Analysis

  • max time kernel
    0s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 13:59

General

  • Target

    73ee3c7ed6db7afbdb94244cea0035c5.exe

  • Size

    512KB

  • MD5

    73ee3c7ed6db7afbdb94244cea0035c5

  • SHA1

    47bad3fc287993e91db2d11b4010ef54bba0b2bb

  • SHA256

    f449681525b460eac798a4a6c844f0a7e3f7272edebcaeae65b0911aec009a25

  • SHA512

    c593ba94719dd7e6b57ddafbef03891e46683489380bd976523b4739bd1731dc380f086eaece3a9b71ac8e66dd77caa04e1edde46d754ad10f86ae31ef9aff12

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe
    "C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
        PID:2652
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2576
        • C:\Windows\SysWOW64\kuoiqgefrwftl.exe
          kuoiqgefrwftl.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2736
        • C:\Windows\SysWOW64\ovbfkxyx.exe
          ovbfkxyx.exe
          2⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2824
        • C:\Windows\SysWOW64\whsecmyvqqcyqcr.exe
          whsecmyvqqcyqcr.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2076
        • C:\Windows\SysWOW64\zsbsurxkil.exe
          zsbsurxkil.exe
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Windows security bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Windows security modification
          • Modifies WinLogon
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2328
      • C:\Windows\SysWOW64\ovbfkxyx.exe
        C:\Windows\system32\ovbfkxyx.exe
        1⤵
          PID:1660

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Windows\SysWOW64\whsecmyvqqcyqcr.exe

                Filesize

                94KB

                MD5

                adf240d1843e40ab9617e9dc12bc9b5b

                SHA1

                70923ac6636077728d2721b22d312002f735deea

                SHA256

                f53d3e249050f489475559b9c39548a2afb7157dbd9e87551ef5349fa76ccb62

                SHA512

                e2aec62114f1f6b5e94e0888efc2758e284835e0099abbfd3dd80cf3500a1e0d628c3ecb66b6b48fe051327746af38f2e953e1f816819c6b18126212621e7ccd

              • C:\Windows\SysWOW64\zsbsurxkil.exe

                Filesize

                92KB

                MD5

                59ebf1358a9b829f5709baaedeeee6fa

                SHA1

                1409fd65da1b814db0a08feae54366dfca196f1c

                SHA256

                d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

                SHA512

                a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

              • \Windows\SysWOW64\zsbsurxkil.exe

                Filesize

                512KB

                MD5

                ce8452d88198fb461b91edfc667d404c

                SHA1

                2b82b1838f4f35563e726350d5bbf95b2e85e4e4

                SHA256

                812b9258d1fdea7e9d1b9bd950317df690c8cf1955156d07532d9cd980db1775

                SHA512

                07e25057c1d1f4835937d80712fc8aadfe7058abff4baa7efb45a2d4ce9c844166c3feaf13824d5d245e3284e3a1265892a7f2fffd447205e5ab5bb53f279e76

              • memory/1644-0-0x0000000000400000-0x0000000000496000-memory.dmp

                Filesize

                600KB

              • memory/2652-45-0x000000002FDB1000-0x000000002FDB2000-memory.dmp

                Filesize

                4KB

              • memory/2652-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

                Filesize

                64KB

              • memory/2652-47-0x0000000071A6D000-0x0000000071A78000-memory.dmp

                Filesize

                44KB

              • memory/2652-82-0x0000000071A6D000-0x0000000071A78000-memory.dmp

                Filesize

                44KB

              • memory/2652-103-0x000000005FFF0000-0x0000000060000000-memory.dmp

                Filesize

                64KB