Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 11:32

General

  • Target

    1b13ba682cbadbe31a665942343aa3c3.exe

  • Size

    512KB

  • MD5

    1b13ba682cbadbe31a665942343aa3c3

  • SHA1

    fbe7dd31c41c03b36bede2a6bb09c5238f387a18

  • SHA256

    4bf3a7214edda9c12844804e7be52fbbcd0d698a205187d9a907fcce12d0b387

  • SHA512

    f14b5429ad379ffca662b45f49ee7da9737de8144de37861af60d4faa86288408c674db659e5753827d2b9d58dba4283ceab2c848ae50f3b00171a94b764c81f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b13ba682cbadbe31a665942343aa3c3.exe
    "C:\Users\Admin\AppData\Local\Temp\1b13ba682cbadbe31a665942343aa3c3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Windows\SysWOW64\dsojrjjsaq.exe
      dsojrjjsaq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Windows\SysWOW64\rdgamffl.exe
        C:\Windows\system32\rdgamffl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4148
    • C:\Windows\SysWOW64\subbsmypjcqen.exe
      subbsmypjcqen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3744
    • C:\Windows\SysWOW64\rdgamffl.exe
      rdgamffl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3732
    • C:\Windows\SysWOW64\fshkovdhgwqrzkn.exe
      fshkovdhgwqrzkn.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4312
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          20KB

          MD5

          7d908c73535b238cd69c816c1a2881e0

          SHA1

          f1bb419a612d2d45d4ca9c2b5d126014c6cbc601

          SHA256

          66713e63e9e7e94c580b945e87d05a871c1b8b994dd20596207cc7139dcceb47

          SHA512

          fc12a886cbfc4ac746db76bd3bfa4f069638ad88f9c340be72e236e45fd0f8ec7ee686a6aceee976325c9b69aa8f538ea2d372bc0f404ce91cb05045471a30c6

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          13KB

          MD5

          95dafcab96a45b7aa0196ae06422e2fa

          SHA1

          785a576a83fc08a5072fe2f21d6260216b8244d1

          SHA256

          47ae5e0df85aef2090b775f0f9bce142da10973eef3e334097159dc650ee2381

          SHA512

          f75d62ba9e5989724c793cd8176aba1247fffc9325a194f12b7c4d788329757aaf05f6e114f3bc023ab39e7c454405129b1702ed6cf437be8128c96a4e8ab2dc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          a8e1590c35d27ae1cf6556bfc479fa2b

          SHA1

          5842e434b296107bc520a8564e0e67874152d238

          SHA256

          d9068f384891f47181730704bcd3185c3986180029d40384ecfc709e29b08c7b

          SHA512

          fcd58c35973961e8daf3165665359758e4ad550b4cf60cb82b0d11418c883842eddcd0fe7af56eb1aa0fb401e488403ff7746aaf1aa3fc0229afc398cc07a8fa

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          f565f852b55fc650a6e0fa0b90de27f2

          SHA1

          98c7e9291efa2841cf791366210a7ef13410787a

          SHA256

          ad32ad81ad9c0e4882470aac5d3e194afb3231d96e0e9f6546d3b6d7b659dace

          SHA512

          5b1de9a2dc787931e3f056957fc45de0243852fc476b39fb5b2a5762da04b8c8d0d2958cdc8819927d44fee49af3c9e6ef7166606d2f81e0afdbfd974b828746

        • C:\Windows\SysWOW64\dsojrjjsaq.exe

          Filesize

          165KB

          MD5

          eff730e9f808fd3f243abc786bf731d1

          SHA1

          c56c46396bd9cb4289331d13093c31f54ddd5584

          SHA256

          4a7e2b30997317cafa0d42cc324c223760a772f4b12d860a9ed8eb4ac5ecc316

          SHA512

          dac32271ee014f4af122698709d473ef8e020a6d153ea82bdb4f91e9b854cfb64ee8dea7b373d896b7d5b355654edb3ecdc016d3c3bc89df0ce28345c58f0fdd

        • C:\Windows\SysWOW64\dsojrjjsaq.exe

          Filesize

          136KB

          MD5

          95aab6a832fbcbd6e07c064e283b636c

          SHA1

          fc89b8ae3f3fb0fbcfb5a04e46dcb12d1080c5e3

          SHA256

          76b5eefb33674b76a16942fa2904d55fbd761a41c2c1c561786a48254127b539

          SHA512

          8b3137602b779eead4adf8fa459b4628cccc2f348d55765d107b9e608c346c1f72f61a7a31277ca0ef9cf800a44272d01cdf586a66e1c7a2c07341b8600fbfb0

        • C:\Windows\SysWOW64\fshkovdhgwqrzkn.exe

          Filesize

          61KB

          MD5

          fb5e6978b03335a573dfe022b92cc041

          SHA1

          cf62c2b36196ec9fdc1a69b956808fc926c352e3

          SHA256

          0a09beb1ddbc7e93d91a247612b78d924a715a92c1b0a72bd39a88a5331f0add

          SHA512

          81cfb08ebf4efc8f0c47db7a1945d04196be51bf5e25f1c668b683096b51cd93929d4060568ca1d1dd265551690698f12d5e8a02f957c534183e2da47859b328

        • C:\Windows\SysWOW64\fshkovdhgwqrzkn.exe

          Filesize

          36KB

          MD5

          f0ba224c7e68761e620d1b7f179a3af2

          SHA1

          beecf135858e6b157095c424ffe5d571610c178b

          SHA256

          e313e143418561e2fbc31dc2fe0f7133b543df3d2f439b966ef3237c98da7503

          SHA512

          3664cf69b6e62dba72fd6d191bb55a9f72fd4a470a41c41daaa5a542f93117cef6c740a7ba6a86b719e587292942ae9d9e39352364e7dbafa0a8dc2e3068783f

        • C:\Windows\SysWOW64\fshkovdhgwqrzkn.exe

          Filesize

          215KB

          MD5

          4f05585b28ce6a6b0a5934b1360470e1

          SHA1

          143b8071569d19c3b59ac08b869565c8abc57d18

          SHA256

          a5a6f774d419d786d81d63fecec0518df6d547d032216a153361fdbfa65d25bb

          SHA512

          5e41db9fb066c75580bfa8000f3c3dc76c98f64b9c071f784d2c41b0b4cfacb5f3a80eddb0cf93bb7294546b164e63601d9d4129fc3bb2c9340a3bebcb50d401

        • C:\Windows\SysWOW64\rdgamffl.exe

          Filesize

          133KB

          MD5

          59ff13641c9f5d42d23e97a0e4a44b0d

          SHA1

          8809396bbdf03731fda3829c57705b31f289bab7

          SHA256

          3bca1b0a3e7f44d76d80f5b0b890a8d3d65658a84c5d3be843316d8cb9ff27a4

          SHA512

          c93be246c27ab99e49fcbe687d145013ffc9ae0019f31fa316a49bb1ae528cdb34242e0e43229176dfcb912cfcf9be277adf520b1191fa7b8e7625d15e9fd17f

        • C:\Windows\SysWOW64\rdgamffl.exe

          Filesize

          60KB

          MD5

          88c4bb67f69af2bbaf842d3e9c2713c5

          SHA1

          b24719110087399320afd0b41c97cb8db0f32ade

          SHA256

          b5b1cc01244511d0f62bdc2aef9c16178d45c625208aa1db0004ec7e33ccad83

          SHA512

          e3d721df12408667124341d80bdab2b890ec1b7cbd8b004617ab4a5c9f24ce770ee665f01f7356689c2a409b4682be57aec6037e4d1d2706642cc79f1a62619e

        • C:\Windows\SysWOW64\rdgamffl.exe

          Filesize

          79KB

          MD5

          d2a6ae36218449690ddc7c9811fdd929

          SHA1

          b64eab86ce5d23b601fed12443e7b5dffb360f2e

          SHA256

          686303ad5749de9e060cff0aa2a2674db0597500c2fe3e30bbef767dce0cab44

          SHA512

          c34157ba8bb69db778481b7d8994c5361e64f01fa91455c3890dd129f5618c538f3058cd30f798cba70535ef05cfd04914f388911403580be49949bacbc51052

        • C:\Windows\SysWOW64\subbsmypjcqen.exe

          Filesize

          123KB

          MD5

          7db1087825acafb71d9fec486044b7df

          SHA1

          f5daf51e6320163eb0dbd0a9ac0c9f926f1aa88c

          SHA256

          5700866a5fcbb3b3d803db6ae88c5771abfad093d3a053f7f1415e31c8fdac9c

          SHA512

          e490dc72bd4c8282f561679c1257645da3d82a8096a9a9e89b3ee7d00de244352e2728d7d7a4024d5054862a755ecd34d921eae1586de11cc9aa5e05e7d09c1b

        • C:\Windows\SysWOW64\subbsmypjcqen.exe

          Filesize

          61KB

          MD5

          46163f6f783d1a1cf61d8cacf484a8bb

          SHA1

          00dda4539aaa1bb30731d193185d422ecc288bcb

          SHA256

          44a7ece4d216f3f82b691d688612224205b38ad0bb01e1762dfe677e9c0562af

          SHA512

          18c969f8eee8dcc6b4426bfd8158a8be5b8f9fc4abf6c858c6e404eb667745ae4fc7a866b3712b2c0dcd0807ee31472e74422f0d52b822a623d0358191d38b3c

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          1KB

          MD5

          ec89629d437c17787acc7061c89e753c

          SHA1

          c65089b32eba1cf75d3546335718073460c971f9

          SHA256

          87b17909878537f2c3d3bc046f54b9eb382e312fa75d2b177457a978dcc7d83c

          SHA512

          65f02cc30b64e2c33d7287c135bc0bb20abe1e35c7176a03e47403db3e21da28f7e7ec7a13ef748aeb76ac06e5e159a9b4e62196692c3411459a4ae235a1bec9

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          7KB

          MD5

          754f62de153f4ee68eb40226f106eea8

          SHA1

          39991ff2ab199875e61163628ffc55170c4deac6

          SHA256

          d1fce2e27c3d1a1680ce76e76ae71f9bff998b604cd55fdefc7b6766f3885756

          SHA512

          495497a42dacf062db56e5371bccda03d5198208f6988a807135a8192a8e61028bf38a59a6c0a47da39e1b67995b15e3288328ce3c3261b1487813cc7284a485

        • memory/508-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/3324-42-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-52-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-53-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-51-0x00007FFD88470000-0x00007FFD88480000-memory.dmp

          Filesize

          64KB

        • memory/3324-50-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-48-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-47-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-57-0x00007FFD88470000-0x00007FFD88480000-memory.dmp

          Filesize

          64KB

        • memory/3324-41-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-55-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-39-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-38-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-54-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-36-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-35-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-56-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-49-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-44-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-45-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-40-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-37-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-103-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-104-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-105-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-127-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-130-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-129-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB

        • memory/3324-131-0x00007FFDCA870000-0x00007FFDCAA65000-memory.dmp

          Filesize

          2.0MB

        • memory/3324-128-0x00007FFD8A8F0000-0x00007FFD8A900000-memory.dmp

          Filesize

          64KB