Analysis
-
max time kernel
103s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
04542f267718e0a8555ce33cf08ea44e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04542f267718e0a8555ce33cf08ea44e.exe
Resource
win10v2004-20231215-en
General
-
Target
04542f267718e0a8555ce33cf08ea44e.exe
-
Size
512KB
-
MD5
04542f267718e0a8555ce33cf08ea44e
-
SHA1
0a387dfbeab37809d90b523fcf7cd2c09f8ae2ba
-
SHA256
c676c2895844d4715fd167281457e073e535e6045d4bcadd9a7a27398b84de7b
-
SHA512
ca83799a0ec9e0d0aeae33750e4e4820f2dcc8922c247eafd2ba1abf0d94739407eb4a0bb67d83aba7405a0fc7afad1ef8c919d227d9a3711d7def2c6d8bc0e1
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6S:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5036 saqzunzjir.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4088-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0007000000023209-5.dat autoit_exe behavioral2/files/0x0007000000023208-19.dat autoit_exe behavioral2/files/0x0007000000023208-18.dat autoit_exe behavioral2/files/0x000700000002320b-26.dat autoit_exe behavioral2/files/0x0007000000023209-24.dat autoit_exe behavioral2/files/0x0007000000023209-23.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zxwbnlvwqommigf.exe 04542f267718e0a8555ce33cf08ea44e.exe File created C:\Windows\SysWOW64\tyalcmuj.exe 04542f267718e0a8555ce33cf08ea44e.exe File opened for modification C:\Windows\SysWOW64\tyalcmuj.exe 04542f267718e0a8555ce33cf08ea44e.exe File created C:\Windows\SysWOW64\ibtsvalyepkbi.exe 04542f267718e0a8555ce33cf08ea44e.exe File opened for modification C:\Windows\SysWOW64\ibtsvalyepkbi.exe 04542f267718e0a8555ce33cf08ea44e.exe File created C:\Windows\SysWOW64\saqzunzjir.exe 04542f267718e0a8555ce33cf08ea44e.exe File opened for modification C:\Windows\SysWOW64\saqzunzjir.exe 04542f267718e0a8555ce33cf08ea44e.exe File created C:\Windows\SysWOW64\zxwbnlvwqommigf.exe 04542f267718e0a8555ce33cf08ea44e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B05847EF39EE53CDBAA633E9D7CC" 04542f267718e0a8555ce33cf08ea44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF8FFFC4F5F82129045D75F7DE0BCE4E137584767356345D79D" 04542f267718e0a8555ce33cf08ea44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F368C3FE6A22DCD27DD0A88A7F9017" 04542f267718e0a8555ce33cf08ea44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183DC67C15E7DAB1B8C97C93EC9F37B9" 04542f267718e0a8555ce33cf08ea44e.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 04542f267718e0a8555ce33cf08ea44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32402C799D5782556D4276A577552CAD7D8765DB" 04542f267718e0a8555ce33cf08ea44e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFF9BCFE6AF1E0837E3B36819D3E96B38E02FB4365034FE1BE42E708D3" 04542f267718e0a8555ce33cf08ea44e.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe 4088 04542f267718e0a8555ce33cf08ea44e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4088 wrote to memory of 5036 4088 04542f267718e0a8555ce33cf08ea44e.exe 91 PID 4088 wrote to memory of 5036 4088 04542f267718e0a8555ce33cf08ea44e.exe 91 PID 4088 wrote to memory of 5036 4088 04542f267718e0a8555ce33cf08ea44e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e.exe"C:\Users\Admin\AppData\Local\Temp\04542f267718e0a8555ce33cf08ea44e.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\saqzunzjir.exesaqzunzjir.exe2⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\zxwbnlvwqommigf.exezxwbnlvwqommigf.exe2⤵PID:4120
-
-
C:\Windows\SysWOW64\ibtsvalyepkbi.exeibtsvalyepkbi.exe2⤵PID:3168
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:1392
-
-
C:\Windows\SysWOW64\tyalcmuj.exetyalcmuj.exe2⤵PID:4388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD53e046d0886559792ae67e4ba945ff763
SHA1b2e4ba083a7c6bdeb2c46e1b1681a098dfd8ff92
SHA25609bf46701e05b114089f71671d54e1df5f11447093096a1b1f1eda87a94f2f28
SHA5124196db8d2066dde7b40a805efd198e2d374ab859f4c052ac14b766d55ff1d71e4bb133c8f61fbfe1520c97c37ef5e0cb9c81ff0dc356c637821e3b4f5e566dfa
-
Filesize
512KB
MD563a4507fa5fccaf2de6cc01ab80e15b7
SHA1f30ad09645ef4ef9d8b6ea6280f790a9875da133
SHA256d484c6286cc717af03aecba65d5a7e45570f4c7485387f833e54bf10cc8f403b
SHA512e3432b3c0b7aa72f409542763900df22962032332ee327bc04288c5ee65a33b209c3e059be4d528ada63b18a7b9de8961bf58673b19cc841c6f2fd5ff1b66583
-
Filesize
26KB
MD5065b7f110ffe4d62f204e3af7fa36f17
SHA14045484ce531b1b925b545ff30d6c30c5039c66b
SHA256c113c5a815f87ea0b80e14adf4886ea63e091960843c278099f5a4e64aa29c99
SHA512ebe3b25e96b42f0f98ea4e7241db7d1ff79b64ceca4d5bccb3cecc4c15946ad6125bc68dc99e53f7990310f42c75d92291e39185518e6f119381e750f72d1012
-
Filesize
95KB
MD5513718653b4089436713071fbda2d777
SHA1c66701f8b07e580f77bdceb0df2a314f66f48f43
SHA256198c846e45c097db6614530866a915b1eb90c090d343208b76f7b5b94b52669c
SHA51229f7286339cc082b4a9e3bd91b6e948ae497c865751b8127abf970bff420bb0103d1c5ded60269b61a927835f9a0d9c2a5027ed3d2f3f0bd759e17402cc30bcc
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f
-
Filesize
512KB
MD5099bdf1d9e0e66fe24a69af4c67c0527
SHA1f05492b9d104f6c80cfb3470f87aaa9e4914b113
SHA256fa0505d4959700ba34319d9a2eeecbdc0c55e06475b685ccee6dee25ec3a195c
SHA512b1883cbb55e3f62f4bb1a07a80a05b60ea1162b572f97f8cb5afa1686d46f541a2ec2052426fb9a07e694a9fd322380239461fd423749aa66c7a61ed08519ad9