Analysis

  • max time kernel
    0s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 19:23

General

  • Target

    379c2b93eabee044047c1261e9aaa2ee.exe

  • Size

    512KB

  • MD5

    379c2b93eabee044047c1261e9aaa2ee

  • SHA1

    0ce2abba7e5a3f5586b7d863ec91d0369640240f

  • SHA256

    eeaa2181be19dfdfc7ce17d5eb82a8c64693c536d012bcea9b3fce67a8e4c73b

  • SHA512

    59ac957c6440918a631578c3ca52594b01d520d56a82965cf3da54131f64e3adec98d8e72fcf4f42870fdb7f094847c9af0414b46a0441d9c71cdad804f48b41

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6m:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\379c2b93eabee044047c1261e9aaa2ee.exe
    "C:\Users\Admin\AppData\Local\Temp\379c2b93eabee044047c1261e9aaa2ee.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\Windows\SysWOW64\mzimowwtnj.exe
      mzimowwtnj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2636
      • C:\Windows\SysWOW64\oicuxxdx.exe
        C:\Windows\system32\oicuxxdx.exe
        3⤵
          PID:2416
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
          PID:4816
        • C:\Windows\SysWOW64\qyctqnedhzkwp.exe
          qyctqnedhzkwp.exe
          2⤵
          • Executes dropped EXE
          PID:4556
        • C:\Windows\SysWOW64\oicuxxdx.exe
          oicuxxdx.exe
          2⤵
          • Executes dropped EXE
          PID:2096
        • C:\Windows\SysWOW64\wdebdlxjbsiflgx.exe
          wdebdlxjbsiflgx.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4064

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

              Filesize

              295KB

              MD5

              b0e3c4cd1d947f65bfe68daf4ed41930

              SHA1

              76d488b8ad2cb9d5878505289a5b34c2b77a3ea7

              SHA256

              cee5124b10d617bab9b0e8943c57cc4d157b17fbb655c8007264166925c48f24

              SHA512

              8dfa39ea5a3d6496a15e85ba4d236eeebd453a82cb0a3640759fb06098dbffec0019889f5b46ae1db07024ca9f7209afc8de4b045496f31c9c3e6fe4e7f81951

            • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

              Filesize

              286KB

              MD5

              306f19dbf1664bed7c00ed32e114e7d7

              SHA1

              55d2763f765b4c237d6959c24f7d6aa044d1bc9b

              SHA256

              a6e72d1040666718af2b5239868070432feff15c40bf8fb292a15a2aac1224ab

              SHA512

              50e5fc5e715f9d267b055ec0e24bf4a3ccfda007da6b95de56f93ac6a8549258ef3cde46622be5d26cc888245b7ed290fc9f9db733de75d0caba27123adeb237

            • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

              Filesize

              239B

              MD5

              12b138a5a40ffb88d1850866bf2959cd

              SHA1

              57001ba2de61329118440de3e9f8a81074cb28a2

              SHA256

              9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

              SHA512

              9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

              Filesize

              3KB

              MD5

              03ef85af5db942208f9124205c87468d

              SHA1

              880d273d5bfccded51f5cb54bee66ec536db8f6e

              SHA256

              debf6513533088b66553c655c86a234eed142b73f5028901adf97bcc4e2b7c10

              SHA512

              60b2787ca38b590dd2640245e4955e0bebd0a46ea790c51b0baa52f0f48ae694ee5d9f30ba950cec51a5490469e04c4835fdea16e672ea104177974ff43d03fd

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

              Filesize

              3KB

              MD5

              b8e25ffdc202e3b8efa50cba08218499

              SHA1

              fad7aa1234c9e2028166a50f5af57d757f47e8e8

              SHA256

              40d076bc98b335bf08ca222aff054c40ec98314077316900f078b94f92285722

              SHA512

              7eddfb4c6ce5a6cf54316cc57a5fc837e5116c1e06e4426acc1816271b7f30d4fd1ca888db9b2b2e76cb15b355d84bc1af6bd9f72f42ea9ee75fbe5730a036ef

            • C:\Windows\SysWOW64\mzimowwtnj.exe

              Filesize

              25KB

              MD5

              3e1fa54900ec5e3ef1e34b2254ec98b4

              SHA1

              4c3a28beabf67d841e086fe8c5979c9b18620d8b

              SHA256

              4dd487fa31aaefedc1387fcce397a493f6f9fe4cdebb060cba02eab7dfb711d7

              SHA512

              b509000c2cf34f920c63223b0a7ca29977662822e5b5e4ec6030a30acdfe1589357b1b7ac62d536d38e84c1f16f4a631ac9e99f3b16cb7bacca22a18574324b7

            • C:\Windows\SysWOW64\mzimowwtnj.exe

              Filesize

              14KB

              MD5

              6924f6b0471c25f32b2bfa46db9823f3

              SHA1

              73bd2c2acf8b4044e30ff396ebf94d86da5a6e54

              SHA256

              4dde2793ef857bebcd65a82c341c069be58ae9bbe099bafa530e348dabb2c903

              SHA512

              1d9e2c0e083b398b4f793c386200974a8a6ecdd985a35de96ef0c0b473666a581102a781b717a6229849948557b06732d63d3519fab42d09e085ce9c2cbdee7b

            • C:\Windows\SysWOW64\oicuxxdx.exe

              Filesize

              512KB

              MD5

              33d2fa6fd6cc756a23361885daa965bc

              SHA1

              966dffd618b6304a3ffbc0576e0d50b09063ca35

              SHA256

              0746cf6cb109ec1a748106a542f34023777effd8ef53a7e8c0fdd28eb57c486e

              SHA512

              cd823574fd57333a1efee2c551aae14817d53d55648120c96b95dc13c70373b9dfed3efa8c3acc2043ab222336c57e6853040917b37603a6c7702b04c6adbaef

            • C:\Windows\SysWOW64\oicuxxdx.exe

              Filesize

              323KB

              MD5

              eb038d10358203a7c35ef4424755e06f

              SHA1

              db9d1f026393b3978098e622eb112f983ae61d68

              SHA256

              67abbde65b5ad463d3290768c0fea265b54d95e9701ed1a9ae2a2ed286148988

              SHA512

              b4f6d977879e88026ac3020152c9b3062444d6c1ded90f3ffb84cbb62a8a260d3c442e74dfc4316dc4d2b7a58cf800e4aba5f5a2754df3a4e8b4ef3a3b35f0fa

            • C:\Windows\SysWOW64\oicuxxdx.exe

              Filesize

              293KB

              MD5

              a7666019761e2f675f35f82b242a54d3

              SHA1

              0d683bc0bafdb3827e625ffc6fdd2981b39980db

              SHA256

              d828b506685f391f9fd9343cffcaadacf1b6099f473db25eff24ee282635301e

              SHA512

              aedffc154034bfbee68e5c5297e75f4f8653db82e8bdf59abd75eb4ea7b1905031c228ce00c398037a0f179bf6d702fec764dff9a62c9854fa9e7f60abb38aea

            • C:\Windows\SysWOW64\qyctqnedhzkwp.exe

              Filesize

              477KB

              MD5

              28910495a61e18a0f794e5d65626c43f

              SHA1

              0532457747b50887381a67370263d5a3838cda43

              SHA256

              9bbf1fd2735b2ea8e09d93e7dd2a78ebba6f1db7b5b984a267311681c55a35c0

              SHA512

              5a8daea2fc789e183fee9d602dbb3e5651aefcab0e64db59118717b4ead803d0cab43d57cc1f5aef0638bffa2210022cde3a601da5f4778f147e6ba2e896d832

            • C:\Windows\SysWOW64\qyctqnedhzkwp.exe

              Filesize

              402KB

              MD5

              4a96cd64755deb7c93fed49023161ea0

              SHA1

              159660dbadc1ac4c572a3bfbf24b44156eabc8dc

              SHA256

              c8bf31b0d162f5edcfee61d1ff4ee8c37d19c726f96c97e6a38d80b7f8b3a11e

              SHA512

              5c286824b7f7d15d0365b9e59cfeee3eb1877df5a5aba1b8bc0f722ef4e11cc746a68aaf2363d04382aabc9bc773427248b15e4cd4293d1853b3d3bd32fb0926

            • C:\Windows\SysWOW64\wdebdlxjbsiflgx.exe

              Filesize

              341KB

              MD5

              230a7bd8c21ddd8a6c40f21639ab6cb8

              SHA1

              38035bdf3b435c0252bb53681ca57616c9697d8d

              SHA256

              0d5c4dfd74910ae8a5466cbd8304230b2d5da48ff60ddd27efcae1259adb6df7

              SHA512

              eb6a036c21e77ac2582671a73ca169a22154ec091c479ca144931e82d004e9c0c7576088bc17d96add5f73871981cc3f9068116110972125d6100857549fafa4

            • C:\Windows\SysWOW64\wdebdlxjbsiflgx.exe

              Filesize

              423KB

              MD5

              ab00a598c3461fd0719a8cf97e677c88

              SHA1

              ae9f4580c66e6445cd347637c893df2598bd8325

              SHA256

              6b67887457e56d0961c990b4c284f221aaa40222a081ebbf4f7e280cae41a51f

              SHA512

              3eaeac178e68baf5a0e65f077643ec44e198ea8c6f290b5eab2bedfe6310421612f8a92047a66edb7db8c4aa5300ff60398627735bd999aeb563908bbaf6819e

            • C:\Windows\SysWOW64\wdebdlxjbsiflgx.exe

              Filesize

              28KB

              MD5

              20b09eba998650c33a2d7ebac070d9ff

              SHA1

              944b807618c4c484e3eae7c85cdf5d174e5d03b5

              SHA256

              be3a881b2cba63dafea7bfd23e108f1b5576dfefecf16842445fb1951541404b

              SHA512

              ca1b48ea7ce524dce43014a9b4036d207cd024a6f6f48bd354e6a67c64dcb027b97cdd113be5afe9194bf423cf9d2e6e97c04137ff1becab83d5e3720cf62d49

            • C:\Windows\mydoc.rtf

              Filesize

              223B

              MD5

              06604e5941c126e2e7be02c5cd9f62ec

              SHA1

              4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

              SHA256

              85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

              SHA512

              803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

            • \??\c:\Users\Admin\Desktop\ResolveLock.doc.exe

              Filesize

              23KB

              MD5

              3a709379e59c8d4ff6f3f301fa430d80

              SHA1

              83e854656ce8d119f2a5e7dfa58b858d3077d7e7

              SHA256

              1ec2dbb0b32145513c9a958467aa7e1824dc41c43d7bf9119a407a04bbcf423b

              SHA512

              9e2632ade77f0bcfb398c62375e042a6b9e2e5a206833e4d02800076abe4c194bd67e03394f6c71369a6cf24cc0dda43d9207ed2fc4914bd26804543e6515e9a

            • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

              Filesize

              512KB

              MD5

              d8247214d1fb1b94a38ab45047a2ca18

              SHA1

              a223a21d475bae47ad8cf4a2f20302316cca5155

              SHA256

              0e1cc44c1b4c01c3b58dd2cf3e3492308a8cc64ead45f5aef44dbd99e9d9ca21

              SHA512

              80060f947a7a8e4d85d8a85c9f7f2f0aefd3a72f2b1fa76b4e3d4f27c142542ae26315940056ec52eb77bdc361d8f2ce370ba9df6439e4b67b4b8d096c31f6a6

            • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

              Filesize

              6KB

              MD5

              b944b01f42362732a6608fe1300dd9d3

              SHA1

              f8110d3cec3b87d9c5d4ecc774cc576a742138b9

              SHA256

              cc0c5f56bbe37ef240197cfb8d539c39947c306bdc6ef5a1c448218421de20b1

              SHA512

              0a20fb974b5705969b65d52425cf426c614e03a9af09930200261f0616df36e9db252805b536d046773484e7cc85b088532d2c5048b5226464d4273c97c05877

            • memory/4372-0-0x0000000000400000-0x0000000000496000-memory.dmp

              Filesize

              600KB

            • memory/4816-52-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-49-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-42-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-46-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-43-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-39-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-48-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-37-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-50-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-35-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-51-0x00007FFB70D90000-0x00007FFB70DA0000-memory.dmp

              Filesize

              64KB

            • memory/4816-53-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-56-0x00007FFB70D90000-0x00007FFB70DA0000-memory.dmp

              Filesize

              64KB

            • memory/4816-55-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-54-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-45-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-47-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-44-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-40-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-38-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-112-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-113-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-114-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-137-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-139-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-140-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-138-0x00007FFBB3030000-0x00007FFBB3225000-memory.dmp

              Filesize

              2.0MB

            • memory/4816-136-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-135-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB

            • memory/4816-134-0x00007FFB730B0000-0x00007FFB730C0000-memory.dmp

              Filesize

              64KB