Analysis

  • max time kernel
    13s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 04:57

General

  • Target

    560d6cd1b5204f3ed86260fcbbd12665.exe

  • Size

    512KB

  • MD5

    560d6cd1b5204f3ed86260fcbbd12665

  • SHA1

    b17b2cfe9380688340d92545c84817d693adce88

  • SHA256

    b3db3a2d7648aa94616e60e2d17ba63818a73127cdda7f53eaf901c0a258dadd

  • SHA512

    4863b5c0390fa4315891d906820fcc76ff9dfb8921ea00ad2f0a5bee3fce8681fad5923fb4a3ac9ba3e28feff8e84b28fb44f9efea48d3423000c04285441481

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6f:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm54

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\560d6cd1b5204f3ed86260fcbbd12665.exe
    "C:\Users\Admin\AppData\Local\Temp\560d6cd1b5204f3ed86260fcbbd12665.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Windows\SysWOW64\xcdehhrkks.exe
      xcdehhrkks.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\SysWOW64\scpynfkh.exe
        C:\Windows\system32\scpynfkh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3320
    • C:\Windows\SysWOW64\hcwntzhbggmnw.exe
      hcwntzhbggmnw.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:944
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4304
    • C:\Windows\SysWOW64\scpynfkh.exe
      scpynfkh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4484
    • C:\Windows\SysWOW64\gvuhjmxhfthqudl.exe
      gvuhjmxhfthqudl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          2ed05ee53432515a234fd1eab1285483

          SHA1

          119db267ab9ffee7dda052cd8a542a308ced579b

          SHA256

          53e75fb4092f89d90cb587b7928330d4aee41ff88eb0fd658eefe800ccb26250

          SHA512

          b22932faa091396eae541ecaea810047ae9b18891bdfce42459232abcb34561b7d47dd7a520ad13e7c4934219b37d48f1222891254129b86a7a87bbe189f4dc5

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          7acafb5dc2d8b8c2041fa670052a13fc

          SHA1

          6f004751a418314ce88f49df9884e18ab49fe0d1

          SHA256

          b62779c9a33a7647ee3fb2cf943d2845aeabc9548f5b2065ee9c5d675ea611e3

          SHA512

          dc13cd257653f2e22c697d06692c00c9f8fb4f915524d977f3086077315971bf46ec4d41268f16c836eedc59aca5a5c43c764173e84585fa7f32ada7fc176d07

        • C:\Windows\SysWOW64\gvuhjmxhfthqudl.exe

          Filesize

          512KB

          MD5

          6bb2d0ec012aeda822935951c82a6c51

          SHA1

          4eb8c6378830d70270d62fd3708bff9a7a0e1965

          SHA256

          92d9ff2128cedf0531d27ccc570ec20db33da90c574311537959cff97455d3b1

          SHA512

          80ce1eb3b2da5b4faf338ac76fad3a92884bb8a8b1bf45988adc3c16f8bfaebbfa57807b99c7b9961779533ab485212fe509eab75dcf17282666feab266d6abc

        • C:\Windows\SysWOW64\gvuhjmxhfthqudl.exe

          Filesize

          391KB

          MD5

          b794cf5978f026c541a9987612ecc397

          SHA1

          9f4e5748fefcf1a75d5983d1b4d27072551d0700

          SHA256

          2dd06051b96d775d901faabbaeb34158d812650925da00087f215987b5f6ce90

          SHA512

          9afb687a0dc345b2bf470a933f88c985f6c11d7d157ed29aa25bf88fb7171008a40af739d3299a60ab46b0ea5f537c9e016fff6e25e4ff334dcbef47fd590668

        • C:\Windows\SysWOW64\hcwntzhbggmnw.exe

          Filesize

          381KB

          MD5

          30aec9e0b33fbd99234328357879f812

          SHA1

          3c9d37139d4ccfe2b694afba9633170d0f510a92

          SHA256

          15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

          SHA512

          2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

        • C:\Windows\SysWOW64\hcwntzhbggmnw.exe

          Filesize

          389KB

          MD5

          456755027a97317d437578c9e4b18007

          SHA1

          4273bc918f07b287550025b3f36025ef11dcf4ce

          SHA256

          44095f829506dd8592d3f6902898ede550b667aea0042ed50408f09aa03af637

          SHA512

          758325ecd1f1da2baf234fdc93bd6ad0940dec3d5dc42ea208db1d781b80069c552161e8c46eddf4bdf1faa301c243bc3b1dfe2f1ca71dca6d2de1e4fbdcfedf

        • C:\Windows\SysWOW64\scpynfkh.exe

          Filesize

          512KB

          MD5

          c67902baaa45113c6f5d185b9c85a9eb

          SHA1

          ff6f9874b58786f2b68dbd39b9241efd3e0d029f

          SHA256

          19a5f1ef49782fa5b0709e1dbb14fd40a3778b81c00ceef7d7b479a1f71b2059

          SHA512

          9d041446cd3198d829daf9c0aaccf7982356f0c4256e404eafb263c1870b9471aa65231587dedd79d04c826334bafca665001e2baef125ef6ac08f11241a8b77

        • C:\Windows\SysWOW64\xcdehhrkks.exe

          Filesize

          512KB

          MD5

          9be47e3c2150966a2552714ca783b587

          SHA1

          4116616c16a2b50741267a823f8e65fc9ed39a9f

          SHA256

          161548f15057df96ae143e38f3ba80773030c7f7f1fa2ff003f23cabeaea6349

          SHA512

          ff70d72bbed3389cbc3f49765633df2d386a4846e7fc35859b6739bdee2496601596dea0975b0b031cf2eaf5792c11857b2726f70cce298930eecbcddf239640

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          da3a6ed36a95b6561f73580410fa0daa

          SHA1

          0510e7d77aaf764766456955165ec371e9ca3d70

          SHA256

          23debe6ede5d26d2dffc82ac15ff03241e228439886e99b0c6739465e44ea33e

          SHA512

          d975f6297b8ebcb266a0de14485ab608b0016cc4cbd77940178f7a148deabfea9710fc7b3b65235c6009a6689d6087e3c324bae3ca37d08a825b8fd7cc62a3cb

        • memory/4304-39-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-37-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-46-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-50-0x00007FF847DA0000-0x00007FF847DB0000-memory.dmp

          Filesize

          64KB

        • memory/4304-49-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-51-0x00007FF847DA0000-0x00007FF847DB0000-memory.dmp

          Filesize

          64KB

        • memory/4304-48-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-44-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-45-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-42-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-38-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-47-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-36-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-43-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-127-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-35-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-103-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-104-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-105-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-131-0x00007FF88A5D0000-0x00007FF88A7C5000-memory.dmp

          Filesize

          2.0MB

        • memory/4304-130-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-129-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4304-128-0x00007FF84A650000-0x00007FF84A660000-memory.dmp

          Filesize

          64KB

        • memory/4908-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB