Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 12:19

General

  • Target

    1dd267c95fb82de848d0262b1b66bc78.exe

  • Size

    512KB

  • MD5

    1dd267c95fb82de848d0262b1b66bc78

  • SHA1

    500f1bee0954db7938bd6768dbcc6a83492d8d47

  • SHA256

    5079511925112402438b5b56358e81e09514239e16c787620b8f562ec41a88b2

  • SHA512

    21782e675e0fca9c202cd716be92f6aeb9ece4f2b6ad9535e71f14b5c95b59ae69181f5493026fd92b87916ce2c6cc33af58405f2fe24e5e1f00deb3de1f0c33

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5u

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dd267c95fb82de848d0262b1b66bc78.exe
    "C:\Users\Admin\AppData\Local\Temp\1dd267c95fb82de848d0262b1b66bc78.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\vnfxbozsjr.exe
      vnfxbozsjr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\nqupumjk.exe
        C:\Windows\system32\nqupumjk.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1356
    • C:\Windows\SysWOW64\bhooaaddkwwvoip.exe
      bhooaaddkwwvoip.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1296
    • C:\Windows\SysWOW64\wavywtelqreiq.exe
      wavywtelqreiq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2856
    • C:\Windows\SysWOW64\nqupumjk.exe
      nqupumjk.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3064
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    92KB

    MD5

    defcf0baae1664c86124b64d2bb1cfa9

    SHA1

    28ef9079d96428da3715a30debcd67c0e7a8fd92

    SHA256

    b31abccd2d0ecab21e186b8ae60242b56b02fe7ebe576a8bc6828281e673d784

    SHA512

    b0c083a1f85f9ac8716c92407abed299e507b56df41df37e626d387cdc99d810bb5853de3d5b7950d56aa8432fe28b8e1960bdc44a7d3a8fe4c62edaec8b6b2d

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    113KB

    MD5

    945ec5730e3785a5e77756e5c44329ea

    SHA1

    2a41daebc7df477343011bf6fe76dc1621a2b051

    SHA256

    8082628a2bc21868952ab94cc2ea416482e3595d566086520d4e12d8fd534d59

    SHA512

    a5b096efb92fde8d0fbe82d9413eea14b0d81af326f504ef22e9c7aaaf000e99c9bb80f0528f8ec9a1abfdbe91d2a0406e7c9eeea3819f197f3eed0beaa4bbff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    408ff72ac77dfbd94124373f0a45a68e

    SHA1

    3d2ca24fe5531456ace256f7fbedd6dc6f553646

    SHA256

    035fe50fb10220afc92b62741669d0936114689bda12e37d0deee3cf7fc44fba

    SHA512

    df506c72f762d2a0a024ac9a98f1eaa074d286041a4b743717d3c489f47f7d0ddc7a8e08bdd7f45f515a9283a3bd7fb629beb11f00a05f78a4f17d34a428cd7b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    cc4d4b358046d0841731915c49ec00db

    SHA1

    a02f132ed4ac9e4e63a3c9533f2c01a92c74bfb3

    SHA256

    1340ed7b7b5c7293753f2c3c1f837bfd702f7bfa0d8817766d5397fc41c17e46

    SHA512

    9f600d4b435afc925e86f3534a493d6774a6bccb4a75b65b449ff2b500b6436cb692ea61412cd25962f23309b27e11f4d44d0dd7ce9e32e67740c2655e53aa37

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    850bd5bed1d6c9d225a172db7edf4e01

    SHA1

    53154f6ca8d819be26e5ffd532e1d42b44975468

    SHA256

    6bb1bc36ce1d9e971fa89dce4c0476cdc651158da5c21b625506d9c0b64bbeb9

    SHA512

    c6becef33923bf6e0efc4befe64a2e09f2f828802cde93e08501e6f26995f4cf7ec0960e068ad84ebc5b52cca0adbfda0e3f44caa55ef9fae5e57336827fecd6

  • C:\Windows\SysWOW64\bhooaaddkwwvoip.exe

    Filesize

    466KB

    MD5

    b2e612e7fb5584996543995d514b057d

    SHA1

    c0842d1647e8a320f734f8b68d62fc649318cc0e

    SHA256

    c1a61c1e199d79794356058d11c2e452ce92cff52c297a38ce4f19963a16c1c7

    SHA512

    cce3609b237bfb62866d47b0b41272140d5d265c07abb4774130c385686e7d4ab30d6c5f03bc5ebaf41d155f698d22e65df6f6eacac22ff99a92bd9731357997

  • C:\Windows\SysWOW64\bhooaaddkwwvoip.exe

    Filesize

    438KB

    MD5

    12e3cc25b42ea7e8511ad34b8d0528ab

    SHA1

    810b14f1a5869dd0adeedbf0c28e92de02714b6a

    SHA256

    e5cee6d7a08e04c4a8110941d11101c7422ce88de8fe9439541a02a8c3985d3e

    SHA512

    e16564d8312fcdc915b387fb831cf873c73d387bc29970078282abb58b99dc75449a528d45195aef48c1be298385d14fc8c468e2b30a72f2cc91ca086d419e9a

  • C:\Windows\SysWOW64\bhooaaddkwwvoip.exe

    Filesize

    70KB

    MD5

    9e4f0c94c9fae9bf2364952b547b2505

    SHA1

    33159deb648e9494d10aba96ce61536a35da78e1

    SHA256

    534aa9e2e5f5097ce60ed2b83fbfae8d7fe86487cb48a7a4931fa190f7029f9e

    SHA512

    0b1b3d20f9f9dd59301fe7c0337d8d68191877e049a0596fcbddfb137f659eabde56d6987a8c21af2a7f0f9dce4ab2115b425b3b75a1049feaa16eea5dbf74fb

  • C:\Windows\SysWOW64\nqupumjk.exe

    Filesize

    277KB

    MD5

    52dbf41c0604a2513b35404b838ceef1

    SHA1

    0c32ede431ffb8f915a0e7c4f8d65fd4df285f1a

    SHA256

    50797646b8ed440b8f996bfe19b0169918325a4169350612aec84984ebd200e8

    SHA512

    3727cb49c4213b0435f94d16020b1f083f4b4c4c889b725c7b3ebfdbb814598e1e7c6e9779b8b9caab9824b110579241e5bea60cc2d64f226d190e053dafb0f8

  • C:\Windows\SysWOW64\nqupumjk.exe

    Filesize

    335KB

    MD5

    9921ef3de7cc210152a085eb666af3e2

    SHA1

    cfcc18fbbbd140bcd61905a55c8958b21be2fb06

    SHA256

    68c383c1169386e70a483460c75e077dde1eb2016bc901061dbbd4848505e00a

    SHA512

    3e003510b7ab985d08e3cc777986e360d24718156952eada29a9325b4521ad9ae7e2bde351afae695457c51450f009cd6e6e2c055718bf020951b59ae905c2af

  • C:\Windows\SysWOW64\nqupumjk.exe

    Filesize

    501KB

    MD5

    f74a6dfa40207bf43f9456d4dc6d4588

    SHA1

    6096ae78bdf5f690d07f2f834ace94580dcdbfd9

    SHA256

    c7114fc43beb49b54c4a05d0ea2029606e5e6739e61e28c2a215c343ff7e87a2

    SHA512

    811b3a13b6292866a95b41bc914c523e9cf7f38b2a368cedb40dc9bd5c252a949f51cc3104471f7b6c7b8ecdf0239dd149aef2423a9e07b71a6696b7469bf457

  • C:\Windows\SysWOW64\vnfxbozsjr.exe

    Filesize

    49KB

    MD5

    7728bc91c925609cb76d44e34ff19975

    SHA1

    d3da8ba1e7cca6b785fd6fe932243005ab2a55c4

    SHA256

    ac6fdb67281259cc26e54d7e12ab6aefddcc94abc03e47596203bef9655f04ce

    SHA512

    1b115eaf603157e5717aa2c799a098825bdd455b36c58e92f154632213c7b5795a0df1beda04c3199396f731dcf6ea1b9fede08d6739d71ceb8d63af3070817b

  • C:\Windows\SysWOW64\vnfxbozsjr.exe

    Filesize

    51KB

    MD5

    172c8beae04740aa7223afd0f8fdb961

    SHA1

    fba782a18328f70dc9b60b4b1b05cea7d4bc94bb

    SHA256

    be94ad5df6ba0b709a0d020d7a0aa0f4f9893fbab5840f72616052c91c37a97e

    SHA512

    534cdb71df6b94c5ac14896fb3168c255964422e84cf336bb0e113ab437c0e05cc7909320001b77063d5f7a2158b05a459e2d35cf3f43533695a5db94f0df2a1

  • C:\Windows\SysWOW64\wavywtelqreiq.exe

    Filesize

    512KB

    MD5

    1c8f084a2b3d7c31d039cdf9d245bbb4

    SHA1

    1ded7b15bfeb77b03c7ff78a6b92316fdfb1c10c

    SHA256

    7317a781c5a2bac0fa8b989c073f78aa5da83b79fbc1e5e3d1b87ccd6761796e

    SHA512

    c956aa884ab391dcd62f7ec4d54e2a57084c8061b51f6bf729b81b3c43ab95721adbf23f9db35d9bce6196d8456ab01f5a6a31c53044c967ced6fd83dd904ba4

  • C:\Windows\SysWOW64\wavywtelqreiq.exe

    Filesize

    474KB

    MD5

    b69a965459d4eca125378611585e9aef

    SHA1

    72d121903f7047b447bb75129dd83426ebb4b6ef

    SHA256

    1f6a3e723574108b7bf9542383cb62bab59fbe28b159e916815553ff0fd3c040

    SHA512

    3181cfce9289f20c17f9a66347e1876c7feb66e3912e72135ac43dd9be928c4842c9d44ccb9aae23bd05292d6305b293ba22e930cc8582dc99f0b99269e80d2b

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    166KB

    MD5

    ea6aee67c3127319165bf6fdfc31ca4e

    SHA1

    a53ac8d1ef8b1c43843be3e6dbd76a34d2cc4a89

    SHA256

    94e0fd0e13296c3faca74bfdbf0d910277586fe3e14abada38a363d0f0d77874

    SHA512

    c8cdd98e3cadf347be02dc5e94b8a969454781326bf160c1a442c937b68672f678810b2dfc8aa280111d0d1751b2a575a546ea5457ad40300799b95e36d81580

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a853dbbb5b99d136458ccf32b3a85b35

    SHA1

    47b73433e1ee1eec57a6a51b63de7680ad701445

    SHA256

    292c23063b9ea71c6d741f656cca540f1f187cc8cd3c98f4bd8af29b16524d47

    SHA512

    a9a28732f961745e0cc5987898c747a76a729c8b78ce5fa2803ecebf266632981b4d432dc07d557ea42fea2700052b2cde80f674918db438b0e41e591eed2787

  • memory/1368-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2860-38-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-44-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-52-0x00007FFE74E10000-0x00007FFE74E20000-memory.dmp

    Filesize

    64KB

  • memory/2860-51-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-53-0x00007FFE74E10000-0x00007FFE74E20000-memory.dmp

    Filesize

    64KB

  • memory/2860-49-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-47-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-46-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-35-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-48-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-39-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-43-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-45-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-50-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-41-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-42-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-40-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-107-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-108-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-109-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB

  • memory/2860-129-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-130-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-131-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-132-0x00007FFE76FD0000-0x00007FFE76FE0000-memory.dmp

    Filesize

    64KB

  • memory/2860-133-0x00007FFEB6F50000-0x00007FFEB7145000-memory.dmp

    Filesize

    2.0MB