Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 05:44

General

  • Target

    09040edf7d379eb85234a8b04cadbec9.exe

  • Size

    512KB

  • MD5

    09040edf7d379eb85234a8b04cadbec9

  • SHA1

    7f3b0020fb6ba1afcfd48070cb327094278fffed

  • SHA256

    1892d6ce4f0392097ec0c4e6e15bd696611d5793632f5f4f726f13df1a83f79c

  • SHA512

    4851dd9a540d48071032aeae4b8c345ff5cd6d2bb9c527c8da34f1c48414f06b29bf110806ba386fdbad2e560c9dca353a2fb3c8e8642e4821205e276577f367

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5c

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09040edf7d379eb85234a8b04cadbec9.exe
    "C:\Users\Admin\AppData\Local\Temp\09040edf7d379eb85234a8b04cadbec9.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\ihbtmqzfzj.exe
      ihbtmqzfzj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Windows\SysWOW64\wryejlvc.exe
        C:\Windows\system32\wryejlvc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4068
    • C:\Windows\SysWOW64\jgxszojosgrrvsm.exe
      jgxszojosgrrvsm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:632
    • C:\Windows\SysWOW64\wryejlvc.exe
      wryejlvc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1492
    • C:\Windows\SysWOW64\myrolmnadeqhk.exe
      myrolmnadeqhk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1228
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    f70be9cb01cad785f62fc17bf004ccba

    SHA1

    c7ccc538256a9bb87b076cfcc5f3f4cf1512ccfd

    SHA256

    e332defd625f6141e51c36d63cc5e2d916dff72ce88afba033bf3dd2365a4eb1

    SHA512

    f7cd2aae2dd99d03bc4e7b3946ea936bfba14c5450788587cd752182a9b4a2b393413d6e8945e90b10d95f8498b9845e465022df65e4fe0dfa51622b4a61236a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    99872553486449d101cb69c302aabbd3

    SHA1

    04c2831c63b66d756564c2e4d437953118e22a12

    SHA256

    53e5566a12112c40489e4d56117a140fbf807cf6db3ff27e22c01ef25220c27d

    SHA512

    8f9fce59ba08064dc350308837dec68507ce2083d84dfe0bfcac913dffa99484fd90501bdede66add59a5bb0fda7ad93e2b0ff5edcbebf9fe4fbebd2c017a32b

  • C:\Users\Admin\Documents\DisableReset.doc.exe

    Filesize

    170KB

    MD5

    daf4f61e2e6bb788cbf01f6bf8f59cb6

    SHA1

    56fec01d3fcabe44c1539ebb9133d99c0f80cbe1

    SHA256

    044b564603bfb5473f5159e2820cd6bc475c3d6816db10cceb899de8a96c644e

    SHA512

    e31b9b7d810918ad52da2b60040e8fa96c900a27af4e5bafd945dacdea1d10530b725e6e149dad1cf989b0394ba0864b808be6d81f2da55f070db530d7567334

  • C:\Users\Admin\Documents\TraceOut.doc.exe

    Filesize

    512KB

    MD5

    219699e879033580596879517bb0e513

    SHA1

    edc4d3a7bc2ed5b26c748173b590e998c135a5f5

    SHA256

    ac8e964bb40712b196c07d0213399ee47b86d478ea804cb7fe06aa0384c8f442

    SHA512

    182898f3e332e16f725963e8e50f2da442504a6d0e00050218fda5a366fb356b6863a56d95a848724466f150c0b2f846a8deed9bcf536eb1c6556a4196eb0e0d

  • C:\Windows\SysWOW64\ihbtmqzfzj.exe

    Filesize

    512KB

    MD5

    13eec35c0d5c1d326faea637bbe878a6

    SHA1

    4b0b1c048a14ac027428c7966b1d7645f0cac537

    SHA256

    ca0daaa4e94ed39b262ea60ca5229b528d3b54be0293eeab13a75376ad88c6f8

    SHA512

    df34de175e0f03c1daa8d0c336dc7fd7c6c2d8cefa5026ca40c20effd231eec35d96e5c23af985778491ce784f2d35a6e49f060f476a2d69a43a8e0ccd909ac8

  • C:\Windows\SysWOW64\ihbtmqzfzj.exe

    Filesize

    348KB

    MD5

    b3e1b55752818da128907f3dc079021a

    SHA1

    f7f749c92968bdc80115f48378ecc5a19ffd04e0

    SHA256

    68cb7b8034c41dee63fb762157bb6bb0ead1887eecf678f576f1220433164000

    SHA512

    6de28713fc167647479cab28ed08d21f01e6dd4c44eac8c79d5a65e187fb515da5415bed0df60c70b7f3cedda84c378c11d280daf00573392657942a285f1e21

  • C:\Windows\SysWOW64\jgxszojosgrrvsm.exe

    Filesize

    512KB

    MD5

    93b89a04a0349f539d9ceb3e7d4bff43

    SHA1

    f78ced16c936157391dcf9dd9defb881898b6ea1

    SHA256

    4bc0ed2ece017048b202591d4818579efe2e1396cda9a106872524d07e68c31c

    SHA512

    42360abff1b514f69980823f89c6eab85f54cbf7511ef0d0ee4e0f4110948621f67d64e7ecddacabc92d5d76730e0c4cb98ecceef2a4fcd6f078814fbe862420

  • C:\Windows\SysWOW64\jgxszojosgrrvsm.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Windows\SysWOW64\jgxszojosgrrvsm.exe

    Filesize

    384KB

    MD5

    0e151ec3919b72f9a6c7fe60d10f4ea0

    SHA1

    91fb01badc6db9808233ff95abf39c37982a8c85

    SHA256

    f644299fe8f10c5f3e24c1943fc808270b5d4f853e2316abf091c8d18344193c

    SHA512

    41d25f82ce04a14c21d19a9ad2d12663714221b6ecb1c3ee579a4a134949de0bfb3e6212e9acf97d0659d50e7a034dcdc103ecbedd8a71fbfefdc30f5728c12b

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    72fb776643c72a56867a4427329be296

    SHA1

    55e2d6c9e96f7fb2b1c45db60c6d9cb34974e369

    SHA256

    72793270f4033a0240700710f58b41a5014484fe1e60876e5201e34b3cf2b9ca

    SHA512

    96c1183f07b4339af14e23c3510b95a3b411e380157ed014e41ab5c20b93cb5ffe7b340252605896dcb5070cb9d5cd4778837a5b3bd585bf7cc7f9119c968ffc

  • memory/1068-46-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-42-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-47-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-49-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-51-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-54-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-55-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-53-0x00007FFD4FCF0000-0x00007FFD4FD00000-memory.dmp

    Filesize

    64KB

  • memory/1068-57-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-58-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-56-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-59-0x00007FFD4FCF0000-0x00007FFD4FD00000-memory.dmp

    Filesize

    64KB

  • memory/1068-52-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-50-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-48-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-45-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-40-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-39-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-37-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-93-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-38-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-44-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-43-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-41-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-136-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-137-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-140-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-139-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-138-0x00007FFD51D50000-0x00007FFD51D60000-memory.dmp

    Filesize

    64KB

  • memory/1068-141-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1068-142-0x00007FFD91CD0000-0x00007FFD91EC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB