Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 19:42

General

  • Target

    38d914ea8a2db1db39b99f631afd18a6.exe

  • Size

    512KB

  • MD5

    38d914ea8a2db1db39b99f631afd18a6

  • SHA1

    4f390474abdc0fb1c4dd0bcbc32a9d53bf6dda14

  • SHA256

    de2a8a00f6b23bc44d6e26fbfbb2858d811cc01d86c2e72998a1eda8d8986612

  • SHA512

    6ff3560a3203d22469098485f7e0f6d086dac22a240cf1d1e1b0f395b3d621d6c8f066a0c1abbd5ce3f9843bea11e8f791bccc3e52730efe324a12129306fcb1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6+:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5z

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38d914ea8a2db1db39b99f631afd18a6.exe
    "C:\Users\Admin\AppData\Local\Temp\38d914ea8a2db1db39b99f631afd18a6.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\SysWOW64\xryotfcrhi.exe
      xryotfcrhi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Windows\SysWOW64\dnefgbtu.exe
        C:\Windows\system32\dnefgbtu.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2964
    • C:\Windows\SysWOW64\dfkkvaqrcvweave.exe
      dfkkvaqrcvweave.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:440
    • C:\Windows\SysWOW64\dnefgbtu.exe
      dnefgbtu.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:32
    • C:\Windows\SysWOW64\tzqdtzeufxkzt.exe
      tzqdtzeufxkzt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:948
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    a1e3e6046340ceef73b05b6ce768bf8e

    SHA1

    159028495ab267b63eace9df8bfeab621d4e4231

    SHA256

    dcbfcdd7760508d83097ea8e2380a298bcc8fd3a3e8773966ae584f236fa790c

    SHA512

    2f104b4629f4d2163bf4ae6d85481ceeb2085b53b4dfb1d11284dca0bfb53edebb8de01c67445effcb1ccdb8394c56db71f19f6502dd60af31a681cbb885025e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c4c2698f54c152e52f66cc5766b73bf8

    SHA1

    e07e624d86f3300c7b5848e6deb28a2a6d567b66

    SHA256

    41456daf7cce2498e2cd2c8d1d491111b98e5cf8d323cdc490e1d7bd525d7e04

    SHA512

    634042ab65fd920abbb5193e7fdc8fc68c0fd20ab498cad4483874dc61404369aa1404371d74384b06558858aa18c7378974d458ebbd40c426dfadfedd4f83e0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    f9113a1ef27b9be7f362f76a35ca8543

    SHA1

    8b103d98ff8085bc66f22d3067daacc875a78feb

    SHA256

    32f7b531df3130a165077c4c7e5e63b21ef7b8aa97882c5de4831ecf202b111c

    SHA512

    694661b03a5df909b8f1e8736aa799b8d6c96e86b41a36acc5514b4429441b640846588881ac07eb2a99214a0072bc66bed881ccf82993d237ecc8f6a048c6cf

  • C:\Windows\SysWOW64\dfkkvaqrcvweave.exe

    Filesize

    512KB

    MD5

    6347f891db2d4f0fa56d0a418dfc3778

    SHA1

    682aa7ef043479296d08a68a1c1cf9933849dff2

    SHA256

    005bfdb1421fac74ebd3a26bcd236b4182c4b08e840fbc1c82e0782b0c9d2a28

    SHA512

    6766985505a78a081943306b2b46272935830045f1f2a387b2afb83243fcb41c3eeee282199f2477da0fb48c7b7718b7829c8bd04581e4cb0f2162970ea191ef

  • C:\Windows\SysWOW64\dnefgbtu.exe

    Filesize

    512KB

    MD5

    67090df5c2246d614f7fd6b051bb3049

    SHA1

    622e25ec609409de4646f7a6c7dba69c35f47404

    SHA256

    8a6825730397eb76be022a10b658a812fc20eea934cc96d8d0a5b5594e15670b

    SHA512

    9ccdaa3fb80944ef6d2d4166f825aa04da3bc276a424b024609b326d14c579ab2853a91450e4e1ff84728ac42733bd80354d2b2eb24ca97300fcd2c56ed7e2bd

  • C:\Windows\SysWOW64\tzqdtzeufxkzt.exe

    Filesize

    512KB

    MD5

    1ac12de53cf7aff077a688a568fb698c

    SHA1

    afa6dd188bb53d96653458178e15361739208893

    SHA256

    fb78d67df8926f384631b847a7bc637e57e9bdcf2a968b57e3fce908b2f6e453

    SHA512

    60b0129059dc4ea225143fe9d02fc7a128fc7b1bf7167be0c88c6a7513792275d7597c842c652ced350a796d1c65b35cf456d52a5429b188f5fb7332b87b9d0d

  • C:\Windows\SysWOW64\xryotfcrhi.exe

    Filesize

    512KB

    MD5

    1e36169c5abb764b7e577457ca40db89

    SHA1

    b079ffa4ff4819e7cfe2502a4f4b9b8b41846ab3

    SHA256

    1d7f7c2f411b32e85d894868d5cbee795089569f034cd9b50c9f9a9cfc29a795

    SHA512

    cf777a9c1886200975886b26d30444064084a7f17ff9871de132c75582ed20032ec0f17e3ed7c2824bc94817640571c10f6a2185b6799dbec014ebdaac005a5b

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    0f580b917bca075579d854b16415086d

    SHA1

    934a8038dd6724a061ccdc06a8d34edf71a50b36

    SHA256

    68e8653c879ffcb34e5acc205cce9c836ea99ae0570f63081683a7efcf939ead

    SHA512

    830a9b625e1966ef4fce152ceb9dd44d6debbdbe83247fe341eabbcc9e9b5ef418cc4f036a1d1e897cdcabdbab72a0f165cb64e7c1518bb137d537399e530ffd

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    13dda3bb8908c47ceac19f7c8060a3cd

    SHA1

    18edea9a1fb764ab9f05b0aada77540e2280dd6d

    SHA256

    6071f31e5536674f0043baef0b76e08497c2e5a98d486c3f85985d144e71861f

    SHA512

    433bab13b9bba7844f1d840623dcc2f3df41d87cb9a506578a7fe8686a84b92f06d52e6728926a69c5aad336d4c0b1fd822d6fa8cb99e1da15a052631f2e2507

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    477ba91a365b698cfaf09f3a1c285d13

    SHA1

    e23685d3e8912b6b56bca82982e50d0d34792306

    SHA256

    685e97f77522eac82c42cb3e70fd68b06c9f7d9a23ba7c070b0f0aed135eede8

    SHA512

    d9ce04a075468323114ef8acd8b0ed7e042c74f769cf2211e63f3e47af6beef0c9b5658eb58f2b99357fb2ad6dfa665075ed898d0e8c775b6e6fa98a76626cac

  • memory/2016-42-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-40-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-46-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-47-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-48-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-49-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-50-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-51-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-52-0x00007FFCA45B0000-0x00007FFCA45C0000-memory.dmp

    Filesize

    64KB

  • memory/2016-53-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-54-0x00007FFCA45B0000-0x00007FFCA45C0000-memory.dmp

    Filesize

    64KB

  • memory/2016-44-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-43-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-45-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-136-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-41-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-39-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-98-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-99-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-103-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-38-0x00007FFCE6590000-0x00007FFCE6785000-memory.dmp

    Filesize

    2.0MB

  • memory/2016-37-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-132-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-133-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-134-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/2016-135-0x00007FFCA6610000-0x00007FFCA6620000-memory.dmp

    Filesize

    64KB

  • memory/4312-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB