Analysis

  • max time kernel
    136s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 22:35

General

  • Target

    1624dc9535d5a83f542323e1d0a34e3a.exe

  • Size

    512KB

  • MD5

    1624dc9535d5a83f542323e1d0a34e3a

  • SHA1

    08426e094d6c34ad38d9fd39d83b02e23b6c53c1

  • SHA256

    a025cb33d356a0395c4e098f8f66800ac4bb02eddbd049a26c8957b5bd6a4705

  • SHA512

    9ce3c6f26cedcc4c51aabf7315d734374eb5928349927652389aa836510141a70c6b71461b19fd57d5840c63bbaf37200d57d91b97c2e61666829a4b823d4167

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5d

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 18 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1624dc9535d5a83f542323e1d0a34e3a.exe
    "C:\Users\Admin\AppData\Local\Temp\1624dc9535d5a83f542323e1d0a34e3a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1356
      • C:\Windows\SysWOW64\kfdgfnimxqduo.exe
        kfdgfnimxqduo.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2592
      • C:\Windows\SysWOW64\ckgtbtwt.exe
        ckgtbtwt.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2632
      • C:\Windows\SysWOW64\ctetnusaputeptn.exe
        ctetnusaputeptn.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2756
      • C:\Windows\SysWOW64\jnsqzrxica.exe
        jnsqzrxica.exe
        2⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2620
    • C:\Windows\SysWOW64\ckgtbtwt.exe
      C:\Windows\system32\ckgtbtwt.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      89KB

      MD5

      f0af0f19423eee0b62d97001da48f53f

      SHA1

      321ce00a3873a97d2c1c42257c18072eeee676ae

      SHA256

      73fbeccfa0580de059e745d39f9f14a531b72208f8997a849635ce46f73cdb94

      SHA512

      ff3478821f4cc0fae0d139d44a59d8ffd69192281db8a3c0a2710851a8e300af363d8822d96e70568993676d32829da80c75f19d6e1d116db2b46e146d82808f

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      107KB

      MD5

      15c1dda5ac9f917de2f4579c3c2b3fd2

      SHA1

      f41f73a06f0af984452d1db720cf65dca1878e59

      SHA256

      5161772987dbd14f85ac231afd1ca728c7594b5876456b35d5030eb0d30b45f4

      SHA512

      ba270a916ff4999f0dd5d08a6ff8171c9e3c25930ca79b9d31a46c90395f6874f688cacd4b6cfb324438028ad6a057adff362a2bb364d0116b354df337e5e685

    • C:\Windows\SysWOW64\ckgtbtwt.exe

      Filesize

      77KB

      MD5

      72c357861e37cced4c658794b5e67fcc

      SHA1

      2c5755a7d0bc04c5ab2868d0c7afbf0a858bfd8b

      SHA256

      e445cbd0b2e84e514a27f98b31f26b76cce86aa1fd02a51092a4a27344ce0373

      SHA512

      65bf0e56310948533d773f75f9c8c57e103212af273a79cfde5fe5d8fccf0ac7c7de318abb6e9ad276604dd6053c0d0f50cc83d230bbb79fb1ee31cff00a6672

    • C:\Windows\SysWOW64\ckgtbtwt.exe

      Filesize

      16KB

      MD5

      50aef5e6e8f949a288d66049453e0ecd

      SHA1

      d194e926c387b88cb92c6c47fe80392f3ae1889a

      SHA256

      150bdf79cad23efd9286ee805b863ae9275cc7fa41b8588b8f689a1f61d8d9b2

      SHA512

      ae12fd2be677cdd9483258fb7553af60b89083a8ce19e00e3970ebf546a04d3b7c4c5a55dad77c881ce81206cf9f5f5b8f59f3aedd5e4744f51f586fe757a9e7

