Analysis

  • max time kernel
    146s
  • max time network
    171s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 21:43

General

  • Target

    3e228a6ae12748e92fad02d2f32b41da.exe

  • Size

    108KB

  • MD5

    3e228a6ae12748e92fad02d2f32b41da

  • SHA1

    c908a9b3f11a09931883d7725aaf6ee0764696c2

  • SHA256

    79eba95155306bb40322960e71813d3e073f56dd427857ef2bd0985b6b15f733

  • SHA512

    88088c7f8279d0a05e898e5aff9f369a563c08c6ed36c56af1581cac4da8a79be405e6829015f789795bf124ec487ac3904646aea6aafb6cf106e0db296df69b

  • SSDEEP

    1536:cXoahnLiXUnpncVZRoOvnpKZb+1dG4ZsfLKBFbfcOOT8bTnNhsnXRQ:xUQwnc/RoOxKN+1dG6sLCF4OmmTNhi

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e228a6ae12748e92fad02d2f32b41da.exe
    "C:\Users\Admin\AppData\Local\Temp\3e228a6ae12748e92fad02d2f32b41da.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\3e228a6ae12748e92fad02d2f32b41da.exe.exe
      C:\Users\Admin\AppData\Local\Temp\3e228a6ae12748e92fad02d2f32b41da.exe.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\KCYFRIE8.EXE
        "C:\KCYFRIE8.EXE" WLOTCFSDJAXNJHY
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        PID:2100
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /s "c:\windows\wlotcfsdjaxnjhy.dll"
        3⤵
        • Installs/modifies Browser Helper Object
        • Modifies registry class
        PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\78PCYQ230UWM.BAT
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\reg.exe
          reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2604
        • C:\Windows\SysWOW64\reg.exe
          reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
          4⤵
          • Modifies Internet Explorer settings
          PID:2628
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s scrrun.dll
          4⤵
          • Modifies registry class
          PID:2648
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s msvidctl.dll
          4⤵
            PID:2660
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /s jscript.dll
            4⤵
            • Modifies registry class
            PID:1100
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
            4⤵
            • Modifies Internet Explorer settings
            PID:1384
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
            4⤵
            • Modifies Internet Explorer settings
            PID:2148
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
            4⤵
            • Modifies Internet Explorer settings
            PID:1192
          • C:\Windows\SysWOW64\reg.exe
            reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
            4⤵
            • Modifies Internet Explorer settings
            PID:2412
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s vbscript.dll
            4⤵
              PID:2184
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /u /s itss.dll
              4⤵
                PID:2084
              • C:\Windows\SysWOW64\reg.exe
                reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
                4⤵
                • Modifies Internet Explorer settings
                PID:1968
              • C:\Windows\SysWOW64\reg.exe
                reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
                4⤵
                • Modifies Internet Explorer settings
                PID:2568

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\78PCYQ230UWM.BAT

                Filesize

                1KB

                MD5

                52c972f9deb8192ccde1c648220271fa

                SHA1

                e4839843fc6c8d950e17c64ae31cce74e36733a3

                SHA256

                f44f8df295aa00d2c7668940de1c3b4eb29f8f40b4bb72a4948d2bcb5c8e5d80

                SHA512

                e3098da4852421126281bd93dabf13cb2e25897b8bbb71fbcc0aae41bf6cace92cbd71c78c74a77c39ab4de4cc2227e2ba53d71533333ce98cba1106d67f2075

              • C:\KCYFRIE8.EXE

                Filesize

                18KB

                MD5

                284ce4bcdb46ee5f52db9f03b92322ce

                SHA1

                326d2a3b84f7be7f67a3002afe2d6dfd615be0cb

                SHA256

                339f3b265a4d49461e2151bffd1c23bb520eb0f62d4be6e34b2a10bfead141c0

                SHA512

                976d08b4249cf1e6cd9931a02efc3c3afbb76d14c4d3e4b4e35f1768a3372d13c07fe32922a0af1f7c4055317821ab6acdfe6646ede827958f8d401035811f05

              • \??\c:\windows\wlotcfsdjaxnjhy.dll

                Filesize

                28KB

                MD5

                63bb6a005523fdcbd61837ce779c7fe4

                SHA1

                1d5bb3e4ab9b51f5a57a55aa8158df674c4d5f5b

                SHA256

                0de62e885ab33cf593834da32fb53bf75b241b450189f652825b847b63e3dba8

                SHA512

                08975d3254f1e11bbc0f8c9425b494afe254ad07177ef22b203638f9942c4321a6cd7fdd12e345063b068c87e9fce9b1994368317e4b57608bf8ba1b2fdcea5e

              • \??\c:\windows\wlotcfsdjaxnjhy.txt

                Filesize

                64KB

                MD5

                38ae321054766975a9253d515db3cec4

                SHA1

                29e2687378650a854f6876fe152a53191cf0a70e

                SHA256

                880ca4ac7921c6161222f6e137626567c8951835d02be627dc72917a04d4dde0

                SHA512

                8f7243a98cd9b71564a982465740ffde09de680c218577f0c37779b2ded3e3a4595cfd21eb811703201b34970bc1a5e2244c02ba623d483eaf8083b9f52515b6

              • \Users\Admin\AppData\Local\Temp\3e228a6ae12748e92fad02d2f32b41da.exe.exe

                Filesize

                64KB

                MD5

                eab9f568147acf44e89576978244ec32

                SHA1

                985586346cb0a61e3f94ded925316f091c643066

                SHA256

                7f95048f6d8cb41289f53f49dc609d5bc78d10d4a5ef815a72caa89b69f4cc46

                SHA512

                b996fe81d661eea29b6c3eb64f8b4096ebc2d35d7d2f8265af2f0ce1d0305fafc45842dae5084e977a23bcdba63320aeea87321bcc9a59e565835ec9efaaf2c5