Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 07:06

General

  • Target

    0d9f474df29eb4ffb4d1f4e635f7ed11.exe

  • Size

    512KB

  • MD5

    0d9f474df29eb4ffb4d1f4e635f7ed11

  • SHA1

    05b21dab3d0b96599f0684167f28357701321dea

  • SHA256

    e15b5ac6472da325f757191e30b68456b0aaafde1c934a8614da7dac63f35a05

  • SHA512

    da0b35ec2141aa9827edb3c350b62b0e3db10524752b68d9831d334d173965d93ec7516e2c3d4814c365e797f86f613bf4e481fcc49225802e41bcc3a6462ce2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6D:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d9f474df29eb4ffb4d1f4e635f7ed11.exe
    "C:\Users\Admin\AppData\Local\Temp\0d9f474df29eb4ffb4d1f4e635f7ed11.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\SysWOW64\ijthrwjhsr.exe
      ijthrwjhsr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\SysWOW64\kovhvgkn.exe
        C:\Windows\system32\kovhvgkn.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1940
    • C:\Windows\SysWOW64\kovhvgkn.exe
      kovhvgkn.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2336
    • C:\Windows\SysWOW64\aqupmtpitbkbn.exe
      aqupmtpitbkbn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1900
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:880
    • C:\Windows\SysWOW64\dnuofiubgkxgqnq.exe
      dnuofiubgkxgqnq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\aqupmtpitbkbn.exe

          Filesize

          512KB

          MD5

          ce804af6eda0e84a780c26522a2ecc7b

          SHA1

          357f52bafb481c67eab273e11d92b6ee030a72d9

          SHA256

          416ce969cb43f8be6eac48d769660bfe858612c61b34da8d4cf564a70b617471

          SHA512

          2590277fc2ad1dbe71ee79df2c10f163839c2fef5841ffb93b8ff6164f4bc316a2557b5e142e5bacbcdc3980de40c84fdb425484f69f9a4499a506ef0d194ea6

        • C:\Windows\SysWOW64\dnuofiubgkxgqnq.exe

          Filesize

          320KB

          MD5

          40eccbf82b7b8fc916befc4f91646a41

          SHA1

          9b26728b4c732bfeb504f70ab523d90def972d37

          SHA256

          1dc118e41bf637830be03d9bfe6d57960cf8dc9dbe9c8302a78e3406285bbaaa

          SHA512

          4714d4a188098bfac7feb042ef4c6f0236e826c335c740df7f47d60f0e70d50c5eeaf73e1b94afb0408bd8c6b5ef6fa9d49577a6ac214ce115f4b6db0b341cdf

        • C:\Windows\SysWOW64\dnuofiubgkxgqnq.exe

          Filesize

          128KB

          MD5

          33be84de0fa03c6883fec2ead970e3ba

          SHA1

          dbe35ed4343779aa93200c24966ccb805e18f223

          SHA256

          ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

          SHA512

          3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

        • C:\Windows\SysWOW64\dnuofiubgkxgqnq.exe

          Filesize

          512KB

          MD5

          a2277286e3d59f98e4a986c4aeb24463

          SHA1

          5bad83260ab2f6f45a60513f7ee403f237ca6b46

          SHA256

          1c1e849a97bd428bb5e5340146fafe9765936ce6d02ed560a6469652a3de99cf

          SHA512

          f1e8204822319b69a743c8a586e82c92f9200732369792da1a219bd6075124da708ed73633d8131cfa64c90a56a1b1ea3aa3b6e776c8389fb6eafb34bbf9c28a

        • C:\Windows\SysWOW64\ijthrwjhsr.exe

          Filesize

          512KB

          MD5

          61bec51c286e11385579f8ae0b014297

          SHA1

          b4c6d23b6b20b10428988a96db92bc05bd3cce54

          SHA256

          ecb9971ad92333870b3bbad1fc530898db6ef05e7e16c2a7231e496a12cecf70

          SHA512

          c7fcd78a1795813176d9952d4be61f646ab2666d5a2b2c10fb3a51823764be412ebebb9de585bdb66c66e2e43d919522dddd6df457285ba2669f013ca2f7773d

        • C:\Windows\SysWOW64\kovhvgkn.exe

          Filesize

          512KB

          MD5

          ec846f4bc0dd756e7cfbf3f09d6254e4

          SHA1

          70e094712a82ffc2b1ff37162f4aa7efbee222a1

          SHA256

          8d96f4e3b28460ab71888fa1ad476b0831c9cba70f5beb055f8e23231e91d105

          SHA512

          32e488186acad8cc2e4fd30df025903ae9dbf9dfd4b4581c40c0fb11f436524a11a9decb07d5ef21bc9055fba2e748f851c9831574d8eca31d457dfab0af1d2d

        • memory/880-54-0x00007FFAB8F50000-0x00007FFAB8F60000-memory.dmp

          Filesize

          64KB

        • memory/880-45-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-40-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-43-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-47-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-49-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-52-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-55-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-56-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-57-0x00007FFAB8F50000-0x00007FFAB8F60000-memory.dmp

          Filesize

          64KB

        • memory/880-53-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-148-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-51-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-50-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-48-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-35-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-46-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-44-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-42-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-41-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-37-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-36-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-118-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-119-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-120-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-142-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-143-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-144-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-145-0x00007FFABB7B0000-0x00007FFABB7C0000-memory.dmp

          Filesize

          64KB

        • memory/880-146-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/880-147-0x00007FFAFB730000-0x00007FFAFB925000-memory.dmp

          Filesize

          2.0MB

        • memory/3004-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB