Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
73ee3c7ed6db7afbdb94244cea0035c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73ee3c7ed6db7afbdb94244cea0035c5.exe
Resource
win10v2004-20231222-en
General
-
Target
73ee3c7ed6db7afbdb94244cea0035c5.exe
-
Size
512KB
-
MD5
73ee3c7ed6db7afbdb94244cea0035c5
-
SHA1
47bad3fc287993e91db2d11b4010ef54bba0b2bb
-
SHA256
f449681525b460eac798a4a6c844f0a7e3f7272edebcaeae65b0911aec009a25
-
SHA512
c593ba94719dd7e6b57ddafbef03891e46683489380bd976523b4739bd1731dc380f086eaece3a9b71ac8e66dd77caa04e1edde46d754ad10f86ae31ef9aff12
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2756 mxdcmpdeuj.exe 2588 dqlgpfsfexrkyoe.exe 3248 zrmylcqq.exe 4080 lnoewqpopxsqs.exe -
AutoIT Executable 5 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4172-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0007000000023203-5.dat autoit_exe behavioral2/files/0x0006000000023207-29.dat autoit_exe behavioral2/files/0x0007000000023203-23.dat autoit_exe behavioral2/files/0x00080000000231f0-18.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File created C:\Windows\SysWOW64\zrmylcqq.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File opened for modification C:\Windows\SysWOW64\zrmylcqq.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File created C:\Windows\SysWOW64\lnoewqpopxsqs.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File opened for modification C:\Windows\SysWOW64\lnoewqpopxsqs.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File created C:\Windows\SysWOW64\mxdcmpdeuj.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File opened for modification C:\Windows\SysWOW64\mxdcmpdeuj.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe File created C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exe 73ee3c7ed6db7afbdb94244cea0035c5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 73ee3c7ed6db7afbdb94244cea0035c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFF89482F856D9046D65F7E95BDE2E63258306644623FD6EE" 73ee3c7ed6db7afbdb94244cea0035c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78668B2FF6E21AED278D1D28A0C9110" 73ee3c7ed6db7afbdb94244cea0035c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183DC60F15E3DABEB8B97CE8EC9634BB" 73ee3c7ed6db7afbdb94244cea0035c5.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 73ee3c7ed6db7afbdb94244cea0035c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2D0B9C2D83256A3177D070222CDB7CF464AA" 73ee3c7ed6db7afbdb94244cea0035c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC8F9CCF961F1E784093B4781983997B08A03FC42110332E2BE42EF08D6" 73ee3c7ed6db7afbdb94244cea0035c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC1B02847E338EB53B9BAD133EDD4BC" 73ee3c7ed6db7afbdb94244cea0035c5.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 2756 mxdcmpdeuj.exe 2756 mxdcmpdeuj.exe 2756 mxdcmpdeuj.exe 2588 dqlgpfsfexrkyoe.exe 2588 dqlgpfsfexrkyoe.exe 2588 dqlgpfsfexrkyoe.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 2756 mxdcmpdeuj.exe 2756 mxdcmpdeuj.exe 2756 mxdcmpdeuj.exe 2588 dqlgpfsfexrkyoe.exe 2588 dqlgpfsfexrkyoe.exe 2588 dqlgpfsfexrkyoe.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4172 wrote to memory of 2756 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 28 PID 4172 wrote to memory of 2756 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 28 PID 4172 wrote to memory of 2756 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 28 PID 4172 wrote to memory of 2588 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 27 PID 4172 wrote to memory of 2588 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 27 PID 4172 wrote to memory of 2588 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 27 PID 4172 wrote to memory of 3248 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 20 PID 4172 wrote to memory of 3248 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 20 PID 4172 wrote to memory of 3248 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 20 PID 4172 wrote to memory of 4080 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 25 PID 4172 wrote to memory of 4080 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 25 PID 4172 wrote to memory of 4080 4172 73ee3c7ed6db7afbdb94244cea0035c5.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe"C:\Users\Admin\AppData\Local\Temp\73ee3c7ed6db7afbdb94244cea0035c5.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\zrmylcqq.exezrmylcqq.exe2⤵
- Executes dropped EXE
PID:3248
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4860
-
-
C:\Windows\SysWOW64\lnoewqpopxsqs.exelnoewqpopxsqs.exe2⤵
- Executes dropped EXE
PID:4080
-
-
C:\Windows\SysWOW64\dqlgpfsfexrkyoe.exedqlgpfsfexrkyoe.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2588
-
-
C:\Windows\SysWOW64\mxdcmpdeuj.exemxdcmpdeuj.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2756
-
-
C:\Windows\SysWOW64\zrmylcqq.exeC:\Windows\system32\zrmylcqq.exe1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD559ebf1358a9b829f5709baaedeeee6fa
SHA11409fd65da1b814db0a08feae54366dfca196f1c
SHA256d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06
SHA512a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417
-
Filesize
382KB
MD5badd716c7c48a8241873d9251da496d1
SHA16bd2a072c8f64a1780fe75d983cb7b6584985c6d
SHA256ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7
SHA5127bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5
-
Filesize
512KB
MD5582ea51c962153d2b75a336bc84890aa
SHA1eebeb63387ac6bdb4af3930d38efee901e26e339
SHA25601a78ce3548e2454359656b1d1018cc6327da17e137fb9801e65970090f2b412
SHA512fd065be5116a79b72d6a3e39d19d46659c322c6cd2b52f1cd8f1686e9e476ffd98052282718ad99a72fb101770b8f8d597e14f8546c4ae15432e55b811659ab9