Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 04:35

General

  • Target

    5497b35568529d7d1a1b352dd947e9dc.exe

  • Size

    512KB

  • MD5

    5497b35568529d7d1a1b352dd947e9dc

  • SHA1

    939802285c3a1cfd5b9dc68dd0e9e15fef226a73

  • SHA256

    953174533c940387736d75bb4d02d9bf760502fbfa999c1da1f3e7a01f22896a

  • SHA512

    1aded16667f9b9110080af065221a6d37c571e131515651b743203ccd83154788c1cbedf5e0225fded34f1c778e1ec27137ee76f68dfa1f26967173ed578db02

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6f:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5497b35568529d7d1a1b352dd947e9dc.exe
    "C:\Users\Admin\AppData\Local\Temp\5497b35568529d7d1a1b352dd947e9dc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2416
      • C:\Windows\SysWOW64\dysvztkixxbqh.exe
        dysvztkixxbqh.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2796
      • C:\Windows\SysWOW64\nrgvtifq.exe
        nrgvtifq.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2164
      • C:\Windows\SysWOW64\pbmpwtlfyexdmva.exe
        pbmpwtlfyexdmva.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3052
      • C:\Windows\SysWOW64\ujggbfcrwb.exe
        ujggbfcrwb.exe
        2⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3024
    • C:\Windows\SysWOW64\nrgvtifq.exe
      C:\Windows\system32\nrgvtifq.exe
      1⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d3d864bf21cf6529beada0f3f0a9b1e1

      SHA1

      6d4abeacee794fd3bdd29f3f47d28f67510fb7f6

      SHA256

      364ab7f1c4e0a6cb38e27500b33e70972200eb8dcfda6e945aea8b1c1359d7a1

      SHA512

      f8e92775e03bc705526e34eb21b59a669e4d40b7a654bd1da0d062df2e4682ff1b7bdc07f5e49d908fac87feb67119c4dff4d1aa8f466713944c1f757e1681ae

    • C:\Windows\SysWOW64\nrgvtifq.exe

      Filesize

      92KB

      MD5

      6662b185f19fbf697c56a25c92de7961

      SHA1

      0df0c0df0de3724258df2549c583e3c934aca726

      SHA256

      c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

      SHA512

      c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

    • C:\Windows\SysWOW64\pbmpwtlfyexdmva.exe

      Filesize

      381KB

      MD5

      30aec9e0b33fbd99234328357879f812

      SHA1

      3c9d37139d4ccfe2b694afba9633170d0f510a92

      SHA256

      15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

      SHA512

      2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

    • \Windows\SysWOW64\dysvztkixxbqh.exe

      Filesize

      384KB

      MD5

      0e151ec3919b72f9a6c7fe60d10f4ea0

      SHA1

      91fb01badc6db9808233ff95abf39c37982a8c85

      SHA256

      f644299fe8f10c5f3e24c1943fc808270b5d4f853e2316abf091c8d18344193c

      SHA512

      41d25f82ce04a14c21d19a9ad2d12663714221b6ecb1c3ee579a4a134949de0bfb3e6212e9acf97d0659d50e7a034dcdc103ecbedd8a71fbfefdc30f5728c12b

    • \Windows\SysWOW64\nrgvtifq.exe

      Filesize

      512KB

      MD5

      8d33ad791d606e658250800f9a424c3f

      SHA1

      50790be546325862e03414ad881201bae9653cfb

      SHA256

      701acdc428f4713b5f8e753630f8a7f9d60136b707577d5c05651fef1bb99501

      SHA512

      356701b00e0d69bde1ea27bd5ceaff55aa37e7119d451e0dfa0a47da1dcce1cfbdeeab216563d111dea23db5658cac2f6bd1ac56c64e29c4ae6313c4a8813b00

    • \Windows\SysWOW64\pbmpwtlfyexdmva.exe

      Filesize

      512KB

      MD5

      3eb4ba2da6b8da1346842e1cee5f8fe2

      SHA1

      9ed8ba34703d7da3f89c5fe506ce311bf9063163

      SHA256

      8ecf4dc0ca4734abd13919b82adfc6af19421eeb905b1f042e14d549110e9d46

      SHA512

      b679c17ef6d37bae272a2b848e1e636e97f6828a9420b9ba5f7f2191cecbced3f5aba433fb703519e7e92f98990c068c1ad9e33edbd58cda9902ecd494a26526

    • \Windows\SysWOW64\ujggbfcrwb.exe

      Filesize

      512KB

      MD5

      829390a3d8e68086f85a42a8f08ebec1

      SHA1

      bcb45555d61415e39ea4b6c17b92246e48b3e329

      SHA256

      aa634d28bdf89fc22df72277da198778245b446908bc5b4fbe6db0f44d2283fe

      SHA512

      6ff144de24fc0efb872d9e6bd53db2bc51d85b85e9ec18d20e44d8811b78fd6a94ba6f402fb0feb95e50046ddd9dcdec2a4f7fcd93c8a214fba5b132b3f2250d

    • memory/2212-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2736-47-0x000000007155D000-0x0000000071568000-memory.dmp

      Filesize

      44KB

    • memory/2736-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2736-79-0x000000007155D000-0x0000000071568000-memory.dmp

      Filesize

      44KB

    • memory/2736-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2736-45-0x000000002F711000-0x000000002F712000-memory.dmp

      Filesize

      4KB