Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
52e78e101a47d6085301c75037e86e97.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52e78e101a47d6085301c75037e86e97.exe
Resource
win10v2004-20231222-en
General
-
Target
52e78e101a47d6085301c75037e86e97.exe
-
Size
512KB
-
MD5
52e78e101a47d6085301c75037e86e97
-
SHA1
b295a4a2c6b85a2723df7b86e0d56bb57227ad65
-
SHA256
1a3be8fd63c83795f1307fe15a19d1e97e82e58b2c98a87ef6a3394a19f91aba
-
SHA512
56d10d77bf5b5cb04f51502ca7003695117e56fbede58838018c5aa95b655a55bb877ed8c5fc558b6603f3a6a001e794942fc6be9ebd42396c4f88412fece91c
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj67:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5I
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2468 jjptlcgawu.exe 2736 mgncfboywcuyymh.exe 2828 lkpyebcg.exe 2712 yxjuoanpaathg.exe -
Loads dropped DLL 4 IoCs
pid Process 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/860-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jjptlcgawu.exe 52e78e101a47d6085301c75037e86e97.exe File created C:\Windows\SysWOW64\mgncfboywcuyymh.exe 52e78e101a47d6085301c75037e86e97.exe File opened for modification C:\Windows\SysWOW64\mgncfboywcuyymh.exe 52e78e101a47d6085301c75037e86e97.exe File created C:\Windows\SysWOW64\lkpyebcg.exe 52e78e101a47d6085301c75037e86e97.exe File opened for modification C:\Windows\SysWOW64\lkpyebcg.exe 52e78e101a47d6085301c75037e86e97.exe File created C:\Windows\SysWOW64\yxjuoanpaathg.exe 52e78e101a47d6085301c75037e86e97.exe File opened for modification C:\Windows\SysWOW64\yxjuoanpaathg.exe 52e78e101a47d6085301c75037e86e97.exe File created C:\Windows\SysWOW64\jjptlcgawu.exe 52e78e101a47d6085301c75037e86e97.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 52e78e101a47d6085301c75037e86e97.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33302C0D9D5082206A3076D370212CDF7CF265DC" 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB8FACAF963F1E3830F3B4386ED3E98B388028C4214024BE2BE42ED08A2" 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B12144EE38EB53CBBAD032EFD7BE" 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF8FC8F482A826D9137D75F7DE2BC94E133594666436336D7EA" 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7866BC1FF1C21D1D273D1A98B7B9060" 52e78e101a47d6085301c75037e86e97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C67414E2DAC0B8C97F95EC9E34BB" 52e78e101a47d6085301c75037e86e97.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 2468 jjptlcgawu.exe 2468 jjptlcgawu.exe 2468 jjptlcgawu.exe 2736 mgncfboywcuyymh.exe 2736 mgncfboywcuyymh.exe 2736 mgncfboywcuyymh.exe 2828 lkpyebcg.exe 2828 lkpyebcg.exe 2828 lkpyebcg.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 860 52e78e101a47d6085301c75037e86e97.exe 2468 jjptlcgawu.exe 2468 jjptlcgawu.exe 2468 jjptlcgawu.exe 2736 mgncfboywcuyymh.exe 2736 mgncfboywcuyymh.exe 2736 mgncfboywcuyymh.exe 2828 lkpyebcg.exe 2828 lkpyebcg.exe 2828 lkpyebcg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 860 wrote to memory of 2468 860 52e78e101a47d6085301c75037e86e97.exe 23 PID 860 wrote to memory of 2468 860 52e78e101a47d6085301c75037e86e97.exe 23 PID 860 wrote to memory of 2468 860 52e78e101a47d6085301c75037e86e97.exe 23 PID 860 wrote to memory of 2468 860 52e78e101a47d6085301c75037e86e97.exe 23 PID 860 wrote to memory of 2736 860 52e78e101a47d6085301c75037e86e97.exe 22 PID 860 wrote to memory of 2736 860 52e78e101a47d6085301c75037e86e97.exe 22 PID 860 wrote to memory of 2736 860 52e78e101a47d6085301c75037e86e97.exe 22 PID 860 wrote to memory of 2736 860 52e78e101a47d6085301c75037e86e97.exe 22 PID 860 wrote to memory of 2828 860 52e78e101a47d6085301c75037e86e97.exe 20 PID 860 wrote to memory of 2828 860 52e78e101a47d6085301c75037e86e97.exe 20 PID 860 wrote to memory of 2828 860 52e78e101a47d6085301c75037e86e97.exe 20 PID 860 wrote to memory of 2828 860 52e78e101a47d6085301c75037e86e97.exe 20 PID 860 wrote to memory of 2712 860 52e78e101a47d6085301c75037e86e97.exe 18 PID 860 wrote to memory of 2712 860 52e78e101a47d6085301c75037e86e97.exe 18 PID 860 wrote to memory of 2712 860 52e78e101a47d6085301c75037e86e97.exe 18 PID 860 wrote to memory of 2712 860 52e78e101a47d6085301c75037e86e97.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e78e101a47d6085301c75037e86e97.exe"C:\Users\Admin\AppData\Local\Temp\52e78e101a47d6085301c75037e86e97.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2760
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2228
-
-
-
C:\Windows\SysWOW64\yxjuoanpaathg.exeyxjuoanpaathg.exe2⤵
- Executes dropped EXE
PID:2712
-
-
C:\Windows\SysWOW64\lkpyebcg.exelkpyebcg.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2828
-
-
C:\Windows\SysWOW64\mgncfboywcuyymh.exemgncfboywcuyymh.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2736
-
-
C:\Windows\SysWOW64\jjptlcgawu.exejjptlcgawu.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2468
-
-
C:\Windows\SysWOW64\lkpyebcg.exeC:\Windows\system32\lkpyebcg.exe1⤵PID:2724