Analysis

  • max time kernel
    199s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 11:52

General

  • Target

    6c455ae1a49319aae860e13541f6903b.exe

  • Size

    512KB

  • MD5

    6c455ae1a49319aae860e13541f6903b

  • SHA1

    f6737e61743aafaceb70abe8b728c4de0eeb202e

  • SHA256

    f0f527fc41c9985c610dd0cc583b07f0e1fbea589a0895994ab189ffdf22305b

  • SHA512

    0ed506f956f0dc09ae24f86cc79662a3ff9ac6c531034da5256a5d8768fcdbb7586b778979fc70ee7dfb5572908fb76a17018264a9b188c3d922b357f8455ca3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6d:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c455ae1a49319aae860e13541f6903b.exe
    "C:\Users\Admin\AppData\Local\Temp\6c455ae1a49319aae860e13541f6903b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\rzqzutomuo.exe
      rzqzutomuo.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Windows\SysWOW64\oyxyrwpo.exe
        C:\Windows\system32\oyxyrwpo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2320
    • C:\Windows\SysWOW64\seozvzgwkxmdeep.exe
      seozvzgwkxmdeep.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:892
    • C:\Windows\SysWOW64\oyxyrwpo.exe
      oyxyrwpo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4896
    • C:\Windows\SysWOW64\pjkrpgsjaxwzv.exe
      pjkrpgsjaxwzv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2296
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    5771304cfb72a0b5e94b243a12e79d5f

    SHA1

    c550c224d8c5eb3b097af86039fcf7e360df698c

    SHA256

    1bb95a35efc09e62b238598a35cb864a928f8cd812ee8cae199ea4ce10528bed

    SHA512

    b805ab8bf678d98301b16590cabd7c8109315e5b0e648d00f6f726f36b5b179698b6fd89ed3305edd8999dea6470d21aa208954dfca2a943fa8dab54ffb55f1d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    db51d2af76641c33b4e0af7023b46ac3

    SHA1

    af6cf107f346f7dcc85cae88821d343b4a1ae4ce

    SHA256

    58ca94754ab52a5900502fed82d8d3a7e64a607fe77f012b77e9c06ff20cc579

    SHA512

    21c345add6563bc3179077eacf07412f458d43c6b5ae4e9171707c355895fa9a52d58ebf4ec366c1dbd011ae835b3368a2a5a59b0006a54d09e8f1e2c46a9cde

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a27d9284332adea2a466cbb01b1bfe73

    SHA1

    4b1d40e685f6b254575712f2b5f4cadea6f54c66

    SHA256

    b3c06951e5e95b9df7a4d4f4f691b031eb7330dac6bb79810a4d677913f61201

    SHA512

    0a0ad48cb84e9967d54c36a5363111f463b99bb203c567eba7d5cae2808dd4bfc4d8fe931fd84b5cdcad4637c4d8f0d458ba1571076c0d91793b9e0d5fb8435f

  • C:\Windows\SysWOW64\oyxyrwpo.exe

    Filesize

    512KB

    MD5

    d24ec9e7e308d4407a0b755f24b0e19d

    SHA1

    1ddc2e038bad7633cb1f568ea15f89af07d1724c

    SHA256

    ef6c995c6626b141e5a5ba120f2b9feaaad3ba7e73bbad835379fd8ded3bf870

    SHA512

    71b9dac7bdeebbf042852635ace3399a6c35d2abc7280d11e6ac2dc3884c76e14badc84ecb1f15ecf134f0e948e32e25aa937a4da630f5a1791d8b5c3089d5c3

  • C:\Windows\SysWOW64\pjkrpgsjaxwzv.exe

    Filesize

    512KB

    MD5

    5c8aa2db1a6b893517cecdd93fdbb59e

    SHA1

    10e7ee750cbe271bb55d1ff016ef6cfa3b165bc6

    SHA256

    e83f0b78674a634dca8d541e05dfe03410c2c2523692645460c7b4d61189415c

    SHA512

    40f0d43b3d439c5378aaa6a1b481e7f81be681e3986284ffb63c8b7cff71aa73921b09e56ef4b40f5e2cea55de71a6ec23119e02a666d273805bc45c4c80dbf1

  • C:\Windows\SysWOW64\rzqzutomuo.exe

    Filesize

    512KB

    MD5

    16439ed7cfc6bb702854611ff05a190d

    SHA1

    2186fd8d61ba6be6f8cef7487e77b5041d11b8db

    SHA256

    0761620c42be01c27bfcec4f7a577b95592042e66dfd78d120669c998e0ac442

    SHA512

    8f597778b31cc7cd731d266aaa21c29130f9124df4086e3bbe47bec825bfaef07bed5bf1d8635c8c8835da82ce6733f05cec68c6f2b378b6b4d4d41f8c793642

  • C:\Windows\SysWOW64\seozvzgwkxmdeep.exe

    Filesize

    512KB

    MD5

    ab439fdcc1123ccd886a6cfd316092f2

    SHA1

    1f2352a59c97d9932534312abb8d35c19a684109

    SHA256

    1df119e33b55d2d95b514c5cf148390f486c4cd7771b0c50114e25c5d0e1438c

    SHA512

    1786abdc446a8e48cd53fca1f9d521de3eeed8eb78b9fe6e2ea6b61271ffd9afcabd37644a9ff5286eaaa505e67961ce5b81cf667836241720765c0a8f91bf37

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\UnlockSelect.doc.exe

    Filesize

    512KB

    MD5

    1e0157794e1f2720f19e1a01d4657a37

    SHA1

    8c40a41dcd14176542482a6c7973b9d1f3820019

    SHA256

    5bbac10a0dd10e596bf1919ea2c9e5db9aa171e226731ab016de5c3f8de00424

    SHA512

    25ce558f06276d4d51c9baa0d7cecc98edf9bb3fbe55c92732dd7469a35ecb89348bca1a8e47ea8d52d7a2ee8d858695c4464318631b9b64aa5538c698ac64a9

  • memory/1744-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4120-48-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-55-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-44-0x00007FFA0F4B0000-0x00007FFA0F4C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-45-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-46-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-47-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-43-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-50-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-51-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-49-0x00007FFA0CB50000-0x00007FFA0CB60000-memory.dmp

    Filesize

    64KB

  • memory/4120-52-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-53-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-54-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-42-0x00007FFA0F4B0000-0x00007FFA0F4C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-56-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-57-0x00007FFA0CB50000-0x00007FFA0CB60000-memory.dmp

    Filesize

    64KB

  • memory/4120-58-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-41-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-77-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-80-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-39-0x00007FFA0F4B0000-0x00007FFA0F4C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-95-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-40-0x00007FFA4F430000-0x00007FFA4F625000-memory.dmp

    Filesize

    2.0MB

  • memory/4120-38-0x00007FFA0F4B0000-0x00007FFA0F4C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-37-0x00007FFA0F4B0000-0x00007FFA0F4C0000-memory.dmp

    Filesize

    64KB