Analysis

  • max time kernel
    0s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 01:26

General

  • Target

    205ca15abd27d15e6e6ff3401fcdfa8c.exe

  • Size

    512KB

  • MD5

    205ca15abd27d15e6e6ff3401fcdfa8c

  • SHA1

    66a692e695ec9153a133ed411448442883493012

  • SHA256

    26ac96094c6b26081bd5c796042648884b19ba01ab7b6cadb0700d6daf4c86c0

  • SHA512

    c6d9daf06110bce83b20e97a9791ddba34694c79dd89bf56b2292ba8962af12a5edb45f7d32b036914195cf13424f9c90a7f2b907736f523985dc5574a2adeef

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6K:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\205ca15abd27d15e6e6ff3401fcdfa8c.exe
    "C:\Users\Admin\AppData\Local\Temp\205ca15abd27d15e6e6ff3401fcdfa8c.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3988
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4560
      • C:\Windows\SysWOW64\hrmjdjcfgrlqq.exe
        hrmjdjcfgrlqq.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1236
      • C:\Windows\SysWOW64\knieejvc.exe
        knieejvc.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1464
      • C:\Windows\SysWOW64\ouvodenymsswsuq.exe
        ouvodenymsswsuq.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5004
      • C:\Windows\SysWOW64\mpyhswlsmt.exe
        mpyhswlsmt.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3600
    • C:\Windows\SysWOW64\knieejvc.exe
      C:\Windows\system32\knieejvc.exe
      1⤵
        PID:4600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

        Filesize

        69KB

        MD5

        94f99d74a9105f9e6e7ae5d7ef17cec3

        SHA1

        9f83f812b3b11624a74c0a47f9ad1f2e6f7ddb4a

        SHA256

        98af8f23fc3372e6559426a8cadbce7dabd3d4e2bc6481eff771793e9d10f2ca

        SHA512

        74a6bd963131b4895555c85c10526a185381d0b9f59ba59d7beb8b00ef0c333b47e8d1c5372b171f37b51fd49923efb4155a9c45c31893deca8a949ca23e1933

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        239B

        MD5

        12b138a5a40ffb88d1850866bf2959cd

        SHA1

        57001ba2de61329118440de3e9f8a81074cb28a2

        SHA256

        9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

        SHA512

        9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        7cc9d0cd19af3432b1b6ae0e2c394ad4

        SHA1

        ce9378387cf23c85d5377a7f4f07dc630704b007

        SHA256

        8f3b9fdf36475fee1f7b5c25e0efd5992c71f8d374c2ff967ede0ca73b2d9550

        SHA512

        a3470cc1ccf337f3ec69d69abfad2ceb3c75194d65f4dcf37a87ee4a733b3393c685860934b2fc0586f52756e37d4e0ae580061612f62d9146eff86356ece5f8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

        Filesize

        3KB

        MD5

        cb1dfe39d74be6b5e738836bb18fe364

        SHA1

        19838c56b6be3173052270265c91092aa31117b8

        SHA256

        885a422df2ff0b1303cb943b0119b59395a9c645d345a6960ad1e42cedd302c3

        SHA512

        cd36f38387e5867fd8d7a2f71187a6ec564cc1ccb2d610acdc4c91fad8475de2e9fee62e9c89eec81eacc95617df951da02944252e13147284578d140027b568

      • C:\Windows\SysWOW64\hrmjdjcfgrlqq.exe

        Filesize

        38KB

        MD5

        5794d9df6334914a7eb3a378dfe67caa

        SHA1

        88bcac2d634fb35f887d4b860723a574c045ce5b

        SHA256

        d8adb4f25a505d857efb100dec0566ab34de17a89f003cca8a61902e916963eb

        SHA512

        a486443373157d0a7b343dcb15fcc8429e40937ffef5e8e3fdb1bdbbc891d2d5d11de6c1362de3489d48110bca8fc975a7e6a9267017fb2f418e4029702ab833

      • C:\Windows\SysWOW64\hrmjdjcfgrlqq.exe

        Filesize

        63KB

        MD5

        1cd9bd1dcb50e63dc023920ec4e32f8a

        SHA1

        46d44a5aa0f4ebe71741393d892d4e6e75f6290c

        SHA256

        ef6f2655a78fdfa73a9da4bbc44ab561f4870a5ffe9d2802e869a2f9a8bff285

        SHA512

        a5b934dbbfedfd888d50a9e2105602be6b988c6899e2f201ec1e526ccb20af341231e1abcd5371dda1314a7703857baa9b7403c1fe389dcf888ef9776a54787e

      • C:\Windows\SysWOW64\knieejvc.exe

        Filesize

        79KB

        MD5

        b50a9b06dee8b7aef382e8747f98c702

        SHA1

        6b5e79b9e31cdfc6e2449960b18be534fbaf274b

        SHA256

        4e0735f12820c93e9c5b2c64bcb5c28dd4631880e375051c5df19115422866a4

        SHA512

        a51a4d00b418ace82bcd1b17d2280620b8701dac3cd8264ad39b19a36277a0b007160d77f890670c52d15c67a717f96e364adefdd3a7947e301f48a96b553a5d

      • C:\Windows\SysWOW64\knieejvc.exe

        Filesize

        5KB

        MD5

        5ce2398b9c0d659f076c10da50f02e65

        SHA1

        21981ab9798a833f2571edcb93a163bafa3a0c95

        SHA256

        a8822c81f26c6dc8ed2255a493414d3dc9b87c8e5619b6768693b2c648dda0a0

        SHA512

        a608b0013cfde315f76dbee6802c9266b09b65f54bac3043e5ee5448acd966ccbfa870cef552bc1afb1905ec7f8496e01ccc1076e044c95c45e2c4a7f6903eae

      • C:\Windows\SysWOW64\knieejvc.exe

        Filesize

        108KB

        MD5

        be863b80c8df79276e41cab73a4b3a6c

        SHA1

        c98264315238bb388fba249c0358d7f766c518ab

        SHA256

        4675bd4b135c8bb7d74e0d5898fcd2b6476eb45ae751464c36d26f2462beba8c

        SHA512

        6ebb71f700b5bbfabf70ab79e1f621385d8261424b0f93686d65144a18f2fec8302015a66cc7e0543e8d473c272f0adaffc3b775211bb79fa20db358b191d101

      • C:\Windows\SysWOW64\mpyhswlsmt.exe

        Filesize

        149KB

        MD5

        5a1366d811460096a3c3f9960094826e

        SHA1

        73404ca8a2aad03e5abf7adeb6cbb311b2cf6a0a

        SHA256

        4e9231d36d7c9aadd6a627de644ddf942629f80c1d33739a9cdded3380bfca92

        SHA512

        95d7b50fe24e86d40df88c6c7c2c57c1e2a9575c3922316dc842e3cf41712b8f511a6602e83aa43b45e819dd85a0b853340e47055ea5d8e00794344328cb58e1

      • C:\Windows\SysWOW64\mpyhswlsmt.exe

        Filesize

        104KB

        MD5

        edd124deff577bcbcd97548206da67ef

        SHA1

        59ef828946e131b3f76d56369838b3d2d4d10b1b

        SHA256

        0228dbcc32eb5033ad571602cc7dc4b3a0ec2afd552e7f53cdd35f8b869905a4

        SHA512

        9a86ebdf94c687b331ed7774176a4e2dfb3d522d58fb7f1d777b87bea27067b1e4b86fdfffc1ee1759c1ad230b23f2bf83ce3ca42cf6dc7817107ad316d9388b

      • C:\Windows\SysWOW64\ouvodenymsswsuq.exe

        Filesize

        64KB

        MD5

        d76d22b81130bc9206c7c947d7a9ea5e

        SHA1

        5956e88a6ec7949ce5a350e21703307d855f34b1

        SHA256

        b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

        SHA512

        112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

      • C:\Windows\SysWOW64\ouvodenymsswsuq.exe

        Filesize

        101KB

        MD5

        5d73fd659e95d06d6e788f99238f088b

        SHA1

        bd1a2a785d6ff60a879f96d9a4f8747ff2acfdc4

        SHA256

        5b312605ac6811719cf14932452446b0157342cc496c9d39181f561b091e6f97

        SHA512

        4086917167a19b56f57cd5f4a552c5f7fd8251dc3cb3583e15c1d37f850e9751dbd60499efb5d12614172bfbf29649058e65a605534ad207b91b9be333fb1f54

      • C:\Windows\SysWOW64\ouvodenymsswsuq.exe

        Filesize

        71KB

        MD5

        9ccb744d01d923d6a097c7c697964c18

        SHA1

        69f1cf1aeaba57f7068b10791d37b8fc96332dc1

        SHA256

        09bf23b8ea29b7f9606c20ffe77bb50da23323f091c3408d6136cc4bd6a777aa

        SHA512

        4b109c37b9b4fd1eb817b1864dde2769d9127ad409614cace6a606717258724d8f3b9321a9851a44a044eef91a248246fef157f998dc5e8587fb897de838bd5d

      • C:\Windows\mydoc.rtf

        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        30KB

        MD5

        4909c749788d14eab4697059a06336be

        SHA1

        66fe4f751dd6990ec54f737a6656c3b8b6af9b2f

        SHA256

        38c718be80e349daee272eb1fe3dcb1bd874f59cef4f4fbde2d503a8a23fa1df

        SHA512

        1cfe12276cc68f23cab461f304f8e3d9fea6bfd3bffc8e7ff1fa7fe33ab6fef4af3b175ecabc57157bc72c38a67fb755972feb3589a7d706bc5fc34fc15237a9

      • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

        Filesize

        1KB

        MD5

        f39ce6fdbce87601ca9c721ea2fdbf85

        SHA1

        930ee415950715135c8dbbdf1a12890fe09e65e4

        SHA256

        7060c63c6e18a49ffc0baf54e95f3ad297132a14369357b28bb819edced70a0f

        SHA512

        5386310c9a55e24b31ba317ee6696ae6c8afea2badf45b0e340cc0feb450c01951c44c5d11e73bbf3406ea3958a8991d8e4d19ed14514569f1b6a87c7bec701d

      • memory/3988-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4560-45-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-56-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-50-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-49-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-47-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-46-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-44-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-43-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-54-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-42-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-39-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-37-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-57-0x00007FFAE2290000-0x00007FFAE22A0000-memory.dmp

        Filesize

        64KB

      • memory/4560-53-0x00007FFAE2290000-0x00007FFAE22A0000-memory.dmp

        Filesize

        64KB

      • memory/4560-55-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-52-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-51-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-48-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-40-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-41-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-35-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-106-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-107-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-131-0x00007FFB24430000-0x00007FFB24625000-memory.dmp

        Filesize

        2.0MB

      • memory/4560-130-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-129-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-128-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB

      • memory/4560-127-0x00007FFAE44B0000-0x00007FFAE44C0000-memory.dmp

        Filesize

        64KB