Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 17:23

General

  • Target

    08478b0a20b9941292f63fd9082e2245.exe

  • Size

    512KB

  • MD5

    08478b0a20b9941292f63fd9082e2245

  • SHA1

    cea903f85151878dfd2c0a7755e9574ec2a38aac

  • SHA256

    74be36919da08b2e4607568bf9e0069a668dde44cde84f609cfdeb68d31f7d54

  • SHA512

    b20549c5e0ac415688cceb2522cc1a5d70d3cc7197a5ea2d3953ead25d589328b558eb91572596cb92bd1c0b433ea4622fb48a28eaf33309d2e0bd72bd37d8e5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6g:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08478b0a20b9941292f63fd9082e2245.exe
    "C:\Users\Admin\AppData\Local\Temp\08478b0a20b9941292f63fd9082e2245.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Windows\SysWOW64\bzudwagzda.exe
      bzudwagzda.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\SysWOW64\vgcafanz.exe
        C:\Windows\system32\vgcafanz.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:64
    • C:\Windows\SysWOW64\mryyphclbervq.exe
      mryyphclbervq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3784
    • C:\Windows\SysWOW64\vgcafanz.exe
      vgcafanz.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1204
    • C:\Windows\SysWOW64\psaetnchaztvdlj.exe
      psaetnchaztvdlj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:912
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          29KB

          MD5

          d86ad1df7d1880398c37dcd92d9f919b

          SHA1

          c6526304059d412f132524b0b5571ec8f9b60fe6

          SHA256

          bf7ed9ebd3cba2892efeae50ef0814b5a222ce0f7b747641db3ee5e07a207fda

          SHA512

          5ec49c14d07711a63b75e1a9141f0ca6e2b7dbd6227e55ae40ea9f0eadcafd72026a964c474ada7af8ccbf62a51498a80a383e67c2a5ff312fc8d9c66e0b6cbd

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          59KB

          MD5

          065ffeaf514dfd949766afc2f4d8e99d

          SHA1

          5204a5a1b975bc4674525a06f38b70a723214275

          SHA256

          dfbb7d99dc89ac1663fc6b35de7358d2d0c0691bc96a92e54d0d92f708830654

          SHA512

          1c8653ca88e21eba405ff7e5d8ba0ac7d339430f85c5e268f8e5bc0f0fede06eff5fcea1b217920aefe6d11d190ad77bb1a3b1763b122991888cbbe5cbb98fc9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          1c23c926c6636690c3085504c5bc5674

          SHA1

          9f43493de326c33835afda1b674fdb7644ffe2c8

          SHA256

          1794ac581b5472e0e5968dedd1d58545d16f3893fdfb71a5c9aab602985087cf

          SHA512

          36c273e88658bb72358027a7f5eb64ef0824cc5dd3ad766a8fcd44c183204af23f60eeb276876bb4360455bbffc7505b124befa0ea5201cf461f49b1d3d79dde

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          13e41d1cf1701a829c3b38b19bdeeb1b

          SHA1

          f14c7125ea82882d983bc92fd8ba57bfe77d2e5c

          SHA256

          08ac1956ec319b93d7f228e299331da19c52a23a7d81b3abd1982820e16b7188

          SHA512

          ca6f030716921b36c4c77f68ea317385b0895c3463f5e8cb66c057676db39e22e2e78db5e9486eeaeb170e4d7ee975228fbab69521304aca9a4585ab3ad791c0

        • C:\Windows\SysWOW64\bzudwagzda.exe

          Filesize

          389KB

          MD5

          6e01af1d87bc3725d390a802868a3513

          SHA1

          8f16f8a19fbedad4b16666136fab483a223dfe9d

          SHA256

          43c0891c7eb20d769c46341c73e339414d9b9559ab0750ace798c3f5acc7f811

          SHA512

          838a470ad63fa6a15a5291f274cdba7f7c3dba406896c1bcde0e6b95fa0ce8db06d4ce95d3c88eb19dfe6794095a70c6df3782284b650bc80cbda1d45af60a43

        • C:\Windows\SysWOW64\bzudwagzda.exe

          Filesize

          356KB

          MD5

          968fef48925e00a7fde5f2a1c833df5b

          SHA1

          0021f100683bf6e63bf583b87c6d0e9de3236420

          SHA256

          1efa246108921a314102996392eb4b85b9e25c228a757bd9e43aa1121e10e001

          SHA512

          bd94b26839e8f532107d4893cf0876bab5223959a9afc54b235d2076f3021dae7d405a80e0fa2fdc7a99fc6b9d8e424e22e05408a41e3e90c84ed8b8e65b8528

        • C:\Windows\SysWOW64\mryyphclbervq.exe

          Filesize

          219KB

          MD5

          76219ce1a69eec3f55aa57197a70364a

          SHA1

          d92c1492f6e91ff9f1eefb6120cd50b70a428755

          SHA256

          6c53e2f3eb618d1cc9e66acd320fd3ed606e0bc0ff215c6f09001a4f9787dcdd

          SHA512

          3e7750750d95b71c736343517c6d1153b0d208c33969bb3630063a976c2cae4f8d1662ec1016f563ba58770d9d59b4cc636c7bb7794fb5e767eeffddc42a2dbf

        • C:\Windows\SysWOW64\mryyphclbervq.exe

          Filesize

          309KB

          MD5

          4d115ffe88c738a06f3da6e96028f1ed

          SHA1

          4dd9807783f26390dac45fd6debf2d2092c8b1c9

          SHA256

          ce0e12a937f2e6428fa0827c77d57c86e015e5ddfd29a9a50bbaa8aea7297331

          SHA512

          1435b125d3f320ad44ce1368532534d3a7c007df45d9fc4ec5d35be9322a0b0dd503aff17da4488408862b75a0e3153f9b535108db282208c0788803c85a56fd

        • C:\Windows\SysWOW64\psaetnchaztvdlj.exe

          Filesize

          436KB

          MD5

          15792e5ef427c1d78eaa9ece572e2271

          SHA1

          1cf32a79e07c78ff5edf20d91ec8b0b5da1e5a2d

          SHA256

          e39d7b956e34a7656ae28835bffab706f2453868f6b59505826e267cc17fbb52

          SHA512

          86747cb290f62b261e7f9554d2fcfc5ec8ea79bfa40c04f9b7fe22053636ae7c3464c75c42bdee35880f882c25c31a96fa0b1b9485325c0cc2316d6eed2c233d

        • C:\Windows\SysWOW64\psaetnchaztvdlj.exe

          Filesize

          302KB

          MD5

          caa9da7ada873bdc22131744a69cf51c

          SHA1

          827a9adf2fbd65f8c6f1b26aa2afad788f5363de

          SHA256

          293436f78f94b10f913905bbde3262f949866abb451cc78f8d03c72c78ed5162

          SHA512

          6fd3e6f7a1b9431f1a72cc54b89bcd638543af7fca83e2e9c09e45d50f0db98b6ec519c123ba128a15721ea89d2ff95c714b8f9774635d06dd476255f74b9feb

        • C:\Windows\SysWOW64\psaetnchaztvdlj.exe

          Filesize

          284KB

          MD5

          a6ee92140bc3df9ede5aa7d2b8544481

          SHA1

          c4545687a5716748b9b4962cc0e026bd3f51a7eb

          SHA256

          2633a196337cba6bc40fd08cff65a2102410a8873db6c3d7290d119ee59fc54f

          SHA512

          6de3ab15121d9c9ee79e04007703bb1c60fb5bfb9acb13b171c18f500c3df72fe6876b51afaf08ec16d26eeed26c837a683370c2212b66c0830f8a99fd1ba72e

        • C:\Windows\SysWOW64\vgcafanz.exe

          Filesize

          402KB

          MD5

          a5bcb053834a68a8a2e777a42013aa32

          SHA1

          aa51e3b2e5ca3513661b71e28ce1163c91849a7a

          SHA256

          946ed00d0aa536acced27c9ad6cd1e239bbaae781b0cef0f42e50e6b0cf92246

          SHA512

          2e0bd344a6b773ef42bd6250938bdaff88598ca2cef7048bc1fe31a8a1ef9e524466a97f17477a5b84da0d45f42fa4df4af7210e88e18563a7431084ed374715

        • C:\Windows\SysWOW64\vgcafanz.exe

          Filesize

          189KB

          MD5

          b9ba98b5135dbe9937269f6518c07f2f

          SHA1

          c5975f7844fbea277f98e2403b5b1527d4f4329b

          SHA256

          90bc9bf60f82a762d4234518e2e5b1a3301b553a535f5aa37f565824815e260b

          SHA512

          2a1598b7cbbd11cf3069d921e4e4f9255937bc66e314516726e1dcdf396989ffb8c1c5aa1e54aff8bb359f2e23239c868da518a43373a7b22f799d36f2aa57fd

        • C:\Windows\SysWOW64\vgcafanz.exe

          Filesize

          38KB

          MD5

          0977bdb999c56e39a63aa13c30055f2a

          SHA1

          edcf99cc0e91366e94d0b58d7cd3eb56d8790f33

          SHA256

          ecd7672afb1a6bbdba819761ea41ed76e6f122cbec00954c41946d46bd1ab8fc

          SHA512

          3498013d793d88524cef9109ad9c35dc2f91a0d7af2c111e47ad5925469caf9a771f69bd4129728ab9d82c60ecadd205fb095801a55f5e8ccf7543dd34249b28

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          180KB

          MD5

          0cfe0975d992e25a4410dea237744634

          SHA1

          7d1414d0e476373547f34b9c1e0ca7651604e445

          SHA256

          62fe0c58283937842569529e615a65ee522f7a4691f1617002bf3198292ecf2b

          SHA512

          3ca7d6eda26b2a5c7718b29011c8dec4212edb3722969e861a4c5b77db88a9d28f9f2276e59cce2adfdd22a2d6f8b2dc62acf888de58a680aa342a68f782a85c

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          47KB

          MD5

          6314c6035d56a9659fc28dd311364b1a

          SHA1

          ba897f59e29583229a028f6cd0c41f45b589ac19

          SHA256

          975863887dd04b7bf9182b5d9194cc71e5a985e1f2767fc5ea3c9d94f962fbbb

          SHA512

          645ab65273a0c075a6823f5c1775ff84ed07347f67ed7c3db797f9f59104ae719fd088de8ab537489287be048930f3ae195609e06f28f8c2a49a88dd19c33b19

        • memory/3596-43-0x00007FFC16720000-0x00007FFC16730000-memory.dmp

          Filesize

          64KB

        • memory/3596-35-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-49-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-51-0x00007FFC16720000-0x00007FFC16730000-memory.dmp

          Filesize

          64KB

        • memory/3596-53-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-55-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-56-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-57-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-58-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-59-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-61-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-45-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-54-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-52-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-50-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-37-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-36-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-38-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-48-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-42-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-44-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-133-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-40-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-41-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-39-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-106-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-126-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-127-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-129-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-128-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-131-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3596-130-0x00007FFC18DB0000-0x00007FFC18DC0000-memory.dmp

          Filesize

          64KB

        • memory/3596-132-0x00007FFC58D30000-0x00007FFC58F25000-memory.dmp

          Filesize

          2.0MB

        • memory/3900-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB