Analysis

  • max time kernel
    154s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 14:32

General

  • Target

    25d4370b5f1fb5e124d1cfc1aabe227e.exe

  • Size

    512KB

  • MD5

    25d4370b5f1fb5e124d1cfc1aabe227e

  • SHA1

    13e9af386990b7fd7231f969c272af3060816646

  • SHA256

    54747e30f6fab547bc4c595c4ecac23c4bcf258141e5625e9a14e9ca27bef39a

  • SHA512

    9589772819e3d62b03fcdada8e50b1e33903c05e38f967071aad04883a08ebda60db2204ea8e8ad14a0357368b7772ea32ddb59d0881882bb3326cb26377d84e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj62:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25d4370b5f1fb5e124d1cfc1aabe227e.exe
    "C:\Users\Admin\AppData\Local\Temp\25d4370b5f1fb5e124d1cfc1aabe227e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\psxtjnequg.exe
      psxtjnequg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\SysWOW64\qcothyhw.exe
        C:\Windows\system32\qcothyhw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3464
    • C:\Windows\SysWOW64\ckujbephcbmrqrf.exe
      ckujbephcbmrqrf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:564
    • C:\Windows\SysWOW64\mupaqoimrxema.exe
      mupaqoimrxema.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1328
    • C:\Windows\SysWOW64\qcothyhw.exe
      qcothyhw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2076
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    230KB

    MD5

    13e703e1fc2d986be604007693b97fd2

    SHA1

    87a00d1aa51f7782c1c731edf0f99cd745775706

    SHA256

    2cbc2d7b0d3296fb90f6db99dfe38423a2b058a21f3fdc7cbb0c4ed0cb6cb2b1

    SHA512

    a728285834114f1f55fd337b1d9de04c7790292f72bd196d3770a3684866d0f8aa26d8419f793a097ec3195969acd20b4fd634a3a3af363aae5e4269c49ec36c

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    410KB

    MD5

    a2dacdf00139dd2798b6a2e89098d5ba

    SHA1

    267d633463caff888b2d16409ed07e28b58a7d2f

    SHA256

    e4e83f5f4830a8a8fe0b312d4d8d9159835c88a24f92418e7ca2f3ab6b1a243e

    SHA512

    a386ff758d5a24d874de826505d31b0a0a30d7c371c86c68506494be84365267535a25a9944c794178b9b0c558d2f41cee826ffb16fe7941cffa082f2ff491fc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9a53b44a25b380d5865ba03716be2e81

    SHA1

    c96e57f6160d71faf5fa038839a10ddd3546ad52

    SHA256

    bbbe63a658c599f59f7da2ec8101ea89b1c659282f7c7271464b4d74d058663f

    SHA512

    d0bf1ba92fbcd3695d29c3a7d501b926f2c7267c0b389907f8bc96ce80991f57797c615a69b0e625b81a6a533083db2636292fbe60bc9597cd711c81f882a75a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    b86aee8df509a477031f7919b925e5af

    SHA1

    1f8ad27ac805fbe37369d07b37b8825ef2fbb7cf

    SHA256

    f02aa7da43205c9bec88c063aefb42e32c0208bf239fda6ff3bbf0ff3b943e98

    SHA512

    b833cbc27db9241ecb4f109a304e50c812a82fb1680d2c09a22e5063fcdb54c9180fa775812c03b75be7ba12e311da4b551c61430ed80c8ab578a8484ff18682

  • C:\Windows\SysWOW64\ckujbephcbmrqrf.exe

    Filesize

    381KB

    MD5

    30aec9e0b33fbd99234328357879f812

    SHA1

    3c9d37139d4ccfe2b694afba9633170d0f510a92

    SHA256

    15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

    SHA512

    2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

  • C:\Windows\SysWOW64\ckujbephcbmrqrf.exe

    Filesize

    512KB

    MD5

    20b0ef06dec660163a3086f3f5b9ea70

    SHA1

    f274f6fd1d54197554fdbbdac343c7c5b03cf2c8

    SHA256

    7f4c6e59f457f80e7691c42f5ebfc208f3d36aafc5a4aa17af8edc474d2c57c9

    SHA512

    8da2e695a287fae6cf779aa358b73986385212a21981e4359b55d92688cb6fbea02801a172749ce4e94f6672ff02c7872b8f8dccec084bde9e55b844c37cb2bc

  • C:\Windows\SysWOW64\mupaqoimrxema.exe

    Filesize

    116KB

    MD5

    82740e636df3458eb185a675c24e417a

    SHA1

    8832b77f94612f7c91b3558fc6901fc75a8ca02e

    SHA256

    1a284f3fd0c1c711b252a8d51e626d0c708d8a831e04c69182ca56e0b2f66c22

    SHA512

    246b2f0f23056ccdbc8bb0b005735b6a764c494aea407e2058a245300641c677fe577802292145f48ecd6395153facfe386326c649edae0b348f159828829ee4

  • C:\Windows\SysWOW64\mupaqoimrxema.exe

    Filesize

    319KB

    MD5

    fa41665c900b7d1423e9e9f7d2bf1029

    SHA1

    fdb1470b9c9b059c7c7eecd59d95489b10a5de32

    SHA256

    6b4752b2966fed645a5050a92b162da28875591ffc055dcfbd7c9c60a217fab6

    SHA512

    2ff7d0c789bb910cf407ff3a8cee6dec6b136f225a78c8599078cc5737b1ad3159aac8ae97ef6f9c4b195cf95c17da1a08180fdbee4afd2a5d5dedc960d0f19a

  • C:\Windows\SysWOW64\psxtjnequg.exe

    Filesize

    512KB

    MD5

    5fd2f361e053a1d8a4217acc6afd9050

    SHA1

    e49a2199e1c7e4885c22fe04fd4479f30fc6808d

    SHA256

    b8e2a93d3d0bc091ad0a69f163f32fdebe3b52a28a6ca7f074ee1b1f01d83830

    SHA512

    ed107e9332404a5ddf166c0417c2c3917bdfbfcc0bc6c0c4e15a907ec0e82769e6b7feb13c434f9e5e2c69bbe0cd85eae7386ef27f65dd757f3e7a8507152fe6

  • C:\Windows\SysWOW64\qcothyhw.exe

    Filesize

    128KB

    MD5

    cf1c42f1b34b2c8a87bc8cacd33df495

    SHA1

    b285bd788eec85158182efd78bf5e58183b97d79

    SHA256

    ab4ea5a557055abc51df97dc1a1182a273a9c0e65f04f996a279b3a2e44598b3

    SHA512

    652cd4f038f6009de628bafa541137a1cce3ddc240a5d0d33ec8d4abacb244e1498ece3bf97411e0411e59398c8cd3627c2bb6079bbe7c9283856d849ad4ec8f

  • C:\Windows\SysWOW64\qcothyhw.exe

    Filesize

    245KB

    MD5

    98110ee03be0c8e5a13627b631d8dbf8

    SHA1

    e5243197b95aa9b287f9203127b0f28550211469

    SHA256

    7956433d21e316af40e646aff29f88c5794a66133d15a31727701aa530391735

    SHA512

    0dc2281c8034b9fc13e5c46182ae99206c6394e0bd89354180eedce9ccae31ded293cac06087b0eed8c1ffb55bab529b2f559806fa8edb092eeeb38c1d5b283e

  • C:\Windows\SysWOW64\qcothyhw.exe

    Filesize

    512KB

    MD5

    f2ae27628a04b1668216f006506a6220

    SHA1

    b1fc75a14130c3d15ff4d25a7b16af8d7cc3e564

    SHA256

    4db05eb43416e1039f18deb29483a6066443e22cb4dd879a08b9c3f6ff0b7442

    SHA512

    ce107ae593dc0a5ccb9799a3d40b1a68659110c6ea81b4494ccea4998ac68bb66fbcf337a8e5ead5e2434192856e133b090551e459e99e4a41919da2268a3cac

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/208-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2168-40-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-39-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-45-0x00007FF96FA80000-0x00007FF96FA90000-memory.dmp

    Filesize

    64KB

  • memory/2168-46-0x00007FF96FA80000-0x00007FF96FA90000-memory.dmp

    Filesize

    64KB

  • memory/2168-36-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-38-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-37-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-41-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-42-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-35-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-88-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-114-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-115-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-117-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-116-0x00007FF972350000-0x00007FF972360000-memory.dmp

    Filesize

    64KB

  • memory/2168-118-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB

  • memory/2168-119-0x00007FF9B22D0000-0x00007FF9B24C5000-memory.dmp

    Filesize

    2.0MB