Analysis

  • max time kernel
    165s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 12:18

General

  • Target

    1dbc0306bd804f227e707cdda7046f5a.exe

  • Size

    512KB

  • MD5

    1dbc0306bd804f227e707cdda7046f5a

  • SHA1

    ad03d6a82f62b384361f2f26ea88e1b883d58505

  • SHA256

    5d24d558dceab8702752e69e8a89c393d7c3d4a2463e6aeba01306fe8d8c331f

  • SHA512

    6ee22544e19a55cf63601b8abd761b3348730c5949f31b4de6d5c19b12b0cc876616d2ef473a0bcc83f92b77b72d2461401b214f3218d98dd541dd0529adfdbf

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5T

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dbc0306bd804f227e707cdda7046f5a.exe
    "C:\Users\Admin\AppData\Local\Temp\1dbc0306bd804f227e707cdda7046f5a.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\puxizrntml.exe
      puxizrntml.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Windows\SysWOW64\xfrhduay.exe
        C:\Windows\system32\xfrhduay.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1648
    • C:\Windows\SysWOW64\gelmbjtouwlfbmo.exe
      gelmbjtouwlfbmo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4804
    • C:\Windows\SysWOW64\mojivspuybvmr.exe
      mojivspuybvmr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:652
    • C:\Windows\SysWOW64\xfrhduay.exe
      xfrhduay.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1604
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          a96b421866739e8fc9d2c22252b48cde

          SHA1

          5d9c4725d50f5a988054e1256974394bfc49ddce

          SHA256

          65f01c8602ac9cf7d8dd3d267a7d7619549739f11a37dfeb2c17111ea5695bd7

          SHA512

          6968acd64b4a6f7e633f8d470a08a1327f4b1e900fb06277a256e1f60fc0d841bca7b632181b0c3a6058df201af50b9e95a74d5a62fc00ef3715d927ee67ad47

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          2304b8e2b02e36f74b836576ffae6940

          SHA1

          44feb86ad11d6905df3c45a4e7d48754c0266242

          SHA256

          1ed343df0a190b96210f46560233f67775a005ff32d53f725261349dbde77f2b

          SHA512

          e4a90628e16b20851ad7eb834ae6933ba3ee60d9fbf88e5ffc31eb9d92fe818dfa19ef410792e67ba162f69d3783b7981e4981c2cfd47cc06e3fa5dc67966eaa

        • C:\Users\Admin\Documents\FormatApprove.doc.exe

          Filesize

          512KB

          MD5

          3976d0a329399cc5dcf8985221ffa718

          SHA1

          1906fe1631c314133289eb4ebfc48a9417e8431a

          SHA256

          4e0de7a388bdea7bf00ded879ccf95b6b82d04d4065f4094af39da5d86fdb315

          SHA512

          94bc4449e348ae8e7de255ecc07e827adc3b9fc65dd6de1e7aee3f735e7c6f787b825c01dc6dc1dd776a9433c5a869fa5e25acc49fa68c421dd3f9e58c10abcf

        • C:\Users\Admin\Documents\RenameCompare.doc.exe

          Filesize

          512KB

          MD5

          b01af587fb9c6571868cfbeac3d8c511

          SHA1

          1276c2645b16d732e0f1ecd1678f48abda237fed

          SHA256

          aa3c491f36455238eb8520fee88ede64c07428c2b0d5faf03cf5fd2e5f0257c6

          SHA512

          7a67724b834f3fd8ffb7a41b8b777cd38b0accd8c7833c7d4cd7da9dda5836194dfe6eb45611b12757f600c8b1e33a0a508cdfcea3bf438769ea6b75f642dde1

        • C:\Windows\SysWOW64\gelmbjtouwlfbmo.exe

          Filesize

          512KB

          MD5

          93ddd279fa8e134da5472486d3a028ae

          SHA1

          e0f4aa25da7aaef025997a751918293ed91d0cda

          SHA256

          c5b3e09781543c5da9d817fad2825910f0237115faf6be1548c58b33a8ce9205

          SHA512

          9cde5577a6e5139bf8d2a946b67961a5479384689b828058a0feaae4b967ed0d7bef9a3306378fcdff8e28f594cfd6ef9d473a0728c837eb84208af70e5ff984

        • C:\Windows\SysWOW64\mojivspuybvmr.exe

          Filesize

          512KB

          MD5

          43bbcf185595e15b82efc78688a13230

          SHA1

          b5c9f79904e63ab9f7bf1c60b1fe1f7148e61840

          SHA256

          7f6ea4f4698df86c7317c9450a3970fc64a82e2f2afdc17d2a8002f294f75998

          SHA512

          08010388ed9883fce0e22db22e52d62c22ab61c96ec3d6f8a740dcd2265c30c0f31de01407989887827cbed8388190c406ae27dc3fc4f141d40ef0794c59d86f

        • C:\Windows\SysWOW64\puxizrntml.exe

          Filesize

          512KB

          MD5

          ad13ed6344f1805d8fffd3b15d5b6a07

          SHA1

          f067ade70fb0d6939b8663cc65b2d2481b5d074c

          SHA256

          30b5d2125bee21320f39419fbfc892d0c3a2136b0154f7ca8a1c47ff18beb0d5

          SHA512

          c1067a69449272d77970382e29ed12335b487679bf80a8806998420e7dfcb954be3b7c794e6a4a5f131c04ace950e7a56805cd4e4ec12b3f9f30a95a77ae229a

        • C:\Windows\SysWOW64\xfrhduay.exe

          Filesize

          512KB

          MD5

          3add76fef5600bc8ea5d65137a36e154

          SHA1

          162cd0408d24d1d4720e83509de94ab8658f8453

          SHA256

          0e63f218170ea7b63432a92c495fbc94ece4dc825b295e33dcb20a4df8d22ea0

          SHA512

          5f6d628757c027282fa8a8a387fe6caa2e062ec9db593de18425f68f5be1ba2497227a116f6897138922b708214bd8112986ffc51803f7fdcea8713785274948

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          fe566ec8359e0fcf5180655cb6659ded

          SHA1

          2caf7840df3fa2cd404fd48d52570b6941a4c103

          SHA256

          14d15fb937328181ecbe488b96e02b3aeeff6e24618dc09b74d0c22eba19120e

          SHA512

          14c4bf93478be5dc19532559a8a3ad438eae87602a23744efffe5ccfcee8d1c54408bc559d3df5321eb52520243c7a9b020e5c61758f2f657c42cd391eb5f93a

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          6dfe7bba86f4f2a3f23879dd4149cf4c

          SHA1

          c1ed02ab42a5953bd2a27909b06427e5f0a7c630

          SHA256

          275e5eea83c5c939023f8f9d17dfd63e8d2d76544c324afb4310f38227b61df8

          SHA512

          204425a9293703aa8ba0419fad76b5df4ece8fbf0f6785ec1cd94d194975916a4ac1447a3c2569faeded9e156819106a14a7787829ca18e21ff74f0bbe3034cb

        • memory/1928-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4004-55-0x00007FFAB0890000-0x00007FFAB08A0000-memory.dmp

          Filesize

          64KB

        • memory/4004-47-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-44-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-49-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-45-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-51-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-52-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-54-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-56-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-57-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-58-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-46-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-53-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-50-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-43-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-40-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-59-0x00007FFAB0890000-0x00007FFAB08A0000-memory.dmp

          Filesize

          64KB

        • memory/4004-48-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-42-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-41-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-37-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-121-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-122-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-123-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-39-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-38-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-155-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-156-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-157-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-158-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-159-0x00007FFAB31F0000-0x00007FFAB3200000-memory.dmp

          Filesize

          64KB

        • memory/4004-160-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-162-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB

        • memory/4004-161-0x00007FFAF3170000-0x00007FFAF3365000-memory.dmp

          Filesize

          2.0MB