    • C:\Windows\SysWOW64\ckgtbtwt.exe

      Filesize

      114KB

      MD5

      ecf2703d3d6a98d1e11532099f2eba8f

      SHA1

      6d1c585a8ecbc29799918cabd2ff6bbafa7f3903

      SHA256

      65d5147836987df9f0b32d6ee4ae31075263c7c234bd542484c512eb4d881f60

      SHA512

      becbcbb011deea880e50fe83622e1f455ed0ea0567faaf91492a65a81aededcbfeeec69db493dea6094b8f887d3d02ec5384650c66266fadfa21be7ac62be099

    • C:\Windows\SysWOW64\ctetnusaputeptn.exe

      Filesize

      94KB

      MD5

      29988e5e977f58e8215c69596519e9a6

      SHA1

      7c9642c56773861e1731d173ca8755b851c885a0

      SHA256

      091916ba8f514ca217c7cb260024a452bf781c10796b07c67de3fbefed427384

      SHA512

      0b4b74c1571ecb6c8b050ed8b92a89fff19a191d0c65e3d1d117472b3cb19abee5954214d045aa301802b29c312b36cbbf6b32ab51fd24256c0943c0f07308ae

    • C:\Windows\SysWOW64\ctetnusaputeptn.exe

      Filesize

      26KB

      MD5

      f33de7318e8c022758dd3dddb8ce563b

      SHA1

      2e9de7776a42294d727f02b1df0d79a7f03fc889

      SHA256

      86e344dd5121ca0b9365f6478a092bfdb909a06a5c9729f59eb6b2f2fff640bd

      SHA512

      336d6906235cb58cc46a03f71d651ac2429eb9e8b3bb282d09606e7a5d3754922317888a3083a0659fd674f8e3ac7ba09235380a1dfe2896878a5e8fa874fd5a

    • C:\Windows\SysWOW64\ctetnusaputeptn.exe

      Filesize

      39KB

      MD5

      bd0d24be4e9111eee6267d129761aef8

      SHA1

      fa3364ea1f938958a49308a34e9552f11f81ad09

      SHA256

      8352411538b5840ed64089f184236db5b2cfe0a7cb281f339ef44722d6bcde79

      SHA512

      85ccbf82ccd87ebb2be9ddb94d0f6ca638d12ec58a4bdf38ed26dcce78e8e95ca65b64672cc6e160f67e54340121f078c86bf04eabb36a281a007c8d0371f69c

    • C:\Windows\SysWOW64\jnsqzrxica.exe

      Filesize

      13KB

      MD5

      657aee767d56adb6440d8dc01e2fc6c0

      SHA1

      9e53ad958e40df54d6651248e5d693914c51f8d9

      SHA256

      c083a95d6b05e2f77448671a81ac7bf0aa15ef1ceee23e85490f274b1963e341

      SHA512

      274ae1de8a4dba1beaa52a816d128856009f8075377687b0b1b3950f071887a6df91d3de50330144c4ee0c492eea2a32da065bbbe1624863f8a66badd2432310

    • C:\Windows\SysWOW64\jnsqzrxica.exe

      Filesize

      71KB

      MD5

      69811384457a69c24b983e59114dfdfc

      SHA1

      ef0547eeb7f095932c3e5d36fecf8988e035bf39

      SHA256

      b4626c2b0d81cd1b29a13412cdda2139f3d064ea3f9f2904ac1b27f9128a1f4b

      SHA512

      9d1708c989ef03f0fbb3678f16ba0a6b7721dc221e95a39c820f79247c35dc38282eb3a9e26f8c21e81360c5f2ea72c16a3e6fa06fd8476e4d39f626d0a4c15c

    • C:\Windows\SysWOW64\kfdgfnimxqduo.exe

      Filesize

      39KB

      MD5

      aaefc26883609e8b9c2bfd8b1b71f318

      SHA1

      e7d578ee8da27d21992951d838a1ed76df96c16a

      SHA256

      83a3ab5c259567522c039a67740709ad1d2b3b28cb19461451eb8cafd0391dd5

      SHA512

      842488c1c3b3fa2cdfbdaad4ce31766852a58a7707055b6061d17f3e1a747011dc277b234150ea3580046beb7a381f6e5a12e2c09bf690b97bb86198ffe7fce2

    • C:\Windows\SysWOW64\kfdgfnimxqduo.exe

      Filesize

      24KB

      MD5

      675d961924dc905e70752c536c0424a2

      SHA1

      4d83e019fc0bd075abba101f64115d44c649f4fd

      SHA256

      01c426fb5a9009a59848bc2982ab17c2688c55176e5233408638c6e58e31d276

      SHA512

      b6932c6c47bf1c21012f3062bb5f2b58e02d610333a77ed0d7facdb41092b7afebb2a5c797df1efb11694466c60f2f74ba02becfb18de00bbfe75b09295d58df

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\ckgtbtwt.exe

      Filesize

      43KB

      MD5

      ae60b99028db279c6390f8eab9ce79a4

      SHA1

      0843819beacc2c24bfd2625d45ddc7e3562aa89c

      SHA256

      190da17f9a99ede5204358c88015a70286f7cfd44729b5453f0c40b3a951833c

      SHA512

      0016197fc7421e628fca1e17672f4b06531c5a2f90799a1969226c9e251e3aabf1f48a0a7ffd6d8c64e350e0dcce5df1dceeee9d9075911f596ea40ffc5bf347

    • \Windows\SysWOW64\ckgtbtwt.exe

      Filesize

      59KB

      MD5

      9fed648457934b36e931bf6c25b8ffe1

      SHA1

      54a223a65ca28fd2ddac97db2562465d63adc465

      SHA256

      a318f5e2cd1f781b5fdf9c70e2c4e9aae5261acd376cf4a901245dbfb5cabf37

      SHA512

      38e3f077e2953a78648071d17bd64a3937d3b60e9581712078cab5e849458359df3e3a8472cd3c78669731c62c3e3e65062f8a8f66590961738332c3f5cdec69

    • \Windows\SysWOW64\ctetnusaputeptn.exe

      Filesize

      87KB

      MD5

      fa49f1a4dcfbe493ae39186b321fe1a7

      SHA1

      28e37ac54e53ea0e1ebd4d385335555a600bb660

      SHA256

      23d33200140a424b5812add46b927abb4017416260e8635b00d591755490244a

      SHA512

      6bae22bb5a14edfc8fe538d9cbed040b28c0a240437ad738eff823a53b22888b26ff57f3ab25bea14f38d88a2e38a32857a84578c9e9ee8ebdd94416622286e6

    • \Windows\SysWOW64\jnsqzrxica.exe

      Filesize

      52KB

      MD5

      3be53aa0f1eb0ddf64cf5e5c463155eb

      SHA1

      c3177da576adba3cd67855a4b2457bb0c566c9f5

      SHA256

      76b5e0e7fd5094148613ec953d55bf3a13c50ff7d04334f5705585285926dddb

      SHA512

      1271d8eede5fc94bb6a101cb38a030c52af3fb4166d86c097cbfe21cbac67128c5ff2ddbad9657ed0b8f03f3acfeca905e8ba07e015e749f5b5b331e867c2bd6

    • \Windows\SysWOW64\kfdgfnimxqduo.exe

      Filesize

      96KB

      MD5

      53579c6278a5520ccd08988275177b33

      SHA1

      309831f141239f411ccebd9b8a45ea1ca9281c72

      SHA256

      271a5618b20428bd256b51de1a7102f773928cbb3f2a986e5010528de5ad9989

      SHA512

      316f43b42cef1f04aa983dbe36cc29f60d7ff322bbf5e422d81d1a84e370706c1b4757603b00209b2e34128cb82ed449041e3710982094c9afed9fa0c05bb026

    • memory/2608-47-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2608-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2608-45-0x000000002F5C1000-0x000000002F5C2000-memory.dmp

      Filesize

      4KB

    • memory/2608-76-0x00000000719ED000-0x00000000719F8000-memory.dmp

      Filesize

      44KB

    • memory/2608-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2932-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB