Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 23:53 UTC

General

  • Target

    1af82dcb653fdb7b76bda1abfdedbbfe.exe

  • Size

    512KB

  • MD5

    1af82dcb653fdb7b76bda1abfdedbbfe

  • SHA1

    0a4dc744486aeb247e582bdbae41091cc624bc2a

  • SHA256

    289fb07890b4fbca5d0bd8a9e5e80a8f2e4d29ebc7c937b8b16e50fdeafac831

  • SHA512

    1d3b9a17b2b2419cee8edd4748ad7d8532accc549a69ca4bc5d2922f902c61aae8df9b24ff17dc73d35f41d5fa0eeb092cf3432ce72e57ad100ae88be5f1106e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1af82dcb653fdb7b76bda1abfdedbbfe.exe
    "C:\Users\Admin\AppData\Local\Temp\1af82dcb653fdb7b76bda1abfdedbbfe.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:1128
      • C:\Windows\SysWOW64\fjowzsfyqdamy.exe
        fjowzsfyqdamy.exe
        2⤵
        • Executes dropped EXE
        PID:4736
      • C:\Windows\SysWOW64\miptywmc.exe
        miptywmc.exe
        2⤵
        • Executes dropped EXE
        PID:4060
      • C:\Windows\SysWOW64\rkzhzvhfxvdiyqi.exe
        rkzhzvhfxvdiyqi.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1412
      • C:\Windows\SysWOW64\mzdorwlnrv.exe
        mzdorwlnrv.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:712
    • C:\Windows\SysWOW64\miptywmc.exe
      C:\Windows\system32\miptywmc.exe
      1⤵
        PID:5088

      Network

      • flag-us
        DNS
        19.177.190.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        19.177.190.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        46.28.109.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        46.28.109.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        46.28.109.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        46.28.109.52.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        241.154.82.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.154.82.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        9.173.189.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        9.173.189.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        41.110.16.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        41.110.16.96.in-addr.arpa
        IN PTR
        Response
        41.110.16.96.in-addr.arpa
        IN PTR
        a96-16-110-41deploystaticakamaitechnologiescom
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        9.228.82.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        9.228.82.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        103.169.127.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        103.169.127.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
      • flag-us
        DNS
        217.135.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        217.135.221.88.in-addr.arpa
        IN PTR
        Response
        217.135.221.88.in-addr.arpa
        IN PTR
        a88-221-135-217deploystaticakamaitechnologiescom
      • flag-us
        DNS
        173.178.17.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        173.178.17.96.in-addr.arpa
        IN PTR
        Response
        173.178.17.96.in-addr.arpa
        IN PTR
        a96-17-178-173deploystaticakamaitechnologiescom
      • flag-us
        DNS
        14.227.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        14.227.111.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        194.178.17.96.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        194.178.17.96.in-addr.arpa
        IN PTR
        Response
        194.178.17.96.in-addr.arpa
        IN PTR
        a96-17-178-194deploystaticakamaitechnologiescom
      • flag-us
        DNS
        90.16.208.104.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        90.16.208.104.in-addr.arpa
        IN PTR
        Response
      No results found
      • 8.8.8.8:53
        19.177.190.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        19.177.190.20.in-addr.arpa

      • 8.8.8.8:53
        46.28.109.52.in-addr.arpa
        dns
        142 B
        145 B
        2
        1

        DNS Request

        46.28.109.52.in-addr.arpa

        DNS Request

        46.28.109.52.in-addr.arpa

      • 8.8.8.8:53
        241.154.82.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        241.154.82.20.in-addr.arpa

      • 8.8.8.8:53
        9.173.189.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        9.173.189.20.in-addr.arpa

      • 8.8.8.8:53
        41.110.16.96.in-addr.arpa
        dns
        71 B
        135 B
        1
        1

        DNS Request

        41.110.16.96.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        219 B
        144 B
        3
        1

        DNS Request

        95.221.229.192.in-addr.arpa

        DNS Request

        95.221.229.192.in-addr.arpa

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        9.228.82.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        9.228.82.20.in-addr.arpa

      • 8.8.8.8:53
        103.169.127.40.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        103.169.127.40.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        142 B
        145 B
        2
        1

