Analysis

  • max time kernel
    157s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 06:06

General

  • Target

    e3cb02b52cab28bba3f4dd61fa9f05901504b34a83e62bd49d9dff60bb32a1b6.exe

  • Size

    255KB

  • MD5

    4aac8f3ea665c8c209c00b9a83d73b86

  • SHA1

    38f53fe393676d4b64c8c35ce777162e3da069e1

  • SHA256

    e3cb02b52cab28bba3f4dd61fa9f05901504b34a83e62bd49d9dff60bb32a1b6

  • SHA512

    773a1004c3065f17f6101f245243b869d25e067e1a328ca0627ec445b04af0a6f4d1f9060d4292f3d6e3efac1f84d8323126e13a80d1e1133959f09deb6772a5

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI62:Plf5j6zCNa0xeE3mH

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3cb02b52cab28bba3f4dd61fa9f05901504b34a83e62bd49d9dff60bb32a1b6.exe
    "C:\Users\Admin\AppData\Local\Temp\e3cb02b52cab28bba3f4dd61fa9f05901504b34a83e62bd49d9dff60bb32a1b6.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\SysWOW64\yvhssuyfel.exe
      yvhssuyfel.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Windows\SysWOW64\hizhiauk.exe
        C:\Windows\system32\hizhiauk.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4656
    • C:\Windows\SysWOW64\mkqdcknxupheprb.exe
      mkqdcknxupheprb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5048
    • C:\Windows\SysWOW64\hizhiauk.exe
      hizhiauk.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4876
    • C:\Windows\SysWOW64\xufrbakywzruz.exe
      xufrbakywzruz.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:748
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4268

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    df21a1ce993d3cb035cf2b937f14180f

    SHA1

    a9a87487fcb95cd3a30935a446709c8aca9eaea1

    SHA256

    febcacc42ba52f907363ea695df80cd8f59e8891ba3230adc99baf554eb1a313

    SHA512

    a815122272bf433c65cd50d216972b9488d55b97045879d1e70521e36f7a3f7c0ed30ba07f8c3efcbaf5abe64452d4899082703273e640ee23d9c9296f068c3f

  • C:\Windows\SysWOW64\hizhiauk.exe

    Filesize

    255KB

    MD5

    5562431d018c33aa83e547cd710e90be

    SHA1

    556867bf3549704097649b6c8f6c82e751f7333e

    SHA256

    4c35bb604e28bcadd77ca4d9ca558449cadc39eeacfd00d356684e67a0d64332

    SHA512

    d1ffe089175055c06de7b594060fa56b97b968dacf67fe81cc3118fa0179b28b973ee010a804ada44af9350591761a133ce3388cb9e38221be4802b4a8c655de

  • C:\Windows\SysWOW64\hizhiauk.exe

    Filesize

    255KB

    MD5

    5562431d018c33aa83e547cd710e90be

    SHA1

    556867bf3549704097649b6c8f6c82e751f7333e

    SHA256

    4c35bb604e28bcadd77ca4d9ca558449cadc39eeacfd00d356684e67a0d64332

    SHA512

    d1ffe089175055c06de7b594060fa56b97b968dacf67fe81cc3118fa0179b28b973ee010a804ada44af9350591761a133ce3388cb9e38221be4802b4a8c655de

  • C:\Windows\SysWOW64\hizhiauk.exe

    Filesize

    255KB

    MD5

    5562431d018c33aa83e547cd710e90be

    SHA1

    556867bf3549704097649b6c8f6c82e751f7333e

    SHA256

    4c35bb604e28bcadd77ca4d9ca558449cadc39eeacfd00d356684e67a0d64332

    SHA512

    d1ffe089175055c06de7b594060fa56b97b968dacf67fe81cc3118fa0179b28b973ee010a804ada44af9350591761a133ce3388cb9e38221be4802b4a8c655de

  • C:\Windows\SysWOW64\mkqdcknxupheprb.exe

    Filesize

    255KB

    MD5

    a97fbdc2cc10311471fdc7083aeb40e3

    SHA1

    a5df08cfcf120d18f9b4a3b82069c7e3cd00249d

    SHA256

    07f4e52327606d9475458c5c21a2e870d68613b34c68e669baa1fa3a40e04aca

    SHA512

    f679d337bbbde4373faeaf37a198ac8793c5231e7bce65ec2682fac07a7614a4ceec9a586bfcb3bdde697a9c10086562f3db43af8a1799b727e15e6e99a256b1

  • C:\Windows\SysWOW64\mkqdcknxupheprb.exe

    Filesize

    255KB

    MD5

    a97fbdc2cc10311471fdc7083aeb40e3

    SHA1

    a5df08cfcf120d18f9b4a3b82069c7e3cd00249d

    SHA256

    07f4e52327606d9475458c5c21a2e870d68613b34c68e669baa1fa3a40e04aca

    SHA512

    f679d337bbbde4373faeaf37a198ac8793c5231e7bce65ec2682fac07a7614a4ceec9a586bfcb3bdde697a9c10086562f3db43af8a1799b727e15e6e99a256b1

  • C:\Windows\SysWOW64\xufrbakywzruz.exe

    Filesize

    255KB

    MD5

    caede32bb168218ee746232da2ac41e2

    SHA1

    728f696b65acc4eba5b011c558047f67c69447d1

    SHA256

    e377e1f383930b17283837b29b1551d726e62dd08775e5316c352884bb30d6d4

    SHA512

    fc42a6cfcd541a9fb7e82aea31f829294318a229d5dbf6c279a95a8363718a30a7e89f28dcb6781d51070f8557f1f6bfd4bd364da5db0c4f914fbfeeeb30cb8c

  • C:\Windows\SysWOW64\xufrbakywzruz.exe

    Filesize

    255KB

    MD5

    caede32bb168218ee746232da2ac41e2

    SHA1

    728f696b65acc4eba5b011c558047f67c69447d1

    SHA256

    e377e1f383930b17283837b29b1551d726e62dd08775e5316c352884bb30d6d4

    SHA512

    fc42a6cfcd541a9fb7e82aea31f829294318a229d5dbf6c279a95a8363718a30a7e89f28dcb6781d51070f8557f1f6bfd4bd364da5db0c4f914fbfeeeb30cb8c

  • C:\Windows\SysWOW64\yvhssuyfel.exe

    Filesize

    255KB

    MD5

    2ea676212c83a742d788c11a569c2c17

    SHA1

    e9660a9ac0ef8a35b75345dd09f0627e546da1c6

    SHA256

    5c711a4065c166c7ed4f13bfb83ac33ea600133e95700bc75952a9a7da9761c0

    SHA512

    3038994359f325c2fd44c417e584d34d822b3815dbcb03a247b474739a1f56f61ea7eb09c6c45ec4a664732eb706ff8dce601863791f03194cd5d64b355eb5ab

  • C:\Windows\SysWOW64\yvhssuyfel.exe

    Filesize

    255KB

    MD5

    2ea676212c83a742d788c11a569c2c17

    SHA1

    e9660a9ac0ef8a35b75345dd09f0627e546da1c6

    SHA256

    5c711a4065c166c7ed4f13bfb83ac33ea600133e95700bc75952a9a7da9761c0

    SHA512

    3038994359f325c2fd44c417e584d34d822b3815dbcb03a247b474739a1f56f61ea7eb09c6c45ec4a664732eb706ff8dce601863791f03194cd5d64b355eb5ab

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    009d6dea278c0db92fe2919e042e46dd

    SHA1

    f2aad61915db36c0ce4833cd57bc876220c71395

    SHA256

    fa8dfade2734d354b0ad54f5c6994527ecf4042d6fc5f5bad8b172b0618e0b58

    SHA512

    f8275ec1150193b75fd569270635717b0005bff093ed8d0e17995d69fe3a1b068cb9e7a01cadc4010faee8fbc4c8a42456c4068cffde16a468b238c3b269e2fc

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    13a2af8db7ed113f28160e10b98163ae

    SHA1

    52ab2e9b51028d89b174e4c3c3e1d0ca7fc097d5

    SHA256

    5cfc58cf8467db3770f59823ff0bae7c5610e2de6a17e7875969a6ce3adcbb34

    SHA512

    b4cd9dbbc082d119988c24496f7f530b0879f75ad3bcc7a636ff5435c98668792c8e03e2ddaac725cb0720b55eb7b20ef1180bb81df1396366461c45b0186f35

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    13a2af8db7ed113f28160e10b98163ae

    SHA1

    52ab2e9b51028d89b174e4c3c3e1d0ca7fc097d5

    SHA256

    5cfc58cf8467db3770f59823ff0bae7c5610e2de6a17e7875969a6ce3adcbb34

    SHA512

    b4cd9dbbc082d119988c24496f7f530b0879f75ad3bcc7a636ff5435c98668792c8e03e2ddaac725cb0720b55eb7b20ef1180bb81df1396366461c45b0186f35

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    13a2af8db7ed113f28160e10b98163ae

    SHA1

    52ab2e9b51028d89b174e4c3c3e1d0ca7fc097d5

    SHA256

    5cfc58cf8467db3770f59823ff0bae7c5610e2de6a17e7875969a6ce3adcbb34

    SHA512

    b4cd9dbbc082d119988c24496f7f530b0879f75ad3bcc7a636ff5435c98668792c8e03e2ddaac725cb0720b55eb7b20ef1180bb81df1396366461c45b0186f35

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    c1891816af074a697dbdba37f4e2c066

    SHA1

    f823b60676d24891d38a1f6e78bf539cdc322ef1

    SHA256

    d2e64b348af25f99eb35584ef1d603ca6ed40a8d3a379829175696fec8372ed1

    SHA512

    36c78b03afd01a40acbdf6e2032fa7394f649dd6fc4e8e3ff2f5d0c454d427ef68d0a868e820cce92c27b52d0204cd6f70f24e25183285b93c379c894a1e8e2e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    255KB

    MD5

    c1891816af074a697dbdba37f4e2c066

    SHA1

    f823b60676d24891d38a1f6e78bf539cdc322ef1

    SHA256

    d2e64b348af25f99eb35584ef1d603ca6ed40a8d3a379829175696fec8372ed1

    SHA512

    36c78b03afd01a40acbdf6e2032fa7394f649dd6fc4e8e3ff2f5d0c454d427ef68d0a868e820cce92c27b52d0204cd6f70f24e25183285b93c379c894a1e8e2e

  • memory/748-167-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/748-148-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3340-132-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/3340-153-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4268-154-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-161-0x00007FFD92AA0000-0x00007FFD92AB0000-memory.dmp

    Filesize

    64KB

  • memory/4268-156-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-157-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-158-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-175-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-155-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-162-0x00007FFD92AA0000-0x00007FFD92AB0000-memory.dmp

    Filesize

    64KB

  • memory/4268-176-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-178-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4268-177-0x00007FFD94C10000-0x00007FFD94C20000-memory.dmp

    Filesize

    64KB

  • memory/4656-152-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4656-168-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4844-145-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4844-164-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4876-147-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/4876-166-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5048-146-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/5048-165-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB