Analysis
-
max time kernel
4s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 14:46
Static task
static1
Behavioral task
behavioral1
Sample
26b55565d8b141f716191d5fcbbdaf5f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26b55565d8b141f716191d5fcbbdaf5f.exe
Resource
win10v2004-20231215-en
General
-
Target
26b55565d8b141f716191d5fcbbdaf5f.exe
-
Size
512KB
-
MD5
26b55565d8b141f716191d5fcbbdaf5f
-
SHA1
406719021ae9f4ebf58cc4df5a6cebdd32e3bf46
-
SHA256
1592771df224158a190193c4ef0f5bc196874c38edc1eb67974a740144add4a4
-
SHA512
ff92f2c5cc32fd3e4d323a66204a0bc27268af3ef8ea7dc908df6dfc7e1af9028352642ca0fadbbb9b9b83488303b04ea1085f93c6836ed12a45a873b8bdfb35
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6j:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm50
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 4336 jkdhvadt.exe 2336 spsxumxalmebk.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3576-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jkdhvadt.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File created C:\Windows\SysWOW64\spsxumxalmebk.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File opened for modification C:\Windows\SysWOW64\spsxumxalmebk.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File created C:\Windows\SysWOW64\ucnohwmlnu.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File opened for modification C:\Windows\SysWOW64\ucnohwmlnu.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File created C:\Windows\SysWOW64\onxjiengmifwmna.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File opened for modification C:\Windows\SysWOW64\onxjiengmifwmna.exe 26b55565d8b141f716191d5fcbbdaf5f.exe File created C:\Windows\SysWOW64\jkdhvadt.exe 26b55565d8b141f716191d5fcbbdaf5f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 26b55565d8b141f716191d5fcbbdaf5f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC1B121479539EA52C8BAD332EAD4BB" 26b55565d8b141f716191d5fcbbdaf5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFCFE4F5A8219903DD72A7E9DBD97E147594A67426345D79F" 26b55565d8b141f716191d5fcbbdaf5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F46BB6FF1D21ABD20ED1A78A759162" 26b55565d8b141f716191d5fcbbdaf5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1944C67C15E0DABEB9B97C97ECE534C6" 26b55565d8b141f716191d5fcbbdaf5f.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 26b55565d8b141f716191d5fcbbdaf5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32462C7B9C2783506A3477D770542CAB7D8065DC" 26b55565d8b141f716191d5fcbbdaf5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABAFABAFE65F19383793B4486EE3996B0F902FD4315023EE1BA42EE08D2" 26b55565d8b141f716191d5fcbbdaf5f.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 4336 jkdhvadt.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe 5064 ucnohwmlnu.exe 3096 onxjiengmifwmna.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3576 wrote to memory of 5064 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 32 PID 3576 wrote to memory of 5064 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 32 PID 3576 wrote to memory of 5064 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 32 PID 3576 wrote to memory of 3096 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 31 PID 3576 wrote to memory of 3096 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 31 PID 3576 wrote to memory of 3096 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 31 PID 3576 wrote to memory of 4336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 30 PID 3576 wrote to memory of 4336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 30 PID 3576 wrote to memory of 4336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 30 PID 3576 wrote to memory of 2336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 29 PID 3576 wrote to memory of 2336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 29 PID 3576 wrote to memory of 2336 3576 26b55565d8b141f716191d5fcbbdaf5f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\26b55565d8b141f716191d5fcbbdaf5f.exe"C:\Users\Admin\AppData\Local\Temp\26b55565d8b141f716191d5fcbbdaf5f.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\spsxumxalmebk.exespsxumxalmebk.exe2⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\SysWOW64\jkdhvadt.exejkdhvadt.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4336
-
-
C:\Windows\SysWOW64\onxjiengmifwmna.exeonxjiengmifwmna.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3096
-
-
C:\Windows\SysWOW64\ucnohwmlnu.exeucnohwmlnu.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5064 -
C:\Windows\SysWOW64\jkdhvadt.exeC:\Windows\system32\jkdhvadt.exe3⤵PID:1800
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4088
-