Analysis

  • max time kernel
    0s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 13:59

General

  • Target

    73ee3c7ed6db7afbdb94244cea0035c5.exe

  • Size

    512KB

  • MD5

    73ee3c7ed6db7afbdb94244cea0035c5

  • SHA1

    47bad3fc287993e91db2d11b4010ef54bba0b2bb

  • SHA256

    f449681525b460eac798a4a6c844f0a7e3f7272edebcaeae65b0911aec009a25

  • SHA512

    c593ba94719dd7e6b57ddafbef03891e46683489380bd976523b4739bd1731dc380f086eaece3a9b71ac8e66dd77caa04e1edde46d754ad10f86ae31ef9aff12

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe
    "C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Windows\SysWOW64\zrmylcqq.exe
      zrmylcqq.exe
      2⤵
      • Executes dropped EXE
      PID:3248
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4860
      • C:\Windows\SysWOW64\lnoewqpopxsqs.exe
        lnoewqpopxsqs.exe
        2⤵
        • Executes dropped EXE
        PID:4080
      • C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exe
        dqlgpfsfexrkyoe.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2588
      • C:\Windows\SysWOW64\mxdcmpdeuj.exe
        mxdcmpdeuj.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2756
    • C:\Windows\SysWOW64\zrmylcqq.exe
      C:\Windows\system32\zrmylcqq.exe
      1⤵
        PID:752

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exe

              Filesize

              92KB

              MD5

              59ebf1358a9b829f5709baaedeeee6fa

              SHA1

              1409fd65da1b814db0a08feae54366dfca196f1c

              SHA256

              d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

              SHA512

              a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

            • C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exe

              Filesize

              382KB

              MD5

              badd716c7c48a8241873d9251da496d1

              SHA1

              6bd2a072c8f64a1780fe75d983cb7b6584985c6d

              SHA256

              ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7

              SHA512

              7bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5

            • C:\Windows\SysWOW64\mxdcmpdeuj.exe

              Filesize

              512KB

              MD5

              582ea51c962153d2b75a336bc84890aa

              SHA1

              eebeb63387ac6bdb4af3930d38efee901e26e339

              SHA256

              01a78ce3548e2454359656b1d1018cc6327da17e137fb9801e65970090f2b412

              SHA512

              fd065be5116a79b72d6a3e39d19d46659c322c6cd2b52f1cd8f1686e9e476ffd98052282718ad99a72fb101770b8f8d597e14f8546c4ae15432e55b811659ab9

            • memory/4172-0-0x0000000000400000-0x0000000000496000-memory.dmp

              Filesize

              600KB

            • memory/4860-52-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-45-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-48-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-50-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-53-0x00007FFB29460000-0x00007FFB29470000-memory.dmp

              Filesize

              64KB

            • memory/4860-55-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-56-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-57-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-54-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-59-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-58-0x00007FFB29460000-0x00007FFB29470000-memory.dmp

              Filesize

              64KB

            • memory/4860-43-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-51-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-49-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-47-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-46-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-44-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-42-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-41-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-40-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-38-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-37-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-39-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-127-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-153-0x00007FFB6BBD0000-0x00007FFB6BDC5000-memory.dmp

              Filesize

              2.0MB

            • memory/4860-152-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-151-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-150-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB

            • memory/4860-149-0x00007FFB2BC50000-0x00007FFB2BC60000-memory.dmp

              Filesize

              64KB