Analysis
-
max time kernel
0s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 12:55
Static task
static1
Behavioral task
behavioral1
Sample
702a27e40a259877b90c92cb15742892.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
702a27e40a259877b90c92cb15742892.exe
Resource
win10v2004-20231222-en
General
-
Target
702a27e40a259877b90c92cb15742892.exe
-
Size
512KB
-
MD5
702a27e40a259877b90c92cb15742892
-
SHA1
474de8b01e95cdbb55e9aec9b2c0a8d6d3b228ff
-
SHA256
ed54234f73fa20b99ec8da643be99d3350fed29e11532fb5cfcedfddec471804
-
SHA512
c69b4cb8b9c135e930bd73678a09221ec162c2a00ae4e26f05cfbc4b89e5c733b333a4e5a7fa220cc3483ee04666d47ccb0d3fab3faa8210734fa8f2133f704f
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm52
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1940 ryanpnhrhu.exe 2004 iwuyiavybhtxscj.exe 3504 mowwbhpw.exe 2316 wqvmllzcjwrxn.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4704-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000700000002320d-23.dat autoit_exe behavioral2/files/0x000700000002320a-19.dat autoit_exe behavioral2/files/0x000700000002320a-18.dat autoit_exe behavioral2/files/0x000700000002320d-5.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iwuyiavybhtxscj.exe 702a27e40a259877b90c92cb15742892.exe File created C:\Windows\SysWOW64\mowwbhpw.exe 702a27e40a259877b90c92cb15742892.exe File opened for modification C:\Windows\SysWOW64\mowwbhpw.exe 702a27e40a259877b90c92cb15742892.exe File created C:\Windows\SysWOW64\wqvmllzcjwrxn.exe 702a27e40a259877b90c92cb15742892.exe File opened for modification C:\Windows\SysWOW64\wqvmllzcjwrxn.exe 702a27e40a259877b90c92cb15742892.exe File created C:\Windows\SysWOW64\ryanpnhrhu.exe 702a27e40a259877b90c92cb15742892.exe File opened for modification C:\Windows\SysWOW64\ryanpnhrhu.exe 702a27e40a259877b90c92cb15742892.exe File created C:\Windows\SysWOW64\iwuyiavybhtxscj.exe 702a27e40a259877b90c92cb15742892.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 702a27e40a259877b90c92cb15742892.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412D089C5783516D4576A5702E2DDC7D8665DC" 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABCF9CAFE13F29083793B40819D3E98B08D02FC42130248E2CD429C08A0" 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC6B15A4490389E53CCBAA133EED4BE" 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8FFCF94F26851C9134D72B7EE6BDEEE141584066456236D79A" 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F368B6FF1B22DDD279D0A58B7E9010" 702a27e40a259877b90c92cb15742892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193EC67D1590DBC0B8C87C93ECE034CC" 702a27e40a259877b90c92cb15742892.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 1940 ryanpnhrhu.exe 2004 iwuyiavybhtxscj.exe 2004 iwuyiavybhtxscj.exe 2004 iwuyiavybhtxscj.exe 1940 ryanpnhrhu.exe 1940 ryanpnhrhu.exe 3504 mowwbhpw.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 4704 702a27e40a259877b90c92cb15742892.exe 2004 iwuyiavybhtxscj.exe 2004 iwuyiavybhtxscj.exe 2004 iwuyiavybhtxscj.exe 1940 ryanpnhrhu.exe 1940 ryanpnhrhu.exe 1940 ryanpnhrhu.exe 3504 mowwbhpw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4704 wrote to memory of 1940 4704 702a27e40a259877b90c92cb15742892.exe 26 PID 4704 wrote to memory of 1940 4704 702a27e40a259877b90c92cb15742892.exe 26 PID 4704 wrote to memory of 1940 4704 702a27e40a259877b90c92cb15742892.exe 26 PID 4704 wrote to memory of 2004 4704 702a27e40a259877b90c92cb15742892.exe 25 PID 4704 wrote to memory of 2004 4704 702a27e40a259877b90c92cb15742892.exe 25 PID 4704 wrote to memory of 2004 4704 702a27e40a259877b90c92cb15742892.exe 25 PID 4704 wrote to memory of 3504 4704 702a27e40a259877b90c92cb15742892.exe 24 PID 4704 wrote to memory of 3504 4704 702a27e40a259877b90c92cb15742892.exe 24 PID 4704 wrote to memory of 3504 4704 702a27e40a259877b90c92cb15742892.exe 24 PID 4704 wrote to memory of 2316 4704 702a27e40a259877b90c92cb15742892.exe 23 PID 4704 wrote to memory of 2316 4704 702a27e40a259877b90c92cb15742892.exe 23 PID 4704 wrote to memory of 2316 4704 702a27e40a259877b90c92cb15742892.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\702a27e40a259877b90c92cb15742892.exe"C:\Users\Admin\AppData\Local\Temp\702a27e40a259877b90c92cb15742892.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4116
-
-
C:\Windows\SysWOW64\wqvmllzcjwrxn.exewqvmllzcjwrxn.exe2⤵
- Executes dropped EXE
PID:2316
-
-
C:\Windows\SysWOW64\mowwbhpw.exemowwbhpw.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3504
-
-
C:\Windows\SysWOW64\iwuyiavybhtxscj.exeiwuyiavybhtxscj.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2004
-
-
C:\Windows\SysWOW64\ryanpnhrhu.exeryanpnhrhu.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1940
-
-
C:\Windows\SysWOW64\mowwbhpw.exeC:\Windows\system32\mowwbhpw.exe1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f
-
Filesize
83KB
MD5a8702132b54ee6d3203853433b204001
SHA18b4eda3b907db4855b189b7bbf1f90ba33df983e
SHA25655149bd1ec219cc3394d255a20fc503a84d8577482a5fe9182547e99ebd37485
SHA5123deb82cd3d72e817b276099654bde74d6d41d5aab72676e03ade0b0e17abdca021e99d7cf36b7ea216f320c493fc67c49384ad2e7e3bbd12094141855f4c6df7
-
Filesize
89KB
MD5239a4c5811e5c38922945b07450f819c
SHA17916fb299d13cdc9b2e9a52050063631991acd92
SHA25674722e046b059c01d621552150c108fcb3cb77aded5ee7201fadfe5e6bcb8102
SHA512fd4498f4c43c9dd818ed75e06e6ac3acf8b152c0a92b3cffff6be58aa56e76e82df3ff1b53022bb5304c83b9c5c61507abd78894373ba1f83f5aa6cf42bed600