Analysis

  • max time kernel
    220s
  • max time network
    221s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 19:39

General

  • Target

    38a2dc78195df4e156b72471ebd19337.exe

  • Size

    512KB

  • MD5

    38a2dc78195df4e156b72471ebd19337

  • SHA1

    6c2df162ad502ee85d234584707463f284ff4097

  • SHA256

    4188edbf9808ff09f969413e1fca5b15774c9b28a09f4b21c94960ef2576b15b

  • SHA512

    d0681fc5acaf4d1d4e7b481b750bf94492d0b6adfb1004ee9abe62fe62d7661d5bbf999573d3c8c946ffc749649afb02c771d3e4229b46ac1a0c0a3222ad813f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38a2dc78195df4e156b72471ebd19337.exe
    "C:\Users\Admin\AppData\Local\Temp\38a2dc78195df4e156b72471ebd19337.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\SysWOW64\czffyfwqyi.exe
      czffyfwqyi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\hmyhlgfw.exe
        C:\Windows\system32\hmyhlgfw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4300
    • C:\Windows\SysWOW64\hmyhlgfw.exe
      hmyhlgfw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2928
    • C:\Windows\SysWOW64\rbpzmfpotgrsm.exe
      rbpzmfpotgrsm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3692
    • C:\Windows\SysWOW64\fvdjgmqthfnhcsv.exe
      fvdjgmqthfnhcsv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:628
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    84f1d4b7528ddefafccd0380341f2682

    SHA1

    7f922a82393efc7df8b9d921aff41375497932e4

    SHA256

    3e9420de1b2fb1ac630e833a5db7064aa2ee64c78134ba4aa5a7b7d91ef626f8

    SHA512

    9539572fc5ed2cdc01bc7a04144dce72bdac9bd9da19227f855a98dad2fb69ee7ee195ff5b7d97d5ea6e1ddfc284feaa0b9a957675b4951c02c3f5a082b4e4f0

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    83c1b234e60f88e1c0284b8de5533958

    SHA1

    894481f31ecb0ee09582246e083e5d053ef700c1

    SHA256

    a80e2b6e2f3ee0c3e9451a4197968b6b003ea598187f69b9288ee63de012cf7e

    SHA512

    1231369aa3db15beb021d724b9ab33e4d35160273ceddd5c1114c5698383ecd9d8f4839d303aca5169a6b8cae50d6d2d02c63a12e16940233f347e0d87be9bdd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    f5f219efcf259c0c15a0521bf15fafcf

    SHA1

    68b81f987dbe56b2c44e1c2b8ef4a9c078ea7a5c

    SHA256

    d72d7074d338c425e95ab938b674f45cf7afe1e96a1434d956df4bbd0ecdebf9

    SHA512

    d798ed0683b4bc7b025f5ebe96c8b557948bb7570a3ba7efe4d1844014e4415eead9c06db7454f2f5bc8a83fabea619173cea271cf12945b451c8f357c36ac54

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4504f34a23f9525f13cb7e347aae582c

    SHA1

    a16a424e8690849213c4a9f479494c79daadf4d0

    SHA256

    c9dd9f17ccc04875bdf7d9d217598fcb291f2aca4a80ca47328be5093f0331e9

    SHA512

    a9d07967d175c02d234dc8104221b462c6cb5eb9c9be031f84659951735613fd01a1d87521801ac5adacbee70ea52f78519ad85971cac046ac2eccb7e102d5e8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    1a66737efdb9df1d9ad6f3a47b728372

    SHA1

    3ce3d7cb19066adb740fe560594911a241a90f1b

    SHA256

    75fb8aca7e897de562817a4ee1f4fa6e0f7d64b8385aad548dfbf5150cc8b36e

    SHA512

    a7f5edc9eac7e7cd969a81181639e1fd89c828ad1fba0c2a980dc635b11fe4defcf6a61aa1ab4a34273ed250e95b34a23ffb38c251a1879cabe1887055ec9c46

  • C:\Users\Admin\Documents\LimitFind.doc.exe

    Filesize

    512KB

    MD5

    926a20681b7e112afa243d86945d654a

    SHA1

    8501a35c350f4e4b06d5b8340ac63401cbd2e407

    SHA256

    efd6427e8e8bc97f317eb198a3cc7b2e1e5ad4ee3fa1ed2c30d79bbd6b4eca06

    SHA512

    dfb2bffbe3013782ec147a815718d3b9e40b8d489b92f01d99a3c9f7a45dc44223c0003cfe1c3d80dfc75d41385dd51873d640659f6d23570ed7011af39c978e

  • C:\Users\Admin\Downloads\MergeReceive.doc.exe

    Filesize

    512KB

    MD5

    74d46cf31d2ea8b0978c006d8df7d3d8

    SHA1

    bd3eeb757b4425bc1a63fabeeacd0d40fcc11d3b

    SHA256

    7d1ae7ffa21d7208fc3f88f787a44ca1d6e495ca4967e03828c13858fefe85f7

    SHA512

    5bf413ec10f8360ca8623594a0fd4b2de4781592421e2bff35527a690788c94267939cd780ebe2dfed5a12b6d1d3cc0e2c3db03401b5456ba36af35f22085689

  • C:\Windows\SysWOW64\czffyfwqyi.exe

    Filesize

    512KB

    MD5

    191a223aafa98001878eb77222aab935

    SHA1

    2a2c8934115fdac4fc2bd3d85b2f8cf90f1d328c

    SHA256

    1af13c18aacc6b2d34e5ac0a749535c76e94d67079e1cf48ee817d86646425a0

    SHA512

    94581302eca1347525485ed3d7fdd6241bca7eb4e208c6f5b4fb156d5846137ae74456235db03c2c80bf7931b5fa07bb93777fa6f09b5dc3836a749d412389aa

  • C:\Windows\SysWOW64\fvdjgmqthfnhcsv.exe

    Filesize

    512KB

    MD5

    2d8667af3f563f13f0463d8943a31071

    SHA1

    0d8725c38161a2ce4e6e57dad477ea379a3a09b4

    SHA256

    7f79cf42c6c251ca02523d8795308401a9f7021cef7b8d7edb36872b1a7ce72d

    SHA512

    6ddff5e07273438bd345354878d53b9a4cd7ca51dfaa61508eef863790ed1f20b4eecede52d92433740979da50700e1d4a7c6bd31ea41285afcf2b58a4096c2a

  • C:\Windows\SysWOW64\hmyhlgfw.exe

    Filesize

    512KB

    MD5

    e504efc130209aee40b1fa915027a23b

    SHA1

    14b14c3eb0dcbe0fc3e7205bbfd2d1e780eb08f7

    SHA256

    6807030e6242512ddb21afe57e7d0d12f5904b182afe8c6fb7ff89294b72ce76

    SHA512

    7997983f9be0e59c371cd10ebb04fa40083a6c7c8b720a8d1894c3e8f6db81f85d5aefbe811b0c76e1cbd62b130140c68542bb919fc20266402c5eadf5a920f0

  • C:\Windows\SysWOW64\rbpzmfpotgrsm.exe

    Filesize

    512KB

    MD5

    eaee7d2396abcf5962d95a4fbe290c5e

    SHA1

    13b765a42700c63d6dfb5dc3ecf738aae11e9820

    SHA256

    d83ae12c33f4ea43af528d01e1e364bdfbd031137f68c6f7273e438d34c02dbe

    SHA512

    04750d1cbc2f174e536bf2fcdfaab03e8e38b64d93a8f797f80b5c1dbfbf84c194364a437d1b5de8f0f35b50ce6f2f956470710f3d286fad0abd4e9ddf2a7d05

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    e993b00c2acfdedd2b492338587bb155

    SHA1

    733246b745e8d7fe3accd6104ca7e5b5d976a699

    SHA256

    efbdc4dd83a54f72973e21c7e10600c43e5eebb2ab64c98a4cda932cef66619c

    SHA512

    eb04708d45f0cf8a6ea0ab9b7f508802e18c7f8634b76c475c5de27f39cfa1b78f7f4626f0688650d5b355bcfadee941d0f73aab84e79ebf0178a32276135566

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    b02e300e02eae3c5508532301d2658c7

    SHA1

    e3b548de6310661972e204891beb5c00d2b19b2e

    SHA256

    9e45ea87cdc4b3bea713dd0e4cd781a9caaf01a1aeab57a95d323d7dd73a7e97

    SHA512

    e49d3d98b9025a4de98b31ed13a609befe39383a2c59e422426410b5e7d30d4b15c6d6d53cca77411f79e8c64d3d82c25ce369280e04edbbe8c77fb5690979f7

  • memory/4580-43-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-42-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-48-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-49-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-50-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-51-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-52-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-53-0x00007FFAB4860000-0x00007FFAB4870000-memory.dmp

    Filesize

    64KB

  • memory/4580-54-0x00007FFAB4860000-0x00007FFAB4870000-memory.dmp

    Filesize

    64KB

  • memory/4580-46-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-45-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-73-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-44-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-47-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-86-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-150-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-40-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-96-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-41-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-39-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-38-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4580-37-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-145-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-146-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-147-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-148-0x00007FFAB6B10000-0x00007FFAB6B20000-memory.dmp

    Filesize

    64KB

  • memory/4580-149-0x00007FFAF6A90000-0x00007FFAF6C85000-memory.dmp

    Filesize

    2.0MB

  • memory/4948-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB