Analysis

  • max time kernel
    1s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 13:47

General

  • Target

    22ed4e3f3bf70565d7b06ac317f93aec.exe

  • Size

    512KB

  • MD5

    22ed4e3f3bf70565d7b06ac317f93aec

  • SHA1

    f6efda263c340f6d560aac158b82dffafe110794

  • SHA256

    f629280bd3147000718ec60d7e6fbdd26f36580c15c6d903b8c6f1e27ae857da

  • SHA512

    b49c958bd6b3d3d06e74ac52c2c4fe4ed7659373f09fb74767224e85e2191e6ca8738ee38a463f97b63de15111c7a255066b1cecf95a1dc93aaca4c0f0ae0c38

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • AutoIT Executable 22 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe
    "C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\xhwiikgtle.exe
      xhwiikgtle.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2720
      • C:\Windows\SysWOW64\tzaogzps.exe
        C:\Windows\system32\tzaogzps.exe
        3⤵
          PID:2572
      • C:\Windows\SysWOW64\pkhlsujeeuihieo.exe
        pkhlsujeeuihieo.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2792
      • C:\Windows\SysWOW64\ljqnznszryndj.exe
        ljqnznszryndj.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2796
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
        2⤵
          PID:2636
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            3⤵
              PID:2612
          • C:\Windows\SysWOW64\tzaogzps.exe
            tzaogzps.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2800
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:2880

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

            Filesize

            512B

            MD5

            954ecdbc9ad9da3a0d9439140d22abf9

            SHA1

            1f76e61124a82d5615b4c2a23bc205936eceb827

            SHA256

            bf9b1e08ca0802c3b72d2e2f4fdd077364cf283114e3050c7efa204cd865b345

            SHA512

            726a30f156aa6eaad80d5a9e1e2198f3c21dcb6e9ceccb3247e2588dd601cf223da2e3118fcd4f3f602d3de256b806f0c10f76a4be64982b4b29911e3422f4be

          • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

            Filesize

            12KB

            MD5

            9b26346e6d2fe8bf4b9500bb1f33ff1d

            SHA1

            3ed798643cdfcf9cd57b721cab5ecc2949e0cfd5

            SHA256

            80e6a162b32d0e9e22efb20de624dbc37cfd90da55d3ca3d93e9030c228d44e8

            SHA512

            c6b8c9f2584fac3928f779f86711a23bd545317b38ca1be855083dd16409dc71a4fbd0cf8fc8ec3c442b4e09dc62cdc255e53aa22aae0c6c77c6e4a4a72f2937

          • C:\Users\Admin\AppData\Roaming\PublishCopy.doc.exe

            Filesize

            20KB

            MD5

            2e3885ed2bbdbd2dec7457a70749a72f

            SHA1

            10b7c7cc759069978074e328c052c353f54cfe25

            SHA256

            a2ea7efcb54abc52342c857d5842c4c66d4151f4ec2d47b375c9cdf2398ade3a

            SHA512

            c2b4ba2b130216d072057c87947bdc4b1027a0e9f558c07c35b85cfac7f1629483f276583edd44bc62406f7197207c65effe669303ae9412106be8adc3ca107a

          • C:\Users\Admin\AppData\Roaming\PublishCopy.doc.exe

            Filesize

            45KB

            MD5

            7b7b6230297c48362e990dad801bb597

            SHA1

            0e501cbe9c39fab73b2f41b572b527347415528c

            SHA256

            328bf284b64c7d81c6600d8292872ec15844689c38c7cfaf7d9377ecd57ea4a3

            SHA512

            260daf45fde4d445a65c8682c5eab83e34e577d619435f711a89aa6d44384aecdea4918a108085d233193cb57d4f3e6dddd277037fb6f56597359d8cc576bf68

          • C:\Users\Admin\Downloads\TestLimit.doc.exe

            Filesize

            1KB

            MD5

            1c9fe21bfb90ac9ebed670d4adfef68b

            SHA1

            2cb6f4f18ce162601f4ad2f97e680d859d81008e

            SHA256

            9c5127f2e662905231fce155b8810fd0489aaf5fb586591f79b307476a8690b0

            SHA512

            6dba9a9d5131d56e7b5886298f76224b0935c67d8ffef184d228cb2ef363d0c0dd61df52030907b9234fa2bc93161b2627e60ee4f098017eceb171cb35fa8408

          • C:\Users\Admin\Downloads\TestLimit.doc.exe

            Filesize

            5KB

            MD5

            03b57330f8c5a226e804d947afe09ad1

            SHA1

            56672a982ec93b8d2d37c8abdb15b28e9ec29314

            SHA256

            8ac88feddd3452d21cf6efcf1a8aefc48d912cf346953e307b985cd47ca14d44

            SHA512

            d594e4d6459e40a72f791b2ea682eb04160110d5c7510bca787915f7a6504f374b9cb1e158ed1c91ff6675c382dd4a504516d876a8f882bd2c4d5a4b7cf4e60b

