Analysis

  • max time kernel
    2s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 00:34

General

  • Target

    46be791e1d684cab3ce45b7a31636c1c.exe

  • Size

    512KB

  • MD5

    46be791e1d684cab3ce45b7a31636c1c

  • SHA1

    9c7f6c85a3d1cf8a961dba4119919ec1f4c6962a

  • SHA256

    1c4a8ad37745d67aa28d6244600bad43a2d69e6b5e6c761a7c996a4d1ce93a0d

  • SHA512

    5d54abd44925bafe0425300815aab177ea18eb7d3fc8c5963250d4ba6256297df15c66e5e51efcc0c87e9a05202b910c29bf338bac18a353eae9fe0eb1b6364b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5t

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46be791e1d684cab3ce45b7a31636c1c.exe
    "C:\Users\Admin\AppData\Local\Temp\46be791e1d684cab3ce45b7a31636c1c.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Windows\SysWOW64\bxnqzicrwd.exe
      bxnqzicrwd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\sudqvaih.exe
        C:\Windows\system32\sudqvaih.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3556
    • C:\Windows\SysWOW64\drgdcioimrutnll.exe
      drgdcioimrutnll.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4900
    • C:\Windows\SysWOW64\nhrrmnclnhbnw.exe
      nhrrmnclnhbnw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4612
    • C:\Windows\SysWOW64\sudqvaih.exe
      sudqvaih.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2892
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\bxnqzicrwd.exe

    Filesize

    512KB

    MD5

    5bf0cb21b0dbc8bc2789b93072660fdc

    SHA1

    f3d65959f3a7bd0749408e1196fad7457c149199

    SHA256

    f1d539bd481f45eb22b25411eeb2670d49c04332c3ad8c69b1cc42ced398442b

    SHA512

    2c860f353766957de143b20d8becd15aa0687df1f4012f47419570b41dedeaf0284d35f79899f6b36b5abc4466b0ba51329796fe03f40613fa9027f1852b9e57

  • C:\Windows\SysWOW64\bxnqzicrwd.exe

    Filesize

    193KB

    MD5

    a31008e1bf36948c5790f46d6a5b364b

    SHA1

    53e1bd64f986806dc72e3343c87b65f8afed897a

    SHA256

    0fe3f5e6e9138cafa7435072ebda5646c80f646add2cc306b55a468cd10c4886

    SHA512

    1474fa94a858054307521aa2fc7d0880d9ea131693643bf113304ee32d9a7b731a14668d2a2944bcc7e8b7644408bd98ac2bb7f305b0d74447cc13630fa63538

  • C:\Windows\SysWOW64\drgdcioimrutnll.exe

    Filesize

    512KB

    MD5

    8f9ce329ae69a4d32fab5dc29b509c82

    SHA1

    701448e62e1aadef97b29c7c64e7131b5917abe7

    SHA256

    195f9093e22f7034e17ce44a8cc9f36459c0de656593f9ba4439489ebcf24030

    SHA512

    555512f7172cade064fce1ad3e924ee54b26861fb74903b29de489d2e853d8aa58edbd782a59776cfb01a0828898f9ea49d486681d7c740d68b3076f87ca9f22

  • C:\Windows\SysWOW64\nhrrmnclnhbnw.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Windows\SysWOW64\sudqvaih.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\sudqvaih.exe

    Filesize

    386KB

    MD5

    d867a655ae492b330d5de03a1a554ca7

    SHA1

    ed3013d39ff6fe5e8431a2b229becd2e04926e61

    SHA256

    542bf8c10a61473225004305bf2a49d8ef5106f4ef0c62af504926db90c0edd1

    SHA512

    0b692aaa4d2d1d8b7ea6ac2e5b5b41884744a7bda3102634e5bb73b6a725caadada5f94b2759826e3dc354824055b183ecd35d47c0e9578082d3a05148f533dc

  • memory/1364-56-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-51-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-44-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-48-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-50-0x00007FFBF3810000-0x00007FFBF3820000-memory.dmp

    Filesize

    64KB

  • memory/1364-49-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-52-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-55-0x00007FFBF3810000-0x00007FFBF3820000-memory.dmp

    Filesize

    64KB

  • memory/1364-58-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-59-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-60-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-57-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-146-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-54-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-53-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-39-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-47-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-46-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-45-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-43-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-42-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-40-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-41-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-38-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-37-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-124-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-150-0x00007FFC35950000-0x00007FFC35B45000-memory.dmp

    Filesize

    2.0MB

  • memory/1364-149-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-148-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/1364-147-0x00007FFBF59D0000-0x00007FFBF59E0000-memory.dmp

    Filesize

    64KB

  • memory/3892-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB