Analysis

  • max time kernel
    216s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 01:45

General

  • Target

    1c1235b2a3876e07761c73df1712a5339a6791226623ba3511e8dfe3422a61ff.exe

  • Size

    255KB

  • MD5

    673b0c17d383425b15975e13b093a2a6

  • SHA1

    2fbfe60d07a1366a114df1a370bb024683dfc32c

  • SHA256

    1c1235b2a3876e07761c73df1712a5339a6791226623ba3511e8dfe3422a61ff

  • SHA512

    28682150287b318e0c0a09eb9acd5822d2c1fc0a128723c1252cf336d937f112e870718c27a2405d723e7690e77426f5764e83d84200dee463e66237a3d976fc

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJp:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIg

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 27 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c1235b2a3876e07761c73df1712a5339a6791226623ba3511e8dfe3422a61ff.exe
    "C:\Users\Admin\AppData\Local\Temp\1c1235b2a3876e07761c73df1712a5339a6791226623ba3511e8dfe3422a61ff.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\dtsjqbilie.exe
      dtsjqbilie.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\baipcjps.exe
        C:\Windows\system32\baipcjps.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1572
    • C:\Windows\SysWOW64\gebjeoqncgvegjs.exe
      gebjeoqncgvegjs.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:568
    • C:\Windows\SysWOW64\baipcjps.exe
      baipcjps.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1468
    • C:\Windows\SysWOW64\wvdhmvfiwpzun.exe
      wvdhmvfiwpzun.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1168
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1624

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\baipcjps.exe

      Filesize

      255KB

      MD5

      414650df341e2868680452476ca227e7

      SHA1

      9e85d1f1aea023f8801569fbc995a92b63b267d7

      SHA256

      37a5dd5435320a9fc920ad0ea15e268c48f97a120811e96cebc2562d33aa8181

      SHA512

      b17432e5ab87e147560ab811bb24ea45fbeef0b2da2428bd470d7a911b1cccc7611f8499f505f8b569abae6a9e620ace87eec0625c3c3ca6460e535d52af6a0d

    • C:\Windows\SysWOW64\baipcjps.exe

      Filesize

      255KB

      MD5

      414650df341e2868680452476ca227e7

      SHA1

      9e85d1f1aea023f8801569fbc995a92b63b267d7

      SHA256

      37a5dd5435320a9fc920ad0ea15e268c48f97a120811e96cebc2562d33aa8181

      SHA512

      b17432e5ab87e147560ab811bb24ea45fbeef0b2da2428bd470d7a911b1cccc7611f8499f505f8b569abae6a9e620ace87eec0625c3c3ca6460e535d52af6a0d

    • C:\Windows\SysWOW64\baipcjps.exe

      Filesize

      255KB

      MD5

      414650df341e2868680452476ca227e7

      SHA1

      9e85d1f1aea023f8801569fbc995a92b63b267d7

      SHA256

      37a5dd5435320a9fc920ad0ea15e268c48f97a120811e96cebc2562d33aa8181

      SHA512

      b17432e5ab87e147560ab811bb24ea45fbeef0b2da2428bd470d7a911b1cccc7611f8499f505f8b569abae6a9e620ace87eec0625c3c3ca6460e535d52af6a0d

    • C:\Windows\SysWOW64\dtsjqbilie.exe

      Filesize

      255KB

      MD5

      7f222da3a835527072f247321843bc88

      SHA1

      f1af2a1261e474da4044674dff4547d7b0cb6b2b

      SHA256

      363f3a106004cc8cea1535ee10d60d950e90a0b46d3c8683e290c621b838626f

      SHA512

      360b4bb08db8edfa310dd44e014cd635bc862af0d3729a3fbab9acbd16e2a252f6cd82d11e5737b04de2c3ffe2ad202d054f646120ff0784b1149d81dd2d678d

    • C:\Windows\SysWOW64\dtsjqbilie.exe

      Filesize

      255KB

      MD5

      7f222da3a835527072f247321843bc88

      SHA1

      f1af2a1261e474da4044674dff4547d7b0cb6b2b

      SHA256

      363f3a106004cc8cea1535ee10d60d950e90a0b46d3c8683e290c621b838626f

      SHA512

      360b4bb08db8edfa310dd44e014cd635bc862af0d3729a3fbab9acbd16e2a252f6cd82d11e5737b04de2c3ffe2ad202d054f646120ff0784b1149d81dd2d678d

    • C:\Windows\SysWOW64\gebjeoqncgvegjs.exe

      Filesize

      255KB

      MD5

      84d54b23714af408b0885e5cfff18bfd

      SHA1

      ff9bbb1377552f8acb08cc9745b673ce55247059

      SHA256

      0358e8d7aa3a35246102bb442dfbd9a6d136fa699274caaf07898bce0a2214f6

      SHA512

      b9af28029f0f4c5ad62ae279292701377d948376254d39301e90336920bb8aefd5cb25862155a5876648ea236ccf1571ede23239ad82f35bf707a25e36d85e1d

    • C:\Windows\SysWOW64\gebjeoqncgvegjs.exe

      Filesize

      255KB

      MD5

      84d54b23714af408b0885e5cfff18bfd

      SHA1

      ff9bbb1377552f8acb08cc9745b673ce55247059

      SHA256

      0358e8d7aa3a35246102bb442dfbd9a6d136fa699274caaf07898bce0a2214f6

      SHA512

      b9af28029f0f4c5ad62ae279292701377d948376254d39301e90336920bb8aefd5cb25862155a5876648ea236ccf1571ede23239ad82f35bf707a25e36d85e1d

    • C:\Windows\SysWOW64\wvdhmvfiwpzun.exe

      Filesize

      255KB

      MD5

      9397bf8ffb8281ef483c9297d5182d95

      SHA1

      a55bda110ed82916a9aef5c3512e891a16cb4fad

      SHA256

      91fe28f07b9e83745799625b0d2096496aba64cd1c91cddd56feadf0fe6aaf0e

      SHA512

      79024def530ac79e517d7e1a14614f25dc747742bcb20ed3135a525a00e9319148a162f4015b8b194f21fc06b20931178a065b69d6776f5a5612b17eb73e81f6

    • C:\Windows\SysWOW64\wvdhmvfiwpzun.exe

      Filesize

      255KB

      MD5

      9397bf8ffb8281ef483c9297d5182d95

      SHA1

      a55bda110ed82916a9aef5c3512e891a16cb4fad

      SHA256

      91fe28f07b9e83745799625b0d2096496aba64cd1c91cddd56feadf0fe6aaf0e

      SHA512

      79024def530ac79e517d7e1a14614f25dc747742bcb20ed3135a525a00e9319148a162f4015b8b194f21fc06b20931178a065b69d6776f5a5612b17eb73e81f6

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\baipcjps.exe

      Filesize

      255KB

      MD5

      414650df341e2868680452476ca227e7

      SHA1

      9e85d1f1aea023f8801569fbc995a92b63b267d7

      SHA256

      37a5dd5435320a9fc920ad0ea15e268c48f97a120811e96cebc2562d33aa8181

      SHA512

      b17432e5ab87e147560ab811bb24ea45fbeef0b2da2428bd470d7a911b1cccc7611f8499f505f8b569abae6a9e620ace87eec0625c3c3ca6460e535d52af6a0d

    • \Windows\SysWOW64\baipcjps.exe

      Filesize

      255KB

      MD5

      414650df341e2868680452476ca227e7

      SHA1

      9e85d1f1aea023f8801569fbc995a92b63b267d7

      SHA256

      37a5dd5435320a9fc920ad0ea15e268c48f97a120811e96cebc2562d33aa8181

      SHA512

      b17432e5ab87e147560ab811bb24ea45fbeef0b2da2428bd470d7a911b1cccc7611f8499f505f8b569abae6a9e620ace87eec0625c3c3ca6460e535d52af6a0d

    • \Windows\SysWOW64\dtsjqbilie.exe

      Filesize

      255KB

      MD5

      7f222da3a835527072f247321843bc88

      SHA1

      f1af2a1261e474da4044674dff4547d7b0cb6b2b

      SHA256

      363f3a106004cc8cea1535ee10d60d950e90a0b46d3c8683e290c621b838626f

      SHA512

      360b4bb08db8edfa310dd44e014cd635bc862af0d3729a3fbab9acbd16e2a252f6cd82d11e5737b04de2c3ffe2ad202d054f646120ff0784b1149d81dd2d678d

    • \Windows\SysWOW64\gebjeoqncgvegjs.exe

      Filesize

      255KB

      MD5

      84d54b23714af408b0885e5cfff18bfd

      SHA1

      ff9bbb1377552f8acb08cc9745b673ce55247059

      SHA256

      0358e8d7aa3a35246102bb442dfbd9a6d136fa699274caaf07898bce0a2214f6

      SHA512

      b9af28029f0f4c5ad62ae279292701377d948376254d39301e90336920bb8aefd5cb25862155a5876648ea236ccf1571ede23239ad82f35bf707a25e36d85e1d

    • \Windows\SysWOW64\wvdhmvfiwpzun.exe

      Filesize

      255KB

      MD5

      9397bf8ffb8281ef483c9297d5182d95

      SHA1

      a55bda110ed82916a9aef5c3512e891a16cb4fad

      SHA256

      91fe28f07b9e83745799625b0d2096496aba64cd1c91cddd56feadf0fe6aaf0e

      SHA512

      79024def530ac79e517d7e1a14614f25dc747742bcb20ed3135a525a00e9319148a162f4015b8b194f21fc06b20931178a065b69d6776f5a5612b17eb73e81f6

    • memory/568-98-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/568-80-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/620-57-0x0000000003330000-0x00000000033D0000-memory.dmp

      Filesize

      640KB

    • memory/620-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/620-77-0x0000000003330000-0x00000000033D0000-memory.dmp

      Filesize

      640KB

    • memory/620-55-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/620-79-0x0000000003330000-0x00000000033D0000-memory.dmp

      Filesize

      640KB

    • memory/620-54-0x00000000763D1000-0x00000000763D3000-memory.dmp

      Filesize

      8KB

    • memory/1168-82-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1168-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1324-78-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1324-91-0x00000000038D0000-0x0000000003970000-memory.dmp

      Filesize

      640KB

    • memory/1324-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1324-101-0x00000000038D0000-0x0000000003970000-memory.dmp

      Filesize

      640KB

    • memory/1468-81-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1468-99-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1572-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1572-92-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1624-105-0x000007FEFC131000-0x000007FEFC133000-memory.dmp

      Filesize

      8KB

    • memory/2036-90-0x0000000070501000-0x0000000070503000-memory.dmp

      Filesize

      8KB

    • memory/2036-89-0x0000000072A81000-0x0000000072A84000-memory.dmp

      Filesize

      12KB

    • memory/2036-94-0x00000000714ED000-0x00000000714F8000-memory.dmp

      Filesize

      44KB

    • memory/2036-93-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2036-103-0x00000000714ED000-0x00000000714F8000-memory.dmp

      Filesize

      44KB