8ff042f923e27e97475fb165e014956f4501a68114be1ce90fe06589e6c13acde30

  • C:\Windows\SysWOW64\sngbjsnmxg.exe

    Filesize

    255KB

    MD5

    6d7c1d38da8725967daa0041efb2c6fd

    SHA1

    835c607c7843a1b4f385d6eddb0c28eea21784f8

    SHA256

    a413a0ffdb1c9951a1e9f458b9d7ac75802a54c7c3fa0ff067f5e8a1a715e44a

    SHA512

    3cb54032a0f47d768076897588e38d2923913af6dfa9e44ad220e4dbca6be8ff042f923e27e97475fb165e014956f4501a68114be1ce90fe06589e6c13acde30

  • C:\Windows\SysWOW64\tfolfzejkhltyel.exe

    Filesize

    255KB

    MD5

    f666e8408f7e4561a9de2889b24b45ae

    SHA1

    acf3782afcbc27c80ffc165e91ae1fcd9784e643

    SHA256

    e817204b9ff860e2434c72b24d000c348cfa909f04cdc5bb73b08cac1ccbdca6

    SHA512

    83df41f96cb1c5c669944bd0b10d2f7491586ecda31368a9876492fea4f6709edbf69cf449f2f9350c00f85a22e1532ebc1f38d212549396856eb6f9cd47d0d8

  • C:\Windows\SysWOW64\tfolfzejkhltyel.exe

    Filesize

    255KB

    MD5

    f666e8408f7e4561a9de2889b24b45ae

    SHA1

    acf3782afcbc27c80ffc165e91ae1fcd9784e643

    SHA256

    e817204b9ff860e2434c72b24d000c348cfa909f04cdc5bb73b08cac1ccbdca6

    SHA512

    83df41f96cb1c5c669944bd0b10d2f7491586ecda31368a9876492fea4f6709edbf69cf449f2f9350c00f85a22e1532ebc1f38d212549396856eb6f9cd47d0d8

  • C:\Windows\SysWOW64\xmznfmpugqutr.exe

    Filesize

    255KB

    MD5

    7010de70a56ee3e44ddb2cf45c0f6f16

    SHA1

    5e5d40ee6780704d2249bb24e42502fd32097b8e

    SHA256

    4382aaba404dcdcbb1caa8d1ba63b4c10049d333d0b523df523d37d338145215

    SHA512

    4785d19606bd5dca1c12379efde178fb35b9d2377a2e8a82a04772b77707555c51a1ca896f3e9f1b086773d67e4058203b707d5cfbbdbd6c7e4993cd3b018f86

  • C:\Windows\SysWOW64\xmznfmpugqutr.exe

    Filesize

    255KB

    MD5

    7010de70a56ee3e44ddb2cf45c0f6f16

    SHA1

    5e5d40ee6780704d2249bb24e42502fd32097b8e

    SHA256

    4382aaba404dcdcbb1caa8d1ba63b4c10049d333d0b523df523d37d338145215

    SHA512

    4785d19606bd5dca1c12379efde178fb35b9d2377a2e8a82a04772b77707555c51a1ca896f3e9f1b086773d67e4058203b707d5cfbbdbd6c7e4993cd3b018f86

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    3b4206a67b34caa61f58de9de0bde6fe

    SHA1

    87df37f469bb8aebaf95de4c5b37b1ef6d21d4f5

    SHA256

    b161214a7ee3d2130c6fc4f6e8fe54212b4cf0096e7d2c4b3f5a981854de69f7

    SHA512

    bef21a8fae7f7c7b95377714804de43592df077bcabeed2bff61a3ef6a557b6d05e8c3314fdefe1c68ee794271b5033695f75fc1000ee63fa083b7d015b85477

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    a9bc6d178def36f17f710d19656ea2b4

    SHA1

    c4a0263d18f3e5d54f5acce1b3c87e946ca4208a

    SHA256

    8be10140d72a803280b66ac854fb0956c24ba662c51ddbe994e38c68e0ba39e7

    SHA512

    cdede3a03c966519693858bc4b26bb1a3b187fbd175c91b132dc6bf9fce6b51281254ce62c1263b84be4ae9b8cfcd028313b18e1b8e3785ad66702c77b7bd848

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    a9bc6d178def36f17f710d19656ea2b4

    SHA1

    c4a0263d18f3e5d54f5acce1b3c87e946ca4208a

    SHA256

    8be10140d72a803280b66ac854fb0956c24ba662c51ddbe994e38c68e0ba39e7

    SHA512

    cdede3a03c966519693858bc4b26bb1a3b187fbd175c91b132dc6bf9fce6b51281254ce62c1263b84be4ae9b8cfcd028313b18e1b8e3785ad66702c77b7bd848

  • memory/256-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/256-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2268-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2268-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2576-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2576-168-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3288-164-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3288-145-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4000-154-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-175-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-162-0x00007FF9E3000000-0x00007FF9E3010000-memory.dmp

    Filesize

    64KB

  • memory/4000-158-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-157-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-161-0x00007FF9E3000000-0x00007FF9E3010000-memory.dmp

    Filesize

    64KB

  • memory/4000-156-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-177-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-155-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-178-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4000-176-0x00007FF9E5370000-0x00007FF9E5380000-memory.dmp

    Filesize

    64KB

  • memory/4008-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4008-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4088-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4088-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB