Analysis

  • max time kernel
    170s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 19:17

General

  • Target

    eb929610db977223e41c5ce31eb0a931f01732ca14d1f9de9f489bcbb1a8e661.exe

  • Size

    255KB

  • MD5

    9d045523f90461054d82e6af61e6bcd4

  • SHA1

    d1ef34a19e965ff4b195a243f4039f98e774851a

  • SHA256

    eb929610db977223e41c5ce31eb0a931f01732ca14d1f9de9f489bcbb1a8e661

  • SHA512

    8ed926096d41d1885bdd72fceb77bbc5d22f4a29d47a82d363352901e6868e52d4eb36091626bbf474923b0bb95d43623f755a11f148e98445b170d8caf7fa74

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJa:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIT

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb929610db977223e41c5ce31eb0a931f01732ca14d1f9de9f489bcbb1a8e661.exe
    "C:\Users\Admin\AppData\Local\Temp\eb929610db977223e41c5ce31eb0a931f01732ca14d1f9de9f489bcbb1a8e661.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Windows\SysWOW64\eiyqdxavnj.exe
      eiyqdxavnj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\rckgnmtk.exe
        C:\Windows\system32\rckgnmtk.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4656
    • C:\Windows\SysWOW64\jolsvmmjxzlufsz.exe
      jolsvmmjxzlufsz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5064
    • C:\Windows\SysWOW64\rckgnmtk.exe
      rckgnmtk.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1932
    • C:\Windows\SysWOW64\imyjpsppzpodc.exe
      imyjpsppzpodc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3600
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    94296fafb1f6d055f350adbcfff839f8

    SHA1

    5ec8feb9ef5969ec3ec8354d7801aec1c7bb1052

    SHA256

    3bcc8e8bd36ceed23f10169cb271a2dfdf9691d656ca4172b80f15c408db62ed

    SHA512

    21d3b340f4cda07185c0e4600520d3f85d66ad688cf269ba974b87bfc39a5a52ad9e02cedeceb946a4c6bf9cb45561b9110961ec2c9aa7a11ad8734b9dda2636

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    0e184965030208d3716d88ad2efa83a6

    SHA1

    289099674124d4c8be19498766041984a579dc2b

    SHA256

    05dbb3d70a7d9c95675a759e9ed4f58c9ab3833bfd806dc853d21a46772a3927

    SHA512

    10f29f37ea00a08a08c88d077683f917d403273b5cb55021dc17e157c3e20bbee8ba060925f37ec9f9f4fd1e9200256204d4aee61c4ef2f0f9d70c5294dd7b45

  • C:\Users\Admin\Documents\StartUnlock.doc.exe

    Filesize

    255KB

    MD5

    5549d1020cad6c0a7d21fb09e31445f0

    SHA1

    804dda43b8bddeab518fceca4699dd1ea517281f

    SHA256

    0a889195ec150278e7d412e126e4a1d7f0109535b645549ff8d7551470333f4d

    SHA512

    76e49349fa25a4533164f4ad3dd59794ca8a98c6baa54ddad975461f05d2719ac85ce97ed0ec2fe9dc5fc0a61dfb48a7c25f784451e084fe438e6d8b0acca4aa

  • C:\Windows\SysWOW64\eiyqdxavnj.exe

    Filesize

    255KB

    MD5

    a81025b5791eac729125e6fb5be4118e

    SHA1

    4bb3e56f0446497daa5e2f64612194c74770c87e

    SHA256

    f47094bbf92bc973367a9fd27184b4eaf53e02902b341faef7af101b01ae2da0

    SHA512

    7e1695c1e77d7a85a485c6e9273f093f41285ddcdc4b902ce4e6ccf3a99355a25115d2bde879a159452b4acc555d7d0b655c0af4dd33cfe2e4e97ec1128e992a

  • C:\Windows\SysWOW64\eiyqdxavnj.exe

    Filesize

    255KB

    MD5

    a81025b5791eac729125e6fb5be4118e

    SHA1

    4bb3e56f0446497daa5e2f64612194c74770c87e

    SHA256

    f47094bbf92bc973367a9fd27184b4eaf53e02902b341faef7af101b01ae2da0

    SHA512

    7e1695c1e77d7a85a485c6e9273f093f41285ddcdc4b902ce4e6ccf3a99355a25115d2bde879a159452b4acc555d7d0b655c0af4dd33cfe2e4e97ec1128e992a

  • C:\Windows\SysWOW64\imyjpsppzpodc.exe

    Filesize

    255KB

    MD5

    d818aa622b841aef99caa158820235dc

    SHA1

    9039e9153ede39c4632d5424a8fd36829b334e06

    SHA256

    c972c9086adfc33b86d7b735534eaed5252a0ddbb7e4cce3da5803ff209e3a35

    SHA512

    f31af9a6157e8f29158b9b0549abae0709cd97156037e3a8ac30f37ee1f11ed408636ed969bcc12e23da0764ba9a4a6327bec5607d62d3e53c11e622331c4b7d

  • C:\Windows\SysWOW64\imyjpsppzpodc.exe

    Filesize

    255KB

    MD5

    d818aa622b841aef99caa158820235dc

    SHA1

    9039e9153ede39c4632d5424a8fd36829b334e06

    SHA256

    c972c9086adfc33b86d7b735534eaed5252a0ddbb7e4cce3da5803ff209e3a35

    SHA512

    f31af9a6157e8f29158b9b0549abae0709cd97156037e3a8ac30f37ee1f11ed408636ed969bcc12e23da0764ba9a4a6327bec5607d62d3e53c11e622331c4b7d

  • C:\Windows\SysWOW64\jolsvmmjxzlufsz.exe

    Filesize

    255KB

    MD5

    69bcc080ba83b01ab04dd711fe127ea4

    SHA1

    4e171d8aa86e360b9058bff4e40614f45c3ec37a

    SHA256

    ff31c876f408893081e3af7ed88e9977499347363d9e10a44e0c0f39d63ea45d

    SHA512

    a30485aca3f4d149c7965952561cae310501f78fe63a5143a02246fa1e16fadc3c6f53466cf7c29dac67f7e1e082260da8692600c596ee20e2ff62d130bcfcf9

  • C:\Windows\SysWOW64\jolsvmmjxzlufsz.exe

    Filesize

    255KB

    MD5

    69bcc080ba83b01ab04dd711fe127ea4

    SHA1

    4e171d8aa86e360b9058bff4e40614f45c3ec37a

    SHA256

    ff31c876f408893081e3af7ed88e9977499347363d9e10a44e0c0f39d63ea45d

    SHA512

    a30485aca3f4d149c7965952561cae310501f78fe63a5143a02246fa1e16fadc3c6f53466cf7c29dac67f7e1e082260da8692600c596ee20e2ff62d130bcfcf9

  • C:\Windows\SysWOW64\rckgnmtk.exe

    Filesize

    255KB

    MD5

    f4b9d87d849be46e761aead0092959c7

    SHA1

    13efa46db20bfdcd4b3d85b65699b8d58aa8e4a4

    SHA256

    2d294a7232aa73153b1461917fe84157ca9ba6102eb2dbad7dac29264f0d69d8

    SHA512

    796a1f6acc4bbff6a8819fd6df84069b76a77b936f6fcca7d7b8f676bbad15b229f8eaf680fea91e9d0b9517b16ae962667842c5c2312a8f9e651d9e85a840a5

  • C:\Windows\SysWOW64\rckgnmtk.exe

    Filesize

    255KB

    MD5

    f4b9d87d849be46e761aead0092959c7

    SHA1

    13efa46db20bfdcd4b3d85b65699b8d58aa8e4a4

    SHA256

    2d294a7232aa73153b1461917fe84157ca9ba6102eb2dbad7dac29264f0d69d8

    SHA512

    796a1f6acc4bbff6a8819fd6df84069b76a77b936f6fcca7d7b8f676bbad15b229f8eaf680fea91e9d0b9517b16ae962667842c5c2312a8f9e651d9e85a840a5

  • C:\Windows\SysWOW64\rckgnmtk.exe

    Filesize

    255KB

    MD5

    f4b9d87d849be46e761aead0092959c7

    SHA1

    13efa46db20bfdcd4b3d85b65699b8d58aa8e4a4

    SHA256

    2d294a7232aa73153b1461917fe84157ca9ba6102eb2dbad7dac29264f0d69d8

    SHA512

    796a1f6acc4bbff6a8819fd6df84069b76a77b936f6fcca7d7b8f676bbad15b229f8eaf680fea91e9d0b9517b16ae962667842c5c2312a8f9e651d9e85a840a5

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    94296fafb1f6d055f350adbcfff839f8

    SHA1

    5ec8feb9ef5969ec3ec8354d7801aec1c7bb1052

    SHA256

    3bcc8e8bd36ceed23f10169cb271a2dfdf9691d656ca4172b80f15c408db62ed

    SHA512

    21d3b340f4cda07185c0e4600520d3f85d66ad688cf269ba974b87bfc39a5a52ad9e02cedeceb946a4c6bf9cb45561b9110961ec2c9aa7a11ad8734b9dda2636

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    d2b917714f1998608e94f49403b80de4

    SHA1

    e3173235740b80d4379c2f6fc04fbdd423feed44

    SHA256

    47fb5e7ef0ef77719823502e43b01640d5b042f7aba9023caabfca94568b959e

    SHA512

    33c1aa75d602c9fd4289b52cf286712e789ab569bf2eec0301d69e15c25358b82e4e208d114f859a2dbd8f3d8d37aebadb7ecbf3c507cdf1d9cdb57cafef4122

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    d2b917714f1998608e94f49403b80de4

    SHA1

    e3173235740b80d4379c2f6fc04fbdd423feed44

    SHA256

    47fb5e7ef0ef77719823502e43b01640d5b042f7aba9023caabfca94568b959e

    SHA512

    33c1aa75d602c9fd4289b52cf286712e789ab569bf2eec0301d69e15c25358b82e4e208d114f859a2dbd8f3d8d37aebadb7ecbf3c507cdf1d9cdb57cafef4122

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    fe01512da24c15d4463ad2d077af431d

    SHA1

    edcb4fbf537e5c1573a3ebcbce7669d3a0c88b10

    SHA256

    bd2eb894cf742dac188cebb87a0933e1e27d58750a5da10f8d18f703a6f7d4f5

    SHA512

    56d87a99a0ce9826e5246b32c51256240225c1791a586ae2bb6a39b7fdafc83d4076d0e6a61bf308f8c441d957fb997baa40635d3db15bb3f8395030bc689bad

  • memory/1356-154-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-156-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-163-0x00007FFA4A2F0000-0x00007FFA4A300000-memory.dmp

    Filesize

    64KB

  • memory/1356-177-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-162-0x00007FFA4A2F0000-0x00007FFA4A300000-memory.dmp

    Filesize

    64KB

  • memory/1356-155-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-176-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-157-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-158-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-178-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1356-175-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/1932-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1932-151-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3600-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3600-168-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4452-150-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4452-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4464-138-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4464-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4656-169-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4656-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5064-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5064-149-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB