Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 23:08

General

  • Target

    fee45afc99fab9e2b0f358d1dff45a70.exe

  • Size

    512KB

  • MD5

    fee45afc99fab9e2b0f358d1dff45a70

  • SHA1

    b758af04b35f4c60e30b2aff265486e6dcf78254

  • SHA256

    5d4c68f55e0662006cfc119cf15e2395c9c3902ede93690e0233e89077c94ef7

  • SHA512

    fb986e2903d0776b0912ed9057c8e82fcf639f708c7a2d94265087522faef62368f40443431e16ad49813b872250da06f36a328289cd86307e045061048a9566

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fee45afc99fab9e2b0f358d1dff45a70.exe
    "C:\Users\Admin\AppData\Local\Temp\fee45afc99fab9e2b0f358d1dff45a70.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\SysWOW64\kffkyqbymi.exe
      kffkyqbymi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\SysWOW64\vewoanso.exe
        C:\Windows\system32\vewoanso.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1632
    • C:\Windows\SysWOW64\fhzjawtnnpdvy.exe
      fhzjawtnnpdvy.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2248
    • C:\Windows\SysWOW64\vewoanso.exe
      vewoanso.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3312
    • C:\Windows\SysWOW64\jipexfrwhbqnoxi.exe
      jipexfrwhbqnoxi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3596
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    82d818dc13ae1baae378129f167a4041

    SHA1

    b42792165a73b6fd4c8e4b0138c98ccd8b0f49e1

    SHA256

    e4c375e83aa41caf043a42b7c89afd11e4a64b042926f43fcf4d77c6a28a9b15

    SHA512

    c299e9a8b990c9cec40e2381db6bcc4a4458dbcd266ce037bfa1ab6bdf7bd0f31bb7e0e2956b6bf33e956694758d896b12f508466c8aebd9902ebcb8f37f57b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    98fc924cdacb93ecee222e329e4275b0

    SHA1

    3b9940f84edc968485ecc0d48ff1053a40366403

    SHA256

    5500fccf17051e6a1af88a31b7f65a6fb122119d1b8268ad81739fb339e52720

    SHA512

    5a7b4e5b77358db4eb4f5969666152893f2f2e855099316de116357ee90ed785fffe0d4e0d73a87b737a6d9e269a3810d3b55d6b548a1faed3f36c133f8f1c71

  • C:\Windows\SysWOW64\fhzjawtnnpdvy.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\fhzjawtnnpdvy.exe

    Filesize

    512KB

    MD5

    4117633ea73567831df10b5d54d1e3c0

    SHA1

    c222f1d585c20123092805283e8c8837bd955bae

    SHA256

    d6301496c4eaf088b25af6bff7ca0ddf9371d9dfe4a0540af8823a18a61cf3ed

    SHA512

    c9dcdb5040e907e7b55a78e90aeab4ad40eb8df79db829c4078aa0e936857d2b53ab5b0a6e82bd94efb34616c16bbe46994e870dd2ab1f1cfc5b476e17b0459d

  • C:\Windows\SysWOW64\jipexfrwhbqnoxi.exe

    Filesize

    512KB

    MD5

    9c1714638777f217b67fb392fa1d8dd7

    SHA1

    971f0597920fbf5278918880119a36eb694595dd

    SHA256

    12d8e12dd0cd79099492a75e35bca0ee60f34980869bca3c28405959467ef1e3

    SHA512

    c3419abb2f8be8cbf6544e0f8e21ff64e37e756c26daf4aaf621612bfe5ec93cdcb94a5ec9a9d170f72bfd8054f85c4527a94552f924b602d059bb235a613e6c

  • C:\Windows\SysWOW64\kffkyqbymi.exe

    Filesize

    512KB

    MD5

    c6a609730ce7fd261def27eaa84c78db

    SHA1

    166dc2d919aeea628770084a45dd3d8ef9c274b7

    SHA256

    e5553860d5506361947252acf2f447626de54c5d56aeb2ee53f3f9a68258b3a6

    SHA512

    b8f1b18a0388b2d6329c009494eca530891e18fcae0850ed326d8575af61a22127849a1d48f030394537671f4357521cb992088cd874369bef8afcde0c1a08c3

  • C:\Windows\SysWOW64\vewoanso.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\vewoanso.exe

    Filesize

    512KB

    MD5

    28fdee8eda9b2a531246086d5a8f16bc

    SHA1

    22f4ded1395c5f7e4ac42dc844d4213ff3e5a901

    SHA256

    3c622dfca5f28df5e48b794cc1137d6374af16de0422f8f5c3681256278c767d

    SHA512

    5ae1448996edab47ad65fd7098b0927143ece81fb8b56bd8154385be641c8f6138fb90c66ae41d33121055b961410813a13aa6ad63c87135f5b5d37c8935bc19

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a2fd88b4891edce23a849f66d17571d6

    SHA1

    524f18d87544e3f7b9f6cbe7b16b89f436d01f67

    SHA256

    d2b3c4bc6ba00b168b0d6c72efbda970285444b4965790587db930ef36a169f4

    SHA512

    c11e2bdcd2c32e0d6f3e59e387d364c3aaed928139750ba011f0755edeee9438370e0145a50abc052788b9f44a14f0df95af89f7847f965d115809ab7e03e765

  • memory/4524-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4564-44-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-36-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-54-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-52-0x00007FFB0B2B0000-0x00007FFB0B2C0000-memory.dmp

    Filesize

    64KB

  • memory/4564-55-0x00007FFB0B2B0000-0x00007FFB0B2C0000-memory.dmp

    Filesize

    64KB

  • memory/4564-51-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-49-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-48-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-46-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-45-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-43-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-50-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-38-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-53-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-37-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-35-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-47-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-42-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-41-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-118-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-140-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-144-0x00007FFB4D290000-0x00007FFB4D485000-memory.dmp

    Filesize

    2.0MB

  • memory/4564-143-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-142-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB

  • memory/4564-141-0x00007FFB0D310000-0x00007FFB0D320000-memory.dmp

    Filesize

    64KB