Analysis

  • max time kernel
    0s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 08:57

General

  • Target

    61af06651ac02a7846d63c57cd2c4aee.exe

  • Size

    512KB

  • MD5

    61af06651ac02a7846d63c57cd2c4aee

  • SHA1

    b39cea0a6f536749d720f00a4cb133d2aaf55bf2

  • SHA256

    eabb9db1d4ac0369a4e3794908b0d639ab0e38de1d032e95ba80d8dbcde992aa

  • SHA512

    2a20fb679b68fd64d2ff2d8b16a2c32e42f1bcc148b0c4c56651352181f712ff056f051e68fa4ec86b5ad9dbcbb1de2688342db25f2c246212b4389a415b6c6e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61af06651ac02a7846d63c57cd2c4aee.exe
    "C:\Users\Admin\AppData\Local\Temp\61af06651ac02a7846d63c57cd2c4aee.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
        PID:2692
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2684
        • C:\Windows\SysWOW64\dllzhcmoghjse.exe
          dllzhcmoghjse.exe
          2⤵
          • Executes dropped EXE
          PID:2272
        • C:\Windows\SysWOW64\znvzixhz.exe
          znvzixhz.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2824
        • C:\Windows\SysWOW64\bvfuwgvtrkzilde.exe
          bvfuwgvtrkzilde.exe
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2296
        • C:\Windows\SysWOW64\eyivkoctyu.exe
          eyivkoctyu.exe
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Windows security bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Windows security modification
          • Modifies WinLogon
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2040
      • C:\Windows\SysWOW64\znvzixhz.exe
        C:\Windows\system32\znvzixhz.exe
        1⤵
          PID:2672
        • C:\Windows\SysWOW64\dllzhcmoghjse.exe
          dllzhcmoghjse.exe
          1⤵
            PID:2944
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c dllzhcmoghjse.exe
            1⤵
            • Loads dropped DLL
            PID:2764

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2532-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/2692-48-0x000000002F211000-0x000000002F212000-memory.dmp

            Filesize

            4KB

          • memory/2692-50-0x000000007192D000-0x0000000071938000-memory.dmp

            Filesize

            44KB

          • memory/2692-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2692-76-0x000000007192D000-0x0000000071938000-memory.dmp

            Filesize

            44KB

          • memory/2692-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB