Analysis

  • max time kernel
    165s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 19:10

General

  • Target

    6f0aec34dbf9c47ed2b246e53b0f78261d22413147274b8bc9b55716ae4b29a8.exe

  • Size

    255KB

  • MD5

    068cb9608813612279f849fb6774056f

  • SHA1

    19fb32a6083c6206746c75926032915fe8e707c0

  • SHA256

    6f0aec34dbf9c47ed2b246e53b0f78261d22413147274b8bc9b55716ae4b29a8

  • SHA512

    2ae4cb76773760b87ccbb6a08e6033ccab864369ef43e1f5768004c9dbbe72efde84abc149b41d7ce1c52b507e1c0cd09f447a82e3be7476c7d5f047803ca641

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJc:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI5

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 12 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0aec34dbf9c47ed2b246e53b0f78261d22413147274b8bc9b55716ae4b29a8.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0aec34dbf9c47ed2b246e53b0f78261d22413147274b8bc9b55716ae4b29a8.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\SysWOW64\cymsqoriar.exe
      cymsqoriar.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Windows\SysWOW64\xxkvxpso.exe
        C:\Windows\system32\xxkvxpso.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:920
    • C:\Windows\SysWOW64\jtwmqbaswvqmfqt.exe
      jtwmqbaswvqmfqt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1940
    • C:\Windows\SysWOW64\xxkvxpso.exe
      xxkvxpso.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3332
    • C:\Windows\SysWOW64\wcroofpdbthvb.exe
      wcroofpdbthvb.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3224
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    078ee38c75abe1cb42d4c880954543df

    SHA1

    aa636d05337a92fe28a03f890d63cb62045a1b9d

    SHA256

    fb902d6144f82638d9618d27e14274bbdd8509f4f4af3140d7ab7a0ec2d97b47

    SHA512

    3d3bc412af315c2570e4d4f58284cbb36ea8b4d7c5d0c84c1ea71e2369bf35069d1a45c16ba7aeb54d68951ddf3621b4d429b20f6b3ad262d739caf61a401f96

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    5a3d0cd3436e9f310ddd9edd7874bbd5

    SHA1

    7b1a42455c36d64648a55fb37c3386723c42bc66

    SHA256

    d61a74be5be6b35c85649a1d3aa6070795f7a07e18b6fb0cadd3bcfb7ff421cd

    SHA512

    bfedf7e196106fa16905c58e934b3e902f43b280e5f019e5ec1cf288302bb592554069094b5262955bb5e5ef2940f1044558ebd6d2e395e353ee8ba312d2ae58

  • C:\Windows\SysWOW64\cymsqoriar.exe

    Filesize

    255KB

    MD5

    c210542fbcbd525a6d79392fe69a8381

    SHA1

    f1203b52a0624561bc1b91ff58443d9e671f4d83

    SHA256

    7bf0e684b7e9878506d0904d961fa573b4f4b0fe3f95deae2cd47c5393502efc

    SHA512

    cf88e11626ba7c483e14874532290c62183484094b6150ecf3ce79ed4ae6eda8f3b65cccf181a1f41da6106264c24da0469e3c4699f0efb16766168255e91402

  • C:\Windows\SysWOW64\cymsqoriar.exe

    Filesize

    255KB

    MD5

    c210542fbcbd525a6d79392fe69a8381

    SHA1

    f1203b52a0624561bc1b91ff58443d9e671f4d83

    SHA256

    7bf0e684b7e9878506d0904d961fa573b4f4b0fe3f95deae2cd47c5393502efc

    SHA512

    cf88e11626ba7c483e14874532290c62183484094b6150ecf3ce79ed4ae6eda8f3b65cccf181a1f41da6106264c24da0469e3c4699f0efb16766168255e91402

  • C:\Windows\SysWOW64\jtwmqbaswvqmfqt.exe

    Filesize

    255KB

    MD5

    ff1625c1d8610e6ed54bf5155b92b485

    SHA1

    697eef729ca8a8738f81bde1060851efbf2cf81a

    SHA256

    96a375662f320bc704fbb6771829034e22dd626d4150ca209e480e299bf7b041

    SHA512

    e4759ef90dffcdacd061706757cee4aaf4ad2daf5cdaff2420f04eb180eb5752d38f2a12850c0a5c1788e68ee875d6dc6c17c292f4c1043aa2ed91910f90a572

  • C:\Windows\SysWOW64\jtwmqbaswvqmfqt.exe

    Filesize

    255KB

    MD5

    ff1625c1d8610e6ed54bf5155b92b485

    SHA1

    697eef729ca8a8738f81bde1060851efbf2cf81a

    SHA256

    96a375662f320bc704fbb6771829034e22dd626d4150ca209e480e299bf7b041

    SHA512

    e4759ef90dffcdacd061706757cee4aaf4ad2daf5cdaff2420f04eb180eb5752d38f2a12850c0a5c1788e68ee875d6dc6c17c292f4c1043aa2ed91910f90a572

  • C:\Windows\SysWOW64\wcroofpdbthvb.exe

    Filesize

    255KB

    MD5

    4a898354920f176eb80c93ce91e15f29

    SHA1

    9587ce63d834ae63de09aeac7d042b4b446465d2

    SHA256

    c61e35b8b9830e7f0804cb029bd4f41c905baf882e9d4d6552cbefb873d990d6

    SHA512

    d9b01ac4d8fff11f22831ac5a4eae682559bae53fb680416bae0a9d6f9efbfbb5179b731d490fe4940546bd01c832bb98e21046d73ad3294abf0fb3e0fb93a08

  • C:\Windows\SysWOW64\wcroofpdbthvb.exe

    Filesize

    255KB

    MD5

    4a898354920f176eb80c93ce91e15f29

    SHA1

    9587ce63d834ae63de09aeac7d042b4b446465d2

    SHA256

    c61e35b8b9830e7f0804cb029bd4f41c905baf882e9d4d6552cbefb873d990d6

    SHA512

    d9b01ac4d8fff11f22831ac5a4eae682559bae53fb680416bae0a9d6f9efbfbb5179b731d490fe4940546bd01c832bb98e21046d73ad3294abf0fb3e0fb93a08

  • C:\Windows\SysWOW64\xxkvxpso.exe

    Filesize

    255KB

    MD5

    f607339a11df0917ab1ca4af912cd72f

    SHA1

    d7f68db8dcaeeb6350f557af4603c4f555a4d6c7

    SHA256

    47c6512aeb8d4b9c6371376001439f24a8668044de3f0300a03039f3d67aab15

    SHA512

    7985a9b0ab16daf69c502432ff61361620e5e3ae7cdee1ecfc0797db6500af93a4f077d08ea393757656980737ff2b28e14808990832b2ff6b3ac5d64e680402

  • C:\Windows\SysWOW64\xxkvxpso.exe

    Filesize

    255KB

    MD5

    f607339a11df0917ab1ca4af912cd72f

    SHA1

    d7f68db8dcaeeb6350f557af4603c4f555a4d6c7

    SHA256

    47c6512aeb8d4b9c6371376001439f24a8668044de3f0300a03039f3d67aab15

    SHA512

    7985a9b0ab16daf69c502432ff61361620e5e3ae7cdee1ecfc0797db6500af93a4f077d08ea393757656980737ff2b28e14808990832b2ff6b3ac5d64e680402

  • C:\Windows\SysWOW64\xxkvxpso.exe

    Filesize

    255KB

    MD5

    f607339a11df0917ab1ca4af912cd72f

    SHA1

    d7f68db8dcaeeb6350f557af4603c4f555a4d6c7

    SHA256

    47c6512aeb8d4b9c6371376001439f24a8668044de3f0300a03039f3d67aab15

    SHA512

    7985a9b0ab16daf69c502432ff61361620e5e3ae7cdee1ecfc0797db6500af93a4f077d08ea393757656980737ff2b28e14808990832b2ff6b3ac5d64e680402

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/920-159-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/920-154-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1168-133-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1168-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1168-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1940-156-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1940-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3224-149-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3224-158-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3332-157-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3332-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4540-163-0x00007FFE8F650000-0x00007FFE8F660000-memory.dmp

    Filesize

    64KB

  • memory/4540-160-0x00007FFE8F650000-0x00007FFE8F660000-memory.dmp

    Filesize

    64KB

  • memory/4540-162-0x00007FFE8F650000-0x00007FFE8F660000-memory.dmp

    Filesize

    64KB

  • memory/4540-161-0x00007FFE8F650000-0x00007FFE8F660000-memory.dmp

    Filesize

    64KB

  • memory/4540-164-0x00007FFE8F650000-0x00007FFE8F660000-memory.dmp

    Filesize

    64KB

  • memory/4540-167-0x00007FFE8CDA0000-0x00007FFE8CDB0000-memory.dmp

    Filesize

    64KB

  • memory/4540-168-0x00007FFE8CDA0000-0x00007FFE8CDB0000-memory.dmp

    Filesize

    64KB

  • memory/4676-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4676-155-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB