Analysis

  • max time kernel
    0s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 04:40

General

  • Target

    54f3c113280b05d6b04095c2a62aa0a3.exe

  • Size

    512KB

  • MD5

    54f3c113280b05d6b04095c2a62aa0a3

  • SHA1

    1fbb8bba89a5d57c50361a25669d103909cf5c6a

  • SHA256

    f5c1e2b62ffa6bb8137f29183d4003b5053ad1234d90e372b5d2019bc29fae73

  • SHA512

    64c5b63e222a509dce98179b885bc44cddfd20af0413a557c745d1b9bed6cd70d1151601e9cdc4f315140b81b30b7d20e00b2df11dd49341a04e36ff4d5a1428

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
    1⤵
      PID:2712
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1664
      • C:\Windows\SysWOW64\zqlfzxyd.exe
        C:\Windows\system32\zqlfzxyd.exe
        1⤵
          PID:2352
        • C:\Windows\SysWOW64\ygghbyxrrlbir.exe
          ygghbyxrrlbir.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2548
        • C:\Windows\SysWOW64\zqlfzxyd.exe
          zqlfzxyd.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2248
        • C:\Windows\SysWOW64\fqbhpihtahsudkc.exe
          fqbhpihtahsudkc.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2832
        • C:\Windows\SysWOW64\ewnbronnuc.exe
          ewnbronnuc.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2488
        • C:\Users\Admin\AppData\Local\Temp\54f3c113280b05d6b04095c2a62aa0a3.exe
          "C:\Users\Admin\AppData\Local\Temp\54f3c113280b05d6b04095c2a62aa0a3.exe"
          1⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1068

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\ewnbronnuc.exe

          Filesize

          92KB

          MD5

          59ebf1358a9b829f5709baaedeeee6fa

          SHA1

          1409fd65da1b814db0a08feae54366dfca196f1c

          SHA256

          d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

          SHA512

          a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

        • memory/1068-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2712-45-0x000000002F8B1000-0x000000002F8B2000-memory.dmp

          Filesize

          4KB

        • memory/2712-47-0x0000000070B0D000-0x0000000070B18000-memory.dmp

          Filesize

          44KB

        • memory/2712-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2712-75-0x0000000070B0D000-0x0000000070B18000-memory.dmp

          Filesize

          44KB

        • memory/2712-96-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB