Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 22:56

General

  • Target

    fe450b70dcaf04311221eb9154381ffd.exe

  • Size

    512KB

  • MD5

    fe450b70dcaf04311221eb9154381ffd

  • SHA1

    11116866f0dae652f0f1dcfb57423b1aea6a637c

  • SHA256

    134310abaa5cd750c8c111ca19b66b4b1ffbfa89673d09d0f6c896f09706f523

  • SHA512

    5e9acda6f60d2052e2dbd7f9f7db028443d12be6c59efa0cee18f05d6fcc8ae97866e18ecd884871e32328f4bb3c624fb27a12c3d7db0cc2f0106f6a191c4812

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6L:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe450b70dcaf04311221eb9154381ffd.exe
    "C:\Users\Admin\AppData\Local\Temp\fe450b70dcaf04311221eb9154381ffd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\kwnthpcrfp.exe
      kwnthpcrfp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\SysWOW64\tbjbcsfb.exe
        C:\Windows\system32\tbjbcsfb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1364
    • C:\Windows\SysWOW64\ksrpsmnhokfbqum.exe
      ksrpsmnhokfbqum.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4040
    • C:\Windows\SysWOW64\hhpxjwiqymvlf.exe
      hhpxjwiqymvlf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4204
    • C:\Windows\SysWOW64\tbjbcsfb.exe
      tbjbcsfb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3748
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\hhpxjwiqymvlf.exe

    Filesize

    512KB

    MD5

    76f495fdf06cd616f9161e1af5b33a4a

    SHA1

    68c249b86353f902dffc6b79261be70716b718c7

    SHA256

    610f2bbe4c75e0ff4a51ad81246a941bfca89bdf8ba6a5ee3796046871463bb0

    SHA512

    54a80bee73c35714bfe810e584bf2fb2e1e594c1287941f84db382bb6cb99e59b460c3ad27d3c6e32a00139511293c00ff4d84a26b1442aca3e8e1f79dff9ca2

  • C:\Windows\SysWOW64\hhpxjwiqymvlf.exe

    Filesize

    192KB

    MD5

    110f40dbeb901f612cee1dc242fdb309

    SHA1

    0d668d172ef81b3f17c1f870513988629c697600

    SHA256

    2776ac73ff5e792a5a804395643f25e611d6eb66037ffd261caacd95ae084b82

    SHA512

    076fda5dfa04f3c443f91657f607ef768185b7753767eb70d557635d398a76f85c8b3c19c7d864f9c342ced1af18c9c98f6f4da4b7bb86dca104230fa71b6df1

  • C:\Windows\SysWOW64\ksrpsmnhokfbqum.exe

    Filesize

    512KB

    MD5

    d3fd383563f2a9a4efa4de8b1eee55bf

    SHA1

    b80c8fdf377a36476e3fa307b84849f5b9b89f68

    SHA256

    20837c84b9edd050d6dd018c25d09de0ac0e9c314854911fa118f51a55c5944f

    SHA512

    b4dd892ae67caf6929f3ddf1a9308bd6021ec0f2d09257227c382276e14b81d518c063730990b17d8e0de016b504f7889a040b7446aef44c2d27993bfefbfc86

  • C:\Windows\SysWOW64\kwnthpcrfp.exe

    Filesize

    512KB

    MD5

    b2a535b4f645d638c64b3195dc9f5ecd

    SHA1

    b4f573ff690c05afcd98d5f501f0d8e325f02346

    SHA256

    8f3d98beec51b81391dea21a1c092adc955e79cf28322e28628cb7179f0e65d4

    SHA512

    2a9eef5bce296eff695e57853d2efea86308c3cf5fcc72784054d2cdaa2fd86db7d9149c77720199ea53f41fe271ae1bbe3c663584fa5eb0b9cd80ffe3f80ee8

  • C:\Windows\SysWOW64\kwnthpcrfp.exe

    Filesize

    250KB

    MD5

    7720aa1cf310dd003a20ca9a7e15712c

    SHA1

    8feaea8aa8b1055ef87e77840334a45d155b9bc3

    SHA256

    85ac9762dd2dd47fe10dce6f0a5ce7df0c7ddfb9cde3fc28b3646760872844e9

    SHA512

    b9dc798957008aec60ed49aad7fb1746a21b8c392c5bced2276d2c57094405beb7417621c69a84dee17af82e0e7d228b42ed0aa54c8f3eb0aa4f5fc440598f95

  • C:\Windows\SysWOW64\tbjbcsfb.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\tbjbcsfb.exe

    Filesize

    512KB

    MD5

    1075d7a359e670fa744f000267c825f6

    SHA1

    99e72eafc1d50c78a5e50d3ae08d8d745e4ae258

    SHA256

    2a78e5fe9eb02c9a8c3a4001465e5286b5eef1762a5adb6d04a557f1d2964b99

    SHA512

    6130a9ab9e0d6871a5f78a1423b4fda8f1e1ece0a1ad65beef846f43d1bb71e641a944679b2a73dba5021e7f8301677b4b230cf2a26464d7e303c5aa415754c1

  • C:\Windows\SysWOW64\tbjbcsfb.exe

    Filesize

    382KB

    MD5

    badd716c7c48a8241873d9251da496d1

    SHA1

    6bd2a072c8f64a1780fe75d983cb7b6584985c6d

    SHA256

    ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7

    SHA512

    7bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5

  • memory/2328-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2356-51-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-36-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-46-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-48-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-47-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-52-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-54-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-55-0x00007FFE9E330000-0x00007FFE9E340000-memory.dmp

    Filesize

    64KB

  • memory/2356-53-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-39-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-50-0x00007FFE9E330000-0x00007FFE9E340000-memory.dmp

    Filesize

    64KB

  • memory/2356-49-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-45-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-43-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-41-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-44-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-38-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-37-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-35-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-117-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-118-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-119-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-141-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-142-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-144-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-143-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-145-0x00007FFEA0530000-0x00007FFEA0540000-memory.dmp

    Filesize

    64KB

  • memory/2356-146-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB

  • memory/2356-147-0x00007FFEE04B0000-0x00007FFEE06A5000-memory.dmp

    Filesize

    2.0MB