Analysis

  • max time kernel
    2s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 16:17

General

  • Target

    2c6cdffd88593216a9029aed10b61e45.exe

  • Size

    512KB

  • MD5

    2c6cdffd88593216a9029aed10b61e45

  • SHA1

    c7cb8a9ce0ebe3c9b64fd8ddd3e3cb736927c006

  • SHA256

    35a911c70db576b7860bd051fb64c93b76fa9d028f0bb11968c77e742b8677fc

  • SHA512

    f112c777e4ce839c07093b7cd45f0578954ab419a48a6f5e378e0ffdd51acaa6105303df24f44b81dc7666063edaa2226700b2420d29cd93c6228c3a70dc7b07

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6G:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Windows\SysWOW64\nmowzwwfatngmxb.exe
    nmowzwwfatngmxb.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c meyozfphgpxtb.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2616
  • C:\Windows\SysWOW64\ixhvnpll.exe
    C:\Windows\system32\ixhvnpll.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2524
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2540
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2272
    • C:\Windows\SysWOW64\meyozfphgpxtb.exe
      meyozfphgpxtb.exe
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2876
    • C:\Windows\SysWOW64\meyozfphgpxtb.exe
      meyozfphgpxtb.exe
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2628
    • C:\Windows\SysWOW64\ixhvnpll.exe
      ixhvnpll.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668
    • C:\Windows\SysWOW64\ihtpwxalof.exe
      ihtpwxalof.exe
      1⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2028
    • C:\Users\Admin\AppData\Local\Temp\2c6cdffd88593216a9029aed10b61e45.exe
      "C:\Users\Admin\AppData\Local\Temp\2c6cdffd88593216a9029aed10b61e45.exe"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1716

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            b939141e2857b384e8ae5961b42a9887

            SHA1

            6f70948117bd2e8622fcdcf74c3a218cc969e7a9

            SHA256

            c8778cb95788be1687a8a44b22f4165ae82bcb80845372ee414f9da28a27803d

            SHA512

            aa9334fb9456199262326d9d851fda7e9c8cb0cc5e946488676e1219ed73c566c0891c9e10b0be1d084490e4f79639463e152d93aeae4b4ca1dee790b1f8960d

          • C:\Windows\SysWOW64\ihtpwxalof.exe

            Filesize

            382KB

            MD5

            badd716c7c48a8241873d9251da496d1

            SHA1

            6bd2a072c8f64a1780fe75d983cb7b6584985c6d

            SHA256

            ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7

            SHA512

            7bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5

          • C:\Windows\SysWOW64\nmowzwwfatngmxb.exe

            Filesize

            93KB

            MD5

            257f28bd5bdc2b725434b7ab570814e7

            SHA1

            972446e0f8d210c5d6f42a57a921391a236d564d

            SHA256

            d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

            SHA512

            c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

          • C:\Windows\SysWOW64\nmowzwwfatngmxb.exe

            Filesize

            381KB

            MD5

            30aec9e0b33fbd99234328357879f812

            SHA1

            3c9d37139d4ccfe2b694afba9633170d0f510a92

            SHA256

            15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

            SHA512

            2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

          • \Windows\SysWOW64\ihtpwxalof.exe

            Filesize

            512KB

            MD5

            ca42cd98d51cc31ef5fddc341bb62bf0

            SHA1

            ab1fb9325a365de70275d6d34edd73327782cf1d

            SHA256

            d9b4abd843d1453f0c24362afd5bfb301807bb6a0c171f45333148febf930523

            SHA512

            4400f6db70a3e4474c9e4c69c2a0b6c3f5054ee44ea30fe73be07e7e3da58c33e87b9e95fb1de5f721c968c435468767f2fbda8777b5567ec64f5505995ab0e5

          • \Windows\SysWOW64\nmowzwwfatngmxb.exe

            Filesize

            92KB

            MD5

            6662b185f19fbf697c56a25c92de7961

            SHA1

            0df0c0df0de3724258df2549c583e3c934aca726

            SHA256

            c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

            SHA512

            c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

          • memory/1716-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2540-50-0x000000007171D000-0x0000000071728000-memory.dmp

            Filesize

            44KB

          • memory/2540-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2540-84-0x000000007171D000-0x0000000071728000-memory.dmp

            Filesize

            44KB

          • memory/2540-105-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2540-48-0x000000002FE51000-0x000000002FE52000-memory.dmp

            Filesize

            4KB