Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 06:23

General

  • Target

    0b5eb14018d8edcf7ec2f0d53343cae0.exe

  • Size

    512KB

  • MD5

    0b5eb14018d8edcf7ec2f0d53343cae0

  • SHA1

    633b0af602f95b9839c78272b1f3dfa442a73b9a

  • SHA256

    645cc40b8227591e5c7c26f8f7877d47b80504d6437540131712d2fb26ff8ad2

  • SHA512

    1741449faa798cce64d6e6234602d8d815495b4baf2855c7e4e577567d980c8ec478cbdc823b3365fca97f33125123ec65a2603d15889b4871d54fd2b87405fa

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b5eb14018d8edcf7ec2f0d53343cae0.exe
    "C:\Users\Admin\AppData\Local\Temp\0b5eb14018d8edcf7ec2f0d53343cae0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\SysWOW64\plhquhgfoe.exe
      plhquhgfoe.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Windows\SysWOW64\kondcxym.exe
        C:\Windows\system32\kondcxym.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:3064
    • C:\Windows\SysWOW64\sglrfqaqocnmexn.exe
      sglrfqaqocnmexn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c deqgbmhkvbxwd.exe
        3⤵
          PID:2092
      • C:\Windows\SysWOW64\kondcxym.exe
        kondcxym.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2688
      • C:\Windows\SysWOW64\deqgbmhkvbxwd.exe
        deqgbmhkvbxwd.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2792
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2364
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

        Filesize

        512KB

        MD5

        b2aa498e5ed7045f3bfb22299cdfc341

        SHA1

        c133afb3717350cbc0cd1379e9625e240f1495ca

        SHA256

        df000959c931b08c52c943b306fe9fe8582163b18ee138592b95fb5590df8e76

        SHA512

        aa0262f316bdab4b206e55acda5a538908e115d1ed98f221ed40c2a3d7407cd67ae8504097d03f60523e03cd5eb5c521e3c9e9745be404fced1b01dbb8231012

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        64B

        MD5

        1d63c011c1a1ebda9b7d5eb0cf77e3bd

        SHA1

        d0841dfdd58c35fa01d1b3598f38adcda330c6dc

        SHA256

        1ed6f4ddbef16141d7d8c539c034d3ce906134b0afa92f93a1512a7cdf9ad78e

        SHA512

        803f6621b2b9b654bc54ee4076272875f1f1b24c9122dfd92c5763fd3f0adefc7ff71b55ed1e72217799d7b590a46928999f98db81f0b8185b5152ce8eef6556

      • C:\Users\Admin\Desktop\WaitUndo.doc.exe

        Filesize

        512KB

        MD5

        2a4a184b7fb9006bdbcbb83247c4cc9b

        SHA1

        f9f79368d5cea377f4a9f705905befbdced713d0

        SHA256

        4b9d41313b255e7223b15d15180851c1478b85f9f5d6b1c95356e4726d87fdf3

        SHA512

        e5d1412e6dade6cf3833a39093b15f158ddddf72ffaf34e2c7322c591515bc7ac724affd279cfd39080c16ea2ce2a7d5f155cdb5f6bfe3b36bc04eb9d6eb37f4

      • C:\Windows\SysWOW64\deqgbmhkvbxwd.exe

        Filesize

        512KB

        MD5

        9e5823d7535f2743ab7781015e9ed1d8

        SHA1

        038357fedea7a31267972fd90828b52403e6b368

        SHA256

        b3e2969294896f3a7ab34cc242bbed4f507dc4273051446453b4dd7c7d69d23f

        SHA512

        dc14fc45ebbe3bcc5c6e0301799689a94de6c368aaa801c9619a998b054c26147245deb96eac74f37f1215b5fa426bd045bb35111b75694da953cf6ff53e2a13

      • C:\Windows\SysWOW64\kondcxym.exe

        Filesize

        512KB

        MD5

        4a1ae089b29eb5e98f0cec4b9776afb9

        SHA1

        bfaaad8c50cc4a69df5449c6eab2c7414b779fb0

        SHA256

        034892147c097e47f83392f361b159147cee8981c5c4f28bb5891c49a8e112ea

        SHA512

        f641d09526ba08f7635a6162b7c10d1a90c3fdd1c26af86ac5f2f8b0dde1b0dba41dcda3e8a4f6707990e06c9f5256e8864a44f266d5e41900223db675394907

      • C:\Windows\SysWOW64\sglrfqaqocnmexn.exe

        Filesize

        512KB

        MD5

        844557fe649d5e42b60eea2b3f55a419

        SHA1

        2dfd52e19461032863bb69c6448aff1775debc2d

        SHA256

        e43e2ad8b81e61cc772b97b8b65cafc31ffb531e2c617a76b2da110ef527eee3

        SHA512

        1af629c88a64377e8e6618adf006a9af1e2a238aa14adc481ba9d86ebae62d5eefe09a88bc26516f522911f21f46b6223f85496e7847ead17cfad5aeb4db7a56

      • C:\Windows\mydoc.rtf

        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \Windows\SysWOW64\plhquhgfoe.exe

        Filesize

        512KB

        MD5

        9597357dbf2d47db0af64a7113f5b6a4

        SHA1

        863f4e297829c7321145b4f671caeb17f2988324

        SHA256

        7f3cd720f63ec4dac9c9381a676e780390b9596e0820c376a06acc6ed73e4339

        SHA512

        bb61a8d855764021fc8bc09d6c7ec4faf935da3cc648f64894b434846819070a65f6246369df152f492ba9a5f6db67ca6c72d34232a036eed21ba6f8028bfa47

      • memory/544-75-0x0000000004030000-0x0000000004031000-memory.dmp

        Filesize

        4KB

      • memory/544-89-0x0000000004030000-0x0000000004031000-memory.dmp

        Filesize

        4KB

      • memory/544-94-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1616-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2120-47-0x000000007170D000-0x0000000071718000-memory.dmp

        Filesize

        44KB

      • memory/2120-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2120-45-0x000000002F1F1000-0x000000002F1F2000-memory.dmp

        Filesize

        4KB

      • memory/2120-77-0x000000007170D000-0x0000000071718000-memory.dmp

        Filesize

        44KB