Analysis
-
max time kernel
0s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 01:26
Static task
static1
Behavioral task
behavioral1
Sample
205ca15abd27d15e6e6ff3401fcdfa8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
205ca15abd27d15e6e6ff3401fcdfa8c.exe
Resource
win10v2004-20231222-en
General
-
Target
205ca15abd27d15e6e6ff3401fcdfa8c.exe
-
Size
512KB
-
MD5
205ca15abd27d15e6e6ff3401fcdfa8c
-
SHA1
66a692e695ec9153a133ed411448442883493012
-
SHA256
26ac96094c6b26081bd5c796042648884b19ba01ab7b6cadb0700d6daf4c86c0
-
SHA512
c6d9daf06110bce83b20e97a9791ddba34694c79dd89bf56b2292ba8962af12a5edb45f7d32b036914195cf13424f9c90a7f2b907736f523985dc5574a2adeef
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3600 mpyhswlsmt.exe 5004 ouvodenymsswsuq.exe 1464 knieejvc.exe 1236 hrmjdjcfgrlqq.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3988-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000700000002322f-5.dat autoit_exe behavioral2/files/0x000700000002322f-23.dat autoit_exe behavioral2/files/0x0006000000023236-32.dat autoit_exe behavioral2/files/0x0006000000023236-31.dat autoit_exe behavioral2/files/0x0007000000023232-29.dat autoit_exe behavioral2/files/0x000700000002322f-24.dat autoit_exe behavioral2/files/0x0007000000023232-28.dat autoit_exe behavioral2/files/0x0007000000023232-36.dat autoit_exe behavioral2/files/0x000600000001e5df-19.dat autoit_exe behavioral2/files/0x0006000000023243-78.dat autoit_exe behavioral2/files/0x000600000001e5df-18.dat autoit_exe behavioral2/files/0x000b0000000231d8-87.dat autoit_exe behavioral2/files/0x000b0000000231d8-92.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mpyhswlsmt.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File created C:\Windows\SysWOW64\ouvodenymsswsuq.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File opened for modification C:\Windows\SysWOW64\ouvodenymsswsuq.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File created C:\Windows\SysWOW64\knieejvc.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File opened for modification C:\Windows\SysWOW64\knieejvc.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File created C:\Windows\SysWOW64\hrmjdjcfgrlqq.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File opened for modification C:\Windows\SysWOW64\hrmjdjcfgrlqq.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe File created C:\Windows\SysWOW64\mpyhswlsmt.exe 205ca15abd27d15e6e6ff3401fcdfa8c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 205ca15abd27d15e6e6ff3401fcdfa8c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2D789D2083576D3F77D770532DDD7D8365DD" 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABAF9B1FE6BF19683743B4486EE3E98B0F9038C4212023EE2CD459E09D2" 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC0B15D47E7399853CBBAA73393D7C5" 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF9FCFC482D851B913CD72D7D96BD92E13558456734623FD6EC" 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78168B0FE1D21DBD10BD0A48B0E916B" 205ca15abd27d15e6e6ff3401fcdfa8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C67A1597DBC4B8C17FE3ED9634BD" 205ca15abd27d15e6e6ff3401fcdfa8c.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 5004 ouvodenymsswsuq.exe 3600 mpyhswlsmt.exe 1236 hrmjdjcfgrlqq.exe 1464 knieejvc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 5004 ouvodenymsswsuq.exe 3600 mpyhswlsmt.exe 1236 hrmjdjcfgrlqq.exe 1464 knieejvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3600 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 27 PID 3988 wrote to memory of 3600 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 27 PID 3988 wrote to memory of 3600 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 27 PID 3988 wrote to memory of 5004 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 25 PID 3988 wrote to memory of 5004 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 25 PID 3988 wrote to memory of 5004 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 25 PID 3988 wrote to memory of 1464 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 24 PID 3988 wrote to memory of 1464 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 24 PID 3988 wrote to memory of 1464 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 24 PID 3988 wrote to memory of 1236 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 23 PID 3988 wrote to memory of 1236 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 23 PID 3988 wrote to memory of 1236 3988 205ca15abd27d15e6e6ff3401fcdfa8c.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\205ca15abd27d15e6e6ff3401fcdfa8c.exe"C:\Users\Admin\AppData\Local\Temp\205ca15abd27d15e6e6ff3401fcdfa8c.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4560
-
-
C:\Windows\SysWOW64\hrmjdjcfgrlqq.exehrmjdjcfgrlqq.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1236
-
-
C:\Windows\SysWOW64\knieejvc.exeknieejvc.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1464
-
-
C:\Windows\SysWOW64\ouvodenymsswsuq.exeouvodenymsswsuq.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5004
-
-
C:\Windows\SysWOW64\mpyhswlsmt.exempyhswlsmt.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3600
-
-
C:\Windows\SysWOW64\knieejvc.exeC:\Windows\system32\knieejvc.exe1⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD594f99d74a9105f9e6e7ae5d7ef17cec3
SHA19f83f812b3b11624a74c0a47f9ad1f2e6f7ddb4a
SHA25698af8f23fc3372e6559426a8cadbce7dabd3d4e2bc6481eff771793e9d10f2ca
SHA51274a6bd963131b4895555c85c10526a185381d0b9f59ba59d7beb8b00ef0c333b47e8d1c5372b171f37b51fd49923efb4155a9c45c31893deca8a949ca23e1933
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57cc9d0cd19af3432b1b6ae0e2c394ad4
SHA1ce9378387cf23c85d5377a7f4f07dc630704b007
SHA2568f3b9fdf36475fee1f7b5c25e0efd5992c71f8d374c2ff967ede0ca73b2d9550
SHA512a3470cc1ccf337f3ec69d69abfad2ceb3c75194d65f4dcf37a87ee4a733b3393c685860934b2fc0586f52756e37d4e0ae580061612f62d9146eff86356ece5f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5cb1dfe39d74be6b5e738836bb18fe364
SHA119838c56b6be3173052270265c91092aa31117b8
SHA256885a422df2ff0b1303cb943b0119b59395a9c645d345a6960ad1e42cedd302c3
SHA512cd36f38387e5867fd8d7a2f71187a6ec564cc1ccb2d610acdc4c91fad8475de2e9fee62e9c89eec81eacc95617df951da02944252e13147284578d140027b568
-
Filesize
38KB
MD55794d9df6334914a7eb3a378dfe67caa
SHA188bcac2d634fb35f887d4b860723a574c045ce5b
SHA256d8adb4f25a505d857efb100dec0566ab34de17a89f003cca8a61902e916963eb
SHA512a486443373157d0a7b343dcb15fcc8429e40937ffef5e8e3fdb1bdbbc891d2d5d11de6c1362de3489d48110bca8fc975a7e6a9267017fb2f418e4029702ab833
-
Filesize
63KB
MD51cd9bd1dcb50e63dc023920ec4e32f8a
SHA146d44a5aa0f4ebe71741393d892d4e6e75f6290c
SHA256ef6f2655a78fdfa73a9da4bbc44ab561f4870a5ffe9d2802e869a2f9a8bff285
SHA512a5b934dbbfedfd888d50a9e2105602be6b988c6899e2f201ec1e526ccb20af341231e1abcd5371dda1314a7703857baa9b7403c1fe389dcf888ef9776a54787e
-
Filesize
79KB
MD5b50a9b06dee8b7aef382e8747f98c702
SHA16b5e79b9e31cdfc6e2449960b18be534fbaf274b
SHA2564e0735f12820c93e9c5b2c64bcb5c28dd4631880e375051c5df19115422866a4
SHA512a51a4d00b418ace82bcd1b17d2280620b8701dac3cd8264ad39b19a36277a0b007160d77f890670c52d15c67a717f96e364adefdd3a7947e301f48a96b553a5d
-
Filesize
5KB
MD55ce2398b9c0d659f076c10da50f02e65
SHA121981ab9798a833f2571edcb93a163bafa3a0c95
SHA256a8822c81f26c6dc8ed2255a493414d3dc9b87c8e5619b6768693b2c648dda0a0
SHA512a608b0013cfde315f76dbee6802c9266b09b65f54bac3043e5ee5448acd966ccbfa870cef552bc1afb1905ec7f8496e01ccc1076e044c95c45e2c4a7f6903eae
-
Filesize
108KB
MD5be863b80c8df79276e41cab73a4b3a6c
SHA1c98264315238bb388fba249c0358d7f766c518ab
SHA2564675bd4b135c8bb7d74e0d5898fcd2b6476eb45ae751464c36d26f2462beba8c
SHA5126ebb71f700b5bbfabf70ab79e1f621385d8261424b0f93686d65144a18f2fec8302015a66cc7e0543e8d473c272f0adaffc3b775211bb79fa20db358b191d101
-
Filesize
149KB
MD55a1366d811460096a3c3f9960094826e
SHA173404ca8a2aad03e5abf7adeb6cbb311b2cf6a0a
SHA2564e9231d36d7c9aadd6a627de644ddf942629f80c1d33739a9cdded3380bfca92
SHA51295d7b50fe24e86d40df88c6c7c2c57c1e2a9575c3922316dc842e3cf41712b8f511a6602e83aa43b45e819dd85a0b853340e47055ea5d8e00794344328cb58e1
-
Filesize
104KB
MD5edd124deff577bcbcd97548206da67ef
SHA159ef828946e131b3f76d56369838b3d2d4d10b1b
SHA2560228dbcc32eb5033ad571602cc7dc4b3a0ec2afd552e7f53cdd35f8b869905a4
SHA5129a86ebdf94c687b331ed7774176a4e2dfb3d522d58fb7f1d777b87bea27067b1e4b86fdfffc1ee1759c1ad230b23f2bf83ce3ca42cf6dc7817107ad316d9388b
-
Filesize
64KB
MD5d76d22b81130bc9206c7c947d7a9ea5e
SHA15956e88a6ec7949ce5a350e21703307d855f34b1
SHA256b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870
SHA512112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1
-
Filesize
101KB
MD55d73fd659e95d06d6e788f99238f088b
SHA1bd1a2a785d6ff60a879f96d9a4f8747ff2acfdc4
SHA2565b312605ac6811719cf14932452446b0157342cc496c9d39181f561b091e6f97
SHA5124086917167a19b56f57cd5f4a552c5f7fd8251dc3cb3583e15c1d37f850e9751dbd60499efb5d12614172bfbf29649058e65a605534ad207b91b9be333fb1f54
-
Filesize
71KB
MD59ccb744d01d923d6a097c7c697964c18
SHA169f1cf1aeaba57f7068b10791d37b8fc96332dc1
SHA25609bf23b8ea29b7f9606c20ffe77bb50da23323f091c3408d6136cc4bd6a777aa
SHA5124b109c37b9b4fd1eb817b1864dde2769d9127ad409614cace6a606717258724d8f3b9321a9851a44a044eef91a248246fef157f998dc5e8587fb897de838bd5d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
30KB
MD54909c749788d14eab4697059a06336be
SHA166fe4f751dd6990ec54f737a6656c3b8b6af9b2f
SHA25638c718be80e349daee272eb1fe3dcb1bd874f59cef4f4fbde2d503a8a23fa1df
SHA5121cfe12276cc68f23cab461f304f8e3d9fea6bfd3bffc8e7ff1fa7fe33ab6fef4af3b175ecabc57157bc72c38a67fb755972feb3589a7d706bc5fc34fc15237a9
-
Filesize
1KB
MD5f39ce6fdbce87601ca9c721ea2fdbf85
SHA1930ee415950715135c8dbbdf1a12890fe09e65e4
SHA2567060c63c6e18a49ffc0baf54e95f3ad297132a14369357b28bb819edced70a0f
SHA5125386310c9a55e24b31ba317ee6696ae6c8afea2badf45b0e340cc0feb450c01951c44c5d11e73bbf3406ea3958a8991d8e4d19ed14514569f1b6a87c7bec701d