          • C:\Users\Admin\Music\ExpandSelect.doc.exe

            Filesize

            76KB

            MD5

            090fbf3e519db5291ffd48b21c855c7b

            SHA1

            9bf6380e3e13e8ff5fa1a26450d957f4c3bc19ad

            SHA256

            023c560ef6e4390c3ddde901057c3e506b86f874e373faaf16ed10c763c8a7bf

            SHA512

            1feeee4013b4372a79190b2831d46657fc377b7176725060a6e353e0827439f967bcb8cba252652df8dde6d32082268b166a0607f1ea16181c8b8349aa6c4ebf

          • C:\Windows\SysWOW64\ljqnznszryndj.exe

            Filesize

            15KB

            MD5

            602abc4dc58a158294b8285b295eba99

            SHA1

            11bcbfd073c391da391d540525282978c7beb66e

            SHA256

            6309f3bf697801d2c28701198bfd0fbd3def1e0795e68b0fb79d23830bd422fa

            SHA512

            dfd4bb2e3e64a0ac04a96807b762de41395f598aec36fb53ea90df01cff0150ff8a7bb9e404beb2ee70488c0826fbc45858414f9134996936827ab6ce8880958

          • C:\Windows\SysWOW64\ljqnznszryndj.exe

            Filesize

            37KB

            MD5

            a2548e15fba3e23c2f3f4b8f82e15d9c

            SHA1

            c762750fa9574933b05ca705ec3b213e9aaef942

            SHA256

            65c15a9d23f66e2ccde4e280a49d147300418d816b7192e36e125eb3f7a90c47

            SHA512

            e21c064c28e12d549bd9316c9fd36e3ffdbe1a7ae69651c509377b0b09fc06e0498837d0bf08eef9bd27b4a6b36e5dc10cb21df444f8b98cb618569a6012270d

          • C:\Windows\SysWOW64\pkhlsujeeuihieo.exe

            Filesize

            45KB

            MD5

            e8d0a210a7de9cb675e1378280b0b6de

            SHA1

            c2ab939a2766a03bf6c24459cd935c2d580f220d

            SHA256

            c7c4be5ef5432feb35d5b82dadc75a8e6292be3f6630a23c22c1b66957344d0b

            SHA512

            e3aed655216ba65313dfc649215cb55b215aa5a3bccb14598d335ada70f6b0d02cc0133b02e755ae53f6e3983c19366dda6364ca91976fb07def3f5eaeb54fb5

          • C:\Windows\SysWOW64\pkhlsujeeuihieo.exe

            Filesize

            49KB

            MD5

            0c27f58d42fc8d29c2b8c36da8d3590c

            SHA1

            dfeaae68f04015ca97577435f9b64bae74665e0f

            SHA256

            1386a2a5ac2e53073a48a1f1d2198c8d4e77d009127d4ae7e6b3c193d34d9565

            SHA512

            4a0d1633128093138b74563d7e0bc8e965eb686d2d83b8ebdb590be79325ccbc6ac11b046dd14b089c225b9df540b242b687f068951936c9e93ef30bf9376ecd

          • C:\Windows\SysWOW64\tzaogzps.exe

            Filesize

            44KB

            MD5

            335c13db365750588f3f95e9bebfdbc3

            SHA1

            5fe6e881a1703191aa27fe405a673d8d1715fa30

            SHA256

            4a5f58f1b7739af9b003eb0277ecd4f38cdf7b676a0a921d3a155119515e0c54

            SHA512

            51c9a91bd9ff508d8b0eb512d273ac63b109f48ef82473681b92483da51b42e6a15cb1d1149c2914fb9635d73db19e307c9abaff82af131e13e6850e1f4378a3

          • C:\Windows\SysWOW64\tzaogzps.exe

            Filesize

            37KB

            MD5

            d8daab88f0562d30afd7643e7ffeb1bb

            SHA1

            401ddb23ae8e254dd0ccbf447c5f6e844495e45e

            SHA256

            9342162c492e720dc74691959803a2679eea4b14cd670685fc2d8fcb9fb59cf1

            SHA512

            079cb218770957c928b163b1fd8af0db55ef41763ca8907767b6ca1a8b3076fac359e40a46ea0680145da0963af2ea34adf2d8a23512079b0066f852bb50c22e

          • C:\Windows\SysWOW64\tzaogzps.exe

            Filesize

            8KB

            MD5

            6a1b43ab419a9c7f87999b34fe952888

            SHA1

            adff7ad633e850c41515af0e1852c08a45c37b87

            SHA256

            ac90c5a83a5497a08d4ee1b3339ef9cc385acfc18cc6df3e2da6c4dd228de5e8

            SHA512

            8dfe24fc89ecda852c0c16dc3ae666c49666ef69e5dac95e173a541211c1f5e6326632ba5cb16be4201c81228b64ae6a4b90bd402dcd6eca0d4223e72837894b

          • C:\Windows\SysWOW64\xhwiikgtle.exe

            Filesize

            17KB

            MD5

            4c014fdfc6b1a8f8a1df8fef2dd106e8

            SHA1

            9225fa90c578c73fe78dba529f2f0b8a01f2d3e0

            SHA256

            74badc611d4a4063d4f34e94a0221fd2e8ba914977c8d5492968f4c80264a077

            SHA512

            b21ebb86099c856884429c5afdb2aea624bfa7300a40814c16e6783ce393d2a8102de75db9261e96544ec2084a12497f91c846fcea57f225ebe1fbbfcb690838

          • C:\Windows\SysWOW64\xhwiikgtle.exe

            Filesize

            6KB

            MD5

            5d9b551d4113f32c8d857570eb3ee68c

            SHA1

            777c28ec9d116facb2b79a90d94f7e82ba4bad9d

            SHA256

            7cade22c6d4dc46f9410c5bc4e73cb07e682ee5684fc9bfac661920371ce99f8

            SHA512

            07845438aa7fb490b1462cb3408f258ac787230734451404383f27569bfcb550d7b8a80531e894015b1862e0cb781b4caee556d650c2e634f506cce824a63a47

          • C:\Windows\mydoc.rtf

            Filesize

            223B

            MD5

            06604e5941c126e2e7be02c5cd9f62ec

            SHA1

            4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

            SHA256

            85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

            SHA512

            803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

          • \Windows\SysWOW64\ljqnznszryndj.exe

            Filesize

            3KB

            MD5

            de7f6ac59fe55c5fce538775798a238d

            SHA1

            978a55fff6c52c3264e9fa186d16c232a441113e

            SHA256

            a49c52fc78ee9f75366500de1f663b4686f99d4f466fccef154170dc6024b0fd

            SHA512

            374ee185b9db7bafefea7831e3a5b3b36e2013a02c666614e2a77fc43df959647720ba7bfe356f3640bb91b592da69f8a17ff64c7ae18dc9fc8c632b422bcd58

          • \Windows\SysWOW64\pkhlsujeeuihieo.exe

            Filesize

            15KB

            MD5

            d77c15412933cd9aa17ad64680ee810f

            SHA1

            418ffd121352abed1a213c88dc9214711b13ab66

            SHA256

            c5fd91a9e9cd6ea679f41e5912523bc1990e52c24206ef91d2a211b58b734860

            SHA512

            885405870b97de1451bb7e623cace5921246a723e27145f459aee03d9118b54c939edc569571158a2f435d987c2bf67f7377076884e8158b95c0e3c8d7b3ec5f

          • \Windows\SysWOW64\tzaogzps.exe

            Filesize

            23KB

            MD5

            9e52f3a2fb6bf55b2603c47d22b4064a

            SHA1

            af0b6aa2aea4920d251b6512ec85d4d833c19393

            SHA256

            2acdd3f3e31ec195589480a78a5d2c5b7e4d9b9e85177e4af4019d256036d6b0

            SHA512

            8b11020fa2448bc088ad0493a54aadcb9995d90f632acdb57c31d51dfe93edb0e97ab08d61296a17ab19b5e869c5be49f22aec8d68ff01a2c3aa5bf499f360ac

          • \Windows\SysWOW64\tzaogzps.exe

            Filesize

            44KB

            MD5

            31ae958162c9d9bb8aadb41bdb523b03

            SHA1

            18da9d89b22e76a91f0f6e24f2e82ae2c42561ad

            SHA256

            a82736cb824abe66bc8040d5e612a05564f344e5d59f8dd6a14ac03586967145

            SHA512

            40eea818bb6b02ddc8467683c668ae917c9c28a0ce9b6f0b5d407d822717de0a9a850b1eb0cb14ef7656ace6b7996b32391b871c239934fa37d9593ef744760f

          • \Windows\SysWOW64\xhwiikgtle.exe

            Filesize

            48KB

            MD5

            14ba9ec0f4e4b1c443fc354ac6f518fd

            SHA1

            e3e70fa35d1fb18d048b98212ea68c508305e388

            SHA256

            69ed0274e16b83d19568b2d9610d83b07bcf6683af7d282ba75faf3187e4bc32

            SHA512

            91cd5514b2aa2bc5c19368743416caf51da1c5e76f0db9ca0fcf76a3260cb995a48b29da2d14a2bdb0f99e7f97ebbc6f3602e147eadded3a9135186546b05add

          • memory/1948-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2636-47-0x00000000715BD000-0x00000000715C8000-memory.dmp

            Filesize

            44KB

          • memory/2636-45-0x000000002F991000-0x000000002F992000-memory.dmp

            Filesize

            4KB

          • memory/2636-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2636-87-0x00000000715BD000-0x00000000715C8000-memory.dmp

            Filesize

            44KB

          • memory/2880-86-0x0000000003DE0000-0x0000000003DE1000-memory.dmp

            Filesize

            4KB

          • memory/2880-90-0x0000000003DE0000-0x0000000003DE1000-memory.dmp

            Filesize

            4KB

          • memory/2880-95-0x00000000026A0000-0x00000000026B0000-memory.dmp

            Filesize

            64KB