Analysis
-
max time kernel
0s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:50
Static task
static1
Behavioral task
behavioral1
Sample
39409cd656c0bc7567e2c8352dcc2236.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39409cd656c0bc7567e2c8352dcc2236.exe
Resource
win10v2004-20231215-en
General
-
Target
39409cd656c0bc7567e2c8352dcc2236.exe
-
Size
512KB
-
MD5
39409cd656c0bc7567e2c8352dcc2236
-
SHA1
0b4ded3b48affa28dfc075d3a56c6a8ed1ac9479
-
SHA256
9f93f8f5e71266c7001be5bfa04830fc68f8a697b014d04058d1cf5417c5fbd7
-
SHA512
d34208d2994a2a7314b2b0c16af693504658f3588bddbba4a31f5aaa75db37814b48584112d2a70e07a871852f7dbb1b90409eea6e5038781fdbc1aecbe3cd2c
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5V
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 824 nptegcoiec.exe 2144 bbwdandcvdeyhfh.exe 4944 awfenawv.exe 2332 gzvwvpzomvbeq.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3796-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000600000002322b-29.dat autoit_exe behavioral2/files/0x0008000000023225-23.dat autoit_exe behavioral2/files/0x000e00000002317b-19.dat autoit_exe behavioral2/files/0x000e00000002317b-18.dat autoit_exe behavioral2/files/0x0008000000023225-5.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\bbwdandcvdeyhfh.exe 39409cd656c0bc7567e2c8352dcc2236.exe File created C:\Windows\SysWOW64\awfenawv.exe 39409cd656c0bc7567e2c8352dcc2236.exe File opened for modification C:\Windows\SysWOW64\awfenawv.exe 39409cd656c0bc7567e2c8352dcc2236.exe File created C:\Windows\SysWOW64\gzvwvpzomvbeq.exe 39409cd656c0bc7567e2c8352dcc2236.exe File opened for modification C:\Windows\SysWOW64\gzvwvpzomvbeq.exe 39409cd656c0bc7567e2c8352dcc2236.exe File created C:\Windows\SysWOW64\nptegcoiec.exe 39409cd656c0bc7567e2c8352dcc2236.exe File opened for modification C:\Windows\SysWOW64\nptegcoiec.exe 39409cd656c0bc7567e2c8352dcc2236.exe File created C:\Windows\SysWOW64\bbwdandcvdeyhfh.exe 39409cd656c0bc7567e2c8352dcc2236.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 39409cd656c0bc7567e2c8352dcc2236.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1949C67F15E5DAB1B8BC7CE6EDE734CA" 39409cd656c0bc7567e2c8352dcc2236.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 39409cd656c0bc7567e2c8352dcc2236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33342D789D2D83236A4476D370522CD77DF464DA" 39409cd656c0bc7567e2c8352dcc2236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACEFACDFE6AF1E2830E3B30869F3992B38902F04314024BE1BD42E608A2" 39409cd656c0bc7567e2c8352dcc2236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FCAB02D4793399853BFBAD33392D4B9" 39409cd656c0bc7567e2c8352dcc2236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8FFC8D4F26826F9045D65C7EE6BDE2E144584167456344D6EC" 39409cd656c0bc7567e2c8352dcc2236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08668B6FE1B21DAD178D1A68A7D9013" 39409cd656c0bc7567e2c8352dcc2236.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 824 nptegcoiec.exe 824 nptegcoiec.exe 824 nptegcoiec.exe 2144 bbwdandcvdeyhfh.exe 2144 bbwdandcvdeyhfh.exe 2144 bbwdandcvdeyhfh.exe 4944 awfenawv.exe 2332 gzvwvpzomvbeq.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 3796 39409cd656c0bc7567e2c8352dcc2236.exe 824 nptegcoiec.exe 824 nptegcoiec.exe 824 nptegcoiec.exe 2144 bbwdandcvdeyhfh.exe 2144 bbwdandcvdeyhfh.exe 2144 bbwdandcvdeyhfh.exe 4944 awfenawv.exe 2332 gzvwvpzomvbeq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3796 wrote to memory of 824 3796 39409cd656c0bc7567e2c8352dcc2236.exe 29 PID 3796 wrote to memory of 824 3796 39409cd656c0bc7567e2c8352dcc2236.exe 29 PID 3796 wrote to memory of 824 3796 39409cd656c0bc7567e2c8352dcc2236.exe 29 PID 3796 wrote to memory of 2144 3796 39409cd656c0bc7567e2c8352dcc2236.exe 28 PID 3796 wrote to memory of 2144 3796 39409cd656c0bc7567e2c8352dcc2236.exe 28 PID 3796 wrote to memory of 2144 3796 39409cd656c0bc7567e2c8352dcc2236.exe 28 PID 3796 wrote to memory of 4944 3796 39409cd656c0bc7567e2c8352dcc2236.exe 26 PID 3796 wrote to memory of 4944 3796 39409cd656c0bc7567e2c8352dcc2236.exe 26 PID 3796 wrote to memory of 4944 3796 39409cd656c0bc7567e2c8352dcc2236.exe 26 PID 3796 wrote to memory of 2332 3796 39409cd656c0bc7567e2c8352dcc2236.exe 19 PID 3796 wrote to memory of 2332 3796 39409cd656c0bc7567e2c8352dcc2236.exe 19 PID 3796 wrote to memory of 2332 3796 39409cd656c0bc7567e2c8352dcc2236.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\39409cd656c0bc7567e2c8352dcc2236.exe"C:\Users\Admin\AppData\Local\Temp\39409cd656c0bc7567e2c8352dcc2236.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\gzvwvpzomvbeq.exegzvwvpzomvbeq.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2332
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4332
-
-
C:\Windows\SysWOW64\awfenawv.exeawfenawv.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4944
-
-
C:\Windows\SysWOW64\bbwdandcvdeyhfh.exebbwdandcvdeyhfh.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2144
-
-
C:\Windows\SysWOW64\nptegcoiec.exenptegcoiec.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:824
-
-
C:\Windows\SysWOW64\awfenawv.exeC:\Windows\system32\awfenawv.exe1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f
-
Filesize
512KB
MD5bae7e1fa45755d7bc558bb957fe63bc4
SHA1ac0f26c75204b62c75b3d1e4af3d6d8822b2bbcd
SHA25675fbf66d3e29b2b385145bdc79db9f40076d0d2a24c605f608a7dd3ba89003dc
SHA512f15e1f5ead0c719e8bfe5bb45d347d9971bacb334e83d8e96dfa75a605d40af094d6f371da1b24bbc164076fe88a5a522089640952ac26d2e546cceab687b84d
-
Filesize
382KB
MD5badd716c7c48a8241873d9251da496d1
SHA16bd2a072c8f64a1780fe75d983cb7b6584985c6d
SHA256ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7
SHA5127bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5
-
Filesize
512KB
MD58bc68f2eb02fd79ee998e23d54e73c5b
SHA129a4cb19e568eaf774387caa62106c09d3e49b7d
SHA256733a54453fd29062c631fc5f91d6835de7b6a6d7851635483c65c0c6e08aedeb
SHA512c9be46a3883b08705f515d6f59a018ba5ec50209797d3a517469b838e5e09dfb26df9bc38c0c6027da78e7aee3075506dc51d1eb46a3772fa0b50753b9bb10a8