Analysis

  • max time kernel
    103s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 04:00

General

  • Target

    04542f267718e0a8555ce33cf08ea44e.exe

  • Size

    512KB

  • MD5

    04542f267718e0a8555ce33cf08ea44e

  • SHA1

    0a387dfbeab37809d90b523fcf7cd2c09f8ae2ba

  • SHA256

    c676c2895844d4715fd167281457e073e535e6045d4bcadd9a7a27398b84de7b

  • SHA512

    ca83799a0ec9e0d0aeae33750e4e4820f2dcc8922c247eafd2ba1abf0d94739407eb4a0bb67d83aba7405a0fc7afad1ef8c919d227d9a3711d7def2c6d8bc0e1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6S:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e.exe
    "C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4088
    • C:\Windows\SysWOW64\saqzunzjir.exe
      saqzunzjir.exe
      2⤵
      • Executes dropped EXE
      PID:5036
    • C:\Windows\SysWOW64\zxwbnlvwqommigf.exe
      zxwbnlvwqommigf.exe
      2⤵
        PID:4120
      • C:\Windows\SysWOW64\ibtsvalyepkbi.exe
        ibtsvalyepkbi.exe
        2⤵
          PID:3168
        • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
          "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
          2⤵
            PID:1392
          • C:\Windows\SysWOW64\tyalcmuj.exe
            tyalcmuj.exe
            2⤵
              PID:4388

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\SysWOW64\saqzunzjir.exe

                  Filesize

                  141KB

                  MD5

                  3e046d0886559792ae67e4ba945ff763

                  SHA1

                  b2e4ba083a7c6bdeb2c46e1b1681a098dfd8ff92

                  SHA256

                  09bf46701e05b114089f71671d54e1df5f11447093096a1b1f1eda87a94f2f28

                  SHA512

                  4196db8d2066dde7b40a805efd198e2d374ab859f4c052ac14b766d55ff1d71e4bb133c8f61fbfe1520c97c37ef5e0cb9c81ff0dc356c637821e3b4f5e566dfa

                • C:\Windows\SysWOW64\saqzunzjir.exe

                  Filesize

                  512KB

                  MD5

                  63a4507fa5fccaf2de6cc01ab80e15b7

                  SHA1

                  f30ad09645ef4ef9d8b6ea6280f790a9875da133

                  SHA256

                  d484c6286cc717af03aecba65d5a7e45570f4c7485387f833e54bf10cc8f403b

                  SHA512

                  e3432b3c0b7aa72f409542763900df22962032332ee327bc04288c5ee65a33b209c3e059be4d528ada63b18a7b9de8961bf58673b19cc841c6f2fd5ff1b66583

                • C:\Windows\SysWOW64\tyalcmuj.exe

                  Filesize

                  26KB

                  MD5

                  065b7f110ffe4d62f204e3af7fa36f17

                  SHA1

                  4045484ce531b1b925b545ff30d6c30c5039c66b

                  SHA256

                  c113c5a815f87ea0b80e14adf4886ea63e091960843c278099f5a4e64aa29c99

                  SHA512

                  ebe3b25e96b42f0f98ea4e7241db7d1ff79b64ceca4d5bccb3cecc4c15946ad6125bc68dc99e53f7990310f42c75d92291e39185518e6f119381e750f72d1012

                • C:\Windows\SysWOW64\zxwbnlvwqommigf.exe

                  Filesize

                  95KB

                  MD5

                  513718653b4089436713071fbda2d777

                  SHA1

                  c66701f8b07e580f77bdceb0df2a314f66f48f43

                  SHA256

                  198c846e45c097db6614530866a915b1eb90c090d343208b76f7b5b94b52669c

                  SHA512

                  29f7286339cc082b4a9e3bd91b6e948ae497c865751b8127abf970bff420bb0103d1c5ded60269b61a927835f9a0d9c2a5027ed3d2f3f0bd759e17402cc30bcc

                • C:\Windows\SysWOW64\zxwbnlvwqommigf.exe

                  Filesize

                  92KB

                  MD5

                  6662b185f19fbf697c56a25c92de7961

                  SHA1

                  0df0c0df0de3724258df2549c583e3c934aca726

                  SHA256

                  c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

                  SHA512

                  c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

                • C:\Windows\SysWOW64\zxwbnlvwqommigf.exe

                  Filesize

                  512KB

                  MD5

                  099bdf1d9e0e66fe24a69af4c67c0527

                  SHA1

                  f05492b9d104f6c80cfb3470f87aaa9e4914b113

                  SHA256

                  fa0505d4959700ba34319d9a2eeecbdc0c55e06475b685ccee6dee25ec3a195c

                  SHA512

                  b1883cbb55e3f62f4bb1a07a80a05b60ea1162b572f97f8cb5afa1686d46f541a2ec2052426fb9a07e694a9fd322380239461fd423749aa66c7a61ed08519ad9

                • memory/4088-0-0x0000000000400000-0x0000000000496000-memory.dmp

                  Filesize

                  600KB