        DNS Request

        206.23.85.13.in-addr.arpa

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        217.135.221.88.in-addr.arpa
        dns
        73 B
        139 B
        1
        1

        DNS Request

        217.135.221.88.in-addr.arpa

      • 8.8.8.8:53
        173.178.17.96.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        173.178.17.96.in-addr.arpa

      • 8.8.8.8:53
        14.227.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        14.227.111.52.in-addr.arpa

      • 8.8.8.8:53
        194.178.17.96.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        194.178.17.96.in-addr.arpa

      • 8.8.8.8:53
        90.16.208.104.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        90.16.208.104.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\fjowzsfyqdamy.exe

        Filesize

        81KB

        MD5

        e3aaed29ff934c291341b74b6a8ee6ad

        SHA1

        d2bc00371c572fc958e65e2591d7411bd4e8ec6c

        SHA256

        2b33774a7c1a27ded26eaee92f1df3ffab95538e9396274606da1d3b9ff121ac

        SHA512

        8a01edf692761d97be4f94b6cf7bc2a50177af67e57410020c11de5045048e929d040c96a2c359984cfe1ec3af2b8711e48ed74a259e9d2125b804ea3615787d

      • C:\Windows\SysWOW64\fjowzsfyqdamy.exe

        Filesize

        92KB

        MD5

        6662b185f19fbf697c56a25c92de7961

        SHA1

        0df0c0df0de3724258df2549c583e3c934aca726

        SHA256

        c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

        SHA512

        c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

      • C:\Windows\SysWOW64\miptywmc.exe

        Filesize

        96KB

        MD5

        cc727bf87e75e50d52a07aae13046485

        SHA1

        1e3f482c3e5ce033458667b8600f90037a39f88c

        SHA256

        a030d652d6e7aa73d0ee0f3cdc1c4c4de60b34c67e8ad81e9dccaf28e833871b

        SHA512

        a724410143e813afcfba5b3033840a919bc1205f8a9cfbcfc8191d241051f10fa3d11bbaa5beabadb9b4456c717ec541013d42e125216620f2988a0f6acee44e

      • C:\Windows\SysWOW64\miptywmc.exe

        Filesize

        71KB

        MD5

        1f562aae2a0ea88f256e851e704cebae

        SHA1

        16d9bb0c4f3b2c8f57dcb24816a0b53d56fb04ca

        SHA256

        16c160153f158a890e3c68f66acc6c21bb4b1837d6c591277c60580b7572e5b8

        SHA512

        fb135c915eee85720fbcf4c06cb8c540ace69d9321e8ad087966abb05d143f65e2dd55415364ea5eaf1da5e9cd395a7c8efa9d976fcac8e20e9476270e0b2b53

      • C:\Windows\SysWOW64\miptywmc.exe

        Filesize

        171KB

        MD5

        0da0d75b4b5f2d2fa716391fc84f83d2

        SHA1

        b92930407cfcdb6fb16816b4d818b480abb82ae8

        SHA256

        010833237e2adc66cbbe7acd69899e6f25211e7623b3c21ff2813b09dd182e06

        SHA512

        729f441e76b1339563e2a0248298c386b9246c38d637114c34bc51f3e3ff88daf5a81a78264fb5f78430425d2952a2a8b48296f3b00509c719c89e93f99d2349

      • C:\Windows\SysWOW64\mzdorwlnrv.exe

        Filesize

        103KB

        MD5

        15dfb4a50bad09a6bd3f330da99dd9ca

        SHA1

        90e127747dfe6d612dc4456ec44cccb4fa643ba9

        SHA256

        8dbce28d825c1828477ad6bf5873598151589de7d91012a56310909441ee4511

        SHA512

        13a056505504dfdb8aaaf0b3b1f95efce7cd8ec012f2b7333aa239c0d2b9f086aa5001dd12a3499537679e9d3223214631af0eefd0f02d12ee0e6f88505e6f9b

      • C:\Windows\SysWOW64\mzdorwlnrv.exe

        Filesize

        304KB

        MD5

        22dad3301f9f3fb0cc958ca1ec8cbbb3

        SHA1

        34bdedf0666e633f06f52f22fda0bc0cae7df99e

        SHA256

        5d051988b5c7c289843bafe761733c6f885301dcf111cf8b3b7395759cc0b6d0

        SHA512

        18ed3c36d115b771da80600fce29e107699a1c29c819d2179153cc0ab8257ee1654a3d3963e6f7f5ad23dd2de020ea1ab815ffe214995aa3d32b2d0e067e828e

      • C:\Windows\SysWOW64\rkzhzvhfxvdiyqi.exe

        Filesize

        322KB

        MD5

        bc544e9fa2aaba3ed6798e43b94add9e

        SHA1

        5a141626aba5264a4a0e4400210ffb245eb0f498

        SHA256

        c8f0f9bf5386d049f155c5365a455cefaf32f8df962c3f4c4889118678404644

        SHA512

        a778b1ae96d23d74fae2c82305a6e9fc841365e3c394ab59fb4dd4bd6ebc62dc8a1b76fcb6591773dc9a3e20cb1ba93dfcaf95068f43d62624e6eb36fea5d22e

      • C:\Windows\SysWOW64\rkzhzvhfxvdiyqi.exe

        Filesize

        241KB

        MD5

        095e6dfc24d54b5fb11df81e767a287f

        SHA1

        362009368e440674ff2ef61ddd79fef9ce092f90

        SHA256

        0e7b9b90a4b66d235dc6adfaa9a4745de738421d679c87af52ce4fa7c368df98

        SHA512

        bb6808006b81e86f68cec133120b6cf9d879e6bce30889636efb50a3bbf003a76146e8d284a9f6c8b8b0c7b8d70d773b2c330acde191de1e990b2d708aaf5612

      • C:\Windows\SysWOW64\rkzhzvhfxvdiyqi.exe

        Filesize

        267KB

        MD5

        ca24c7ad7a8ed2c8b4e7b9ad4143f0a9

        SHA1

        828e7acd54ea8754a2b6a9cee57a9c86be56acb7

        SHA256

        3f5e4efb307b554efc4e4de9b437b7d616fe97a8d6d8a8bcedeeafd189b56140

        SHA512

        fb364e0f1769d871b4646d97a2ef340fa02dc4fd9953b84b52f8bd865dce164b923146e3f4f7decea32cc2aaa4e8b90e01cd46d565ed2b907244d51a60131232

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        9KB

        MD5

        b35b1f4c5eb499f62524766be9a3f580

        SHA1

        f3a95cd805d4d178906b33d01887e100ac31639f

        SHA256

        e311cc9039f96406b84412246561aed0aa49832d741b137e342843fe26d45b3d

        SHA512

        885bb3047c46cd65081975934aad7936ca99e4c146f0eeae98e36adb5b52c92c7a2a1cc8e645f50b8445dd5aa9d88e1db0ef860bb24c5f7122a87dd2b586a5a7

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        5KB

        MD5

        8b75f548f625f5bcdefd8a002b413126

        SHA1

        cb30cad9b1eaab56528f063957982cd90c824589

        SHA256

        c8aedcde02051e1e93dda61a7e73daafdaf8ea9ff0458bc7ba8674a8bea7058b

        SHA512

        20212c80e77f458f4593d3b550a5b9a63dd0a34c6cb10dd0d450c0499da530baaee1839f5ae328313fc416ccf0b51d11205a90e576f43794f18af895b08be1b8

      • memory/1128-51-0x00007FFCD54D0000-0x00007FFCD54E0000-memory.dmp

        Filesize

        64KB

      • memory/1128-38-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-59-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-60-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-58-0x00007FFCD54D0000-0x00007FFCD54E0000-memory.dmp

        Filesize

        64KB

      • memory/1128-55-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-53-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-52-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-50-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-49-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-47-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-46-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-44-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-43-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-42-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-41-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-40-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-57-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-37-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-56-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-54-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-134-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-48-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-45-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-39-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-114-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-138-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-139-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-140-0x00007FFD174B0000-0x00007FFD176A5000-memory.dmp

        Filesize

        2.0MB

      • memory/1128-137-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-136-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1128-135-0x00007FFCD7530000-0x00007FFCD7540000-memory.dmp

        Filesize

        64KB

      • memory/1816-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.