Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 01:24

General

  • Target

    49166ed9fe1b1d7cb9114196bdd92c8f.exe

  • Size

    512KB

  • MD5

    49166ed9fe1b1d7cb9114196bdd92c8f

  • SHA1

    628a9a57069d6655cf1d1b920a3681d18d2dad07

  • SHA256

    7b83d7b3bcc89e8adc45e834e13137e2d1ecd08952d5888a51317f1f194bcf2f

  • SHA512

    2588e7c513ece4062d97a5187194e05a49163443642e6ef234dd4955e2b7c33100053fe0291cbbc45d63866fdb36664ff3fc46efb2f19d678b16fe773ad68856

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49166ed9fe1b1d7cb9114196bdd92c8f.exe
    "C:\Users\Admin\AppData\Local\Temp\49166ed9fe1b1d7cb9114196bdd92c8f.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SysWOW64\dupirqgzpn.exe
      dupirqgzpn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\ndhmkejs.exe
        C:\Windows\system32\ndhmkejs.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3964
    • C:\Windows\SysWOW64\yywawnbnuwhawkq.exe
      yywawnbnuwhawkq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:768
    • C:\Windows\SysWOW64\ndhmkejs.exe
      ndhmkejs.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1132
    • C:\Windows\SysWOW64\cnysatwyavcwv.exe
      cnysatwyavcwv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4988
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    64KB

    MD5

    c62a4f7736a8742f646b37f2975a4f45

    SHA1

    5f95ffbbe0fb1860ff5d26b49c17888d00cecb7a

    SHA256

    82e0680b15a7f0be81083020c3ac7a9a34279bfa9d6a81766ed65284f923a131

    SHA512

    7de0c3467588ce14f7e9a6a49c377c93b1358e6ae53b9417c6e6a0ec380bbaff6736a473d51872cd5145e5d6cff32f79df09eb540225fc02aed56ad579801f6b

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    0c59a5f4b604bdb95d678de25e7be485

    SHA1

    b2f63dc74e24096cfaec01add4039bb6b4221650

    SHA256

    4f67992a112a96b5f8fee2357028d149d02be8c07cfff8b729fc33ad27ab5561

    SHA512

    9e31d6948d8d5d1ad4b8ec7ee4910eebda596ca73fd23dd72401e400c661b993b04ce907aa796597773feb9ef6f598b0c852b091996ec03d6bf69b74d5054e4b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    00257a173488ac196decf11fbef8b229

    SHA1

    9d91912227764358c17a84133741a78774d3bafb

    SHA256

    34ca57e395c54cb8c45b76e2eac6ae9625c6ba470fcc2cd3365b3c1784007199

    SHA512

    fd3df29aa2fc245132c2582532ea0442585ccf30836c748bf86b5f8a5ad7056f5c2f249bb5ce57aac0d1a1550138e7cee521b10584f2c616c1410201cf8ea3fc

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    e9a2d23cb3ab3a513970d9680a1ae02e

    SHA1

    773fffdf33b61e33aa2020f3b57ed00f943ca403

    SHA256

    c610e0578f95dca585eea015c7417a7df0e686bd5fcead8d2a78241ac406d206

    SHA512

    c2d61bb20a77099e2dc7de740d59c80a9bbe1d5da950d5912cf03394746d47e473997278b384efbb94aed2bb090b0308a44734a7fcfcce1f69352dfaaadf10a0

  • C:\Windows\SysWOW64\dupirqgzpn.exe

    Filesize

    406KB

    MD5

    3eb8df6e87c9760ec9812d69bd4a2727

    SHA1

    9831f9b1bbf81ba234259e797b4a19e48c28ad92

    SHA256

    853d822a8b268e65c3ddd1d1d6b48f94bf5c5bddee9786758fed94c9f8afbb9c

    SHA512

    fb611c6172069e1a69660fb904b0dbfde5cc466d718937d1fbce5891f91ce7d3daba62be876f771ea8d8895aac0267e50a91607392fcd5ee7d94d7c066254376

  • C:\Windows\SysWOW64\dupirqgzpn.exe

    Filesize

    73KB

    MD5

    4f77c97a33cb1e23c8c28b5efd81b6d4

    SHA1

    72bceadf5dd05e073dfece803bb90025e40f6603

    SHA256

    6d9ce7390f53fc3e4e48e39cc87135d8d7712b8e87d96fd9688be6aea48b5b84

    SHA512

    165d80dddb8c608863ea5017d287aab072a4ca323099662e9349ba4e58b557c5f89e709bdeb7de412f54bb4117708356f1edc72579e5ac3b67fc4e36917ccf3c

  • C:\Windows\SysWOW64\ndhmkejs.exe

    Filesize

    35KB

    MD5

    83835fc12ca0468305aa25331db53132

    SHA1

    10c85517ce91c8c944f040271bef35d97ba06e23

    SHA256

    4ca8c02664c9e93a3e57e2bce5d889361f1b1b0b111eaf1c860a2952809ba533

    SHA512

    d51b9ab0250ffd16cfe711253a2355821b8a5deff09921e660d06246f1c726ea3bd56a52e1cfb79eac65c852b80fdffd13224d42d6f1c27800551923a63194d0

  • C:\Windows\SysWOW64\ndhmkejs.exe

    Filesize

    13KB

    MD5

    4c83d6706938553f7fa57c6fa0588b88

    SHA1

    bfd32507f59da6f8ee7129fd76c569082f0d46eb

    SHA256

    266ed44f966fd0e2b2aad375bb0db50816370ddc530cb79ada555bfece5da14a

    SHA512

    60e30aac6b4ea084fe7d22ef187a6277d7ea527f9de928fba3206401fda632bdf2bc32637ff4f752e5677cbd446371abba3b62a9c8f9e125568ea5bd1fe75f39

  • C:\Windows\SysWOW64\yywawnbnuwhawkq.exe

    Filesize

    297KB

    MD5

    f51ca4d30a116dd8b0686cb3b80a38d4

    SHA1

    cdc82562b561600c2c826681058b15fc1dd78727

    SHA256

    e010993fd6e3922e870d42302151abf51d67a544dca334895c991dce2037a498

    SHA512

    1476ade734ee496ac0b285a181b1b57c76869bfb21c98af579322beb622dd4d289f0c8b510705b1f69aa79d872e894f826d38f1833eb9deaf2dca76fe81a23a6

  • C:\Windows\SysWOW64\yywawnbnuwhawkq.exe

    Filesize

    512KB

    MD5

    4e6d379751276fe88d7c19c1b4e8d714

    SHA1

    8c2e1f9cf9fda147604d8f154267404c57d6c660

    SHA256

    845ce7e269edbbbe950f5ea07fde490b0893cd7ce41148850e82436ac41364c1

    SHA512

    ff38e0ed186267cc9aeb25858eb8156c97100b379544e30b787e5a313f2dcf8b095233a35299b289fc9651495b8cbe0699c4b70ed9ddc2a2977d630f5ec51c81

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Users\Admin\Documents\MoveSuspend.doc.exe

    Filesize

    512KB

    MD5

    9c1f8a96db43e108b7c1ed2a0e8ba36b

    SHA1

    0d0b27a949f393d417ff20398c6bbfd3ecea937d

    SHA256

    c23278e3d40413555b5f3c91595b604f7349b20a21000dcd43a89853d5f87b43

    SHA512

    fbb739002339574c86d66f9d30758a803df7f313093b92bd4da33c0d6bc3af0061060b84c88b5c9ed43e493de4ea7c7ce6db96f38e02e8792fce5bc663b87e7b

  • memory/1140-43-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-97-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-36-0x00007FF89B1B0000-0x00007FF89B1C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-46-0x00007FF8989B0000-0x00007FF8989C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-47-0x00007FF8989B0000-0x00007FF8989C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-37-0x00007FF89B1B0000-0x00007FF89B1C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-39-0x00007FF89B1B0000-0x00007FF89B1C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-41-0x00007FF89B1B0000-0x00007FF89B1C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-38-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-42-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-40-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-87-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-91-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-92-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-90-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-95-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-99-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-100-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-101-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-103-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-102-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-98-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-35-0x00007FF89B1B0000-0x00007FF89B1C0000-memory.dmp

    Filesize

    64KB

  • memory/1140-96-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-94-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-93-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-89-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/1140-88-0x00007FF8DB130000-0x00007FF8DB325000-memory.dmp

    Filesize

    2.0MB

  • memory/3604-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB