Analysis

  • max time kernel
    199s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 06:11

General

  • Target

    50f930a0d051640690b70eccc1bcd708e98983f16751296a84d893dcc79ee72e.exe

  • Size

    255KB

  • MD5

    64510ad0fe43ab7d3e45bc718fd9e466

  • SHA1

    fe0601245faa4feb73b501d38ca524c245e6e847

  • SHA256

    50f930a0d051640690b70eccc1bcd708e98983f16751296a84d893dcc79ee72e

  • SHA512

    65f19aaaf020335aa1255985f67773569cbbfa9229ee43b046c48dbed60894e72f1a89aa310e4839e23fc305975a317d3651daa5b7b0698bf7cbacb0356311d0

  • SSDEEP

    6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6j:Plf5j6zCNa0xeE3mU

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50f930a0d051640690b70eccc1bcd708e98983f16751296a84d893dcc79ee72e.exe
    "C:\Users\Admin\AppData\Local\Temp\50f930a0d051640690b70eccc1bcd708e98983f16751296a84d893dcc79ee72e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3276
    • C:\Windows\SysWOW64\oudojghzvu.exe
      oudojghzvu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Windows\SysWOW64\tekkzuav.exe
        C:\Windows\system32\tekkzuav.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4308
    • C:\Windows\SysWOW64\vxrwtujawepkher.exe
      vxrwtujawepkher.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ozumwvxmyzzoi.exe
        3⤵
          PID:1616
      • C:\Windows\SysWOW64\tekkzuav.exe
        tekkzuav.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5024
      • C:\Windows\SysWOW64\ozumwvxmyzzoi.exe
        ozumwvxmyzzoi.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:812
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      d4b2f72aa24284f8ac0d5a58ba734962

      SHA1

      6e4054f3ccd96dac655cba60697d0204f097b051

      SHA256

      b93d1e342e4053e9dffd2afe22a8fc349ee4aa985dbd9cbef5a6ec77408d079d

      SHA512

      53577f94004270f15fe6aacd9ec6b7011d7e14307bb66bc5246bcd7aceb4ae08c0befd3bc0e7c6badf1a51d232150aa197e7afb3ae33c6f490149ad2964a560d

    • C:\Windows\SysWOW64\oudojghzvu.exe

      Filesize

      255KB

      MD5

      4b20856ada59ee8dc785b176259c8ba9

      SHA1

      ab219fbdf2dcdcf9c380652aff2c8e4693d2d332

      SHA256

      bc324fb6a82a9c1b6057dedf3ce64411f164b95e4900a042858fb7fbfb9c8fad

      SHA512

      64b6461d52995c9c206e41c68c28a5b2a1f4cd61e942be67c74dc83d704af97a1b1a14c557b4b55cc4f0b4efba00aef02027c79edd83bedf2bef31677822107c

    • C:\Windows\SysWOW64\oudojghzvu.exe

      Filesize

      255KB

      MD5

      4b20856ada59ee8dc785b176259c8ba9

      SHA1

      ab219fbdf2dcdcf9c380652aff2c8e4693d2d332

      SHA256

      bc324fb6a82a9c1b6057dedf3ce64411f164b95e4900a042858fb7fbfb9c8fad

      SHA512

      64b6461d52995c9c206e41c68c28a5b2a1f4cd61e942be67c74dc83d704af97a1b1a14c557b4b55cc4f0b4efba00aef02027c79edd83bedf2bef31677822107c

    • C:\Windows\SysWOW64\ozumwvxmyzzoi.exe

      Filesize

      255KB

      MD5

      5f66439cb4e388c54d433bf0146829e9

      SHA1

      87bf233f372a1e894e22efb8aef46b8eb77defac

      SHA256

      82333a9a1f6862112c9a2f4283a96330f856e8393882a23aa130feda17ac881f

      SHA512

      95bc7fbf5e4a14e5bbf90c6de140aab2d7ddc73d7bbf457f1a908a7724340aeddacc135f8d147de5fa66f2fd3e5e6f3e491ef9243f89d5f7e2478e84c0d10a54

    • C:\Windows\SysWOW64\ozumwvxmyzzoi.exe

      Filesize

      255KB

      MD5

      5f66439cb4e388c54d433bf0146829e9

      SHA1

      87bf233f372a1e894e22efb8aef46b8eb77defac

      SHA256

      82333a9a1f6862112c9a2f4283a96330f856e8393882a23aa130feda17ac881f

      SHA512

      95bc7fbf5e4a14e5bbf90c6de140aab2d7ddc73d7bbf457f1a908a7724340aeddacc135f8d147de5fa66f2fd3e5e6f3e491ef9243f89d5f7e2478e84c0d10a54

    • C:\Windows\SysWOW64\tekkzuav.exe

      Filesize

      255KB

      MD5

      d32106cd8a81b02685424b1dc7389e51

      SHA1

      cc5983c85cf35ce1577918c0ee54bfec2acd0dc8

      SHA256

      a4495b788965685d349c1941043d8c18ee727a6e6eed71617591e4e968e9e31b

      SHA512

      fb26d5a15bf7867c8b881f8b5b10bbd330bed9d4f7f35f36c5bac9ab892e012b6c1135434b7cc4753ed36e2a418c79f9d9c8237154258924bf5effa89a33d2ae

    • C:\Windows\SysWOW64\tekkzuav.exe

      Filesize

      255KB

      MD5

      d32106cd8a81b02685424b1dc7389e51

      SHA1

      cc5983c85cf35ce1577918c0ee54bfec2acd0dc8

      SHA256

      a4495b788965685d349c1941043d8c18ee727a6e6eed71617591e4e968e9e31b

      SHA512

      fb26d5a15bf7867c8b881f8b5b10bbd330bed9d4f7f35f36c5bac9ab892e012b6c1135434b7cc4753ed36e2a418c79f9d9c8237154258924bf5effa89a33d2ae

    • C:\Windows\SysWOW64\tekkzuav.exe

      Filesize

      255KB

      MD5

      d32106cd8a81b02685424b1dc7389e51

      SHA1

      cc5983c85cf35ce1577918c0ee54bfec2acd0dc8

      SHA256

      a4495b788965685d349c1941043d8c18ee727a6e6eed71617591e4e968e9e31b

      SHA512

      fb26d5a15bf7867c8b881f8b5b10bbd330bed9d4f7f35f36c5bac9ab892e012b6c1135434b7cc4753ed36e2a418c79f9d9c8237154258924bf5effa89a33d2ae

    • C:\Windows\SysWOW64\vxrwtujawepkher.exe

      Filesize

      255KB

      MD5

      21c88b3f6e8e52b05c3eda104a2d2188

      SHA1

      6694e0929e570868f13affccb206b1331cdd3a6a

      SHA256

      0e218d4f411a42f61c6c49a8fe360f48cbbc9b483a86c372478c40c224e6f68d

      SHA512

      48c0d859a80d4f6e4c403fc195965b65dbb4413078e2ee0421440047ab163e9336f993c5d72b07c056b96e2c948cea30909248cd4ab2256145e18a6687633066

    • C:\Windows\SysWOW64\vxrwtujawepkher.exe

      Filesize

      255KB

      MD5

      21c88b3f6e8e52b05c3eda104a2d2188

      SHA1

      6694e0929e570868f13affccb206b1331cdd3a6a

      SHA256

      0e218d4f411a42f61c6c49a8fe360f48cbbc9b483a86c372478c40c224e6f68d

      SHA512

      48c0d859a80d4f6e4c403fc195965b65dbb4413078e2ee0421440047ab163e9336f993c5d72b07c056b96e2c948cea30909248cd4ab2256145e18a6687633066

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/812-148-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3276-132-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3276-155-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3836-139-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3980-140-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/3980-149-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4308-156-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4308-165-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/4512-163-0x00007FF84BCD0000-0x00007FF84BCE0000-memory.dmp

      Filesize

      64KB

    • memory/4512-157-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

      Filesize

      64KB

    • memory/4512-158-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

      Filesize

      64KB

    • memory/4512-159-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

      Filesize

      64KB

    • memory/4512-160-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

      Filesize

      64KB

    • memory/4512-161-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

      Filesize

      64KB

    • memory/4512-164-0x00007FF84BCD0000-0x00007FF84BCE0000-memory.dmp

      Filesize

      64KB

    • memory/5024-151-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/5024-147-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB