Analysis

  • max time kernel
    1s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 20:58

General

  • Target

    f7b84056010c17b76758baae378231a5.exe

  • Size

    512KB

  • MD5

    f7b84056010c17b76758baae378231a5

  • SHA1

    df1f5295f8af8e8fcdfc5b011949023e90b90a29

  • SHA256

    34dca36204a623fccda55c58c323819633dc0b99e1f887bc06594de5d101519e

  • SHA512

    30df6c409c049b0e79a14cc2b1f6194374a620b3ffb7318b2eb2d4836b02d894f7a0a83d9fdee6130988d446affabc89ec5e506d4323565dd3e991ded20f5ddd

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6E:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5X

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7b84056010c17b76758baae378231a5.exe
    "C:\Users\Admin\AppData\Local\Temp\f7b84056010c17b76758baae378231a5.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Windows\SysWOW64\jspnkxoxvamxx.exe
      jspnkxoxvamxx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4052
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4696
      • C:\Windows\SysWOW64\raipjcck.exe
        raipjcck.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3668
      • C:\Windows\SysWOW64\ghbyltllsojvncf.exe
        ghbyltllsojvncf.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3056
      • C:\Windows\SysWOW64\kztqdvvbcv.exe
        kztqdvvbcv.exe
        2⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3720
    • C:\Windows\SysWOW64\raipjcck.exe
      C:\Windows\system32\raipjcck.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ghbyltllsojvncf.exe

      Filesize

      512KB

      MD5

      8fc0430290c11ee66520af5d26ea870e

      SHA1

      8e770b9e0404a09ac4353324bd6739f0bef541f7

      SHA256

      298030f3076439d00b811130e615a4beb5d98b1b92d225ac0e8ffa88b75db447

      SHA512

      c62b308ef83b87a053013ea1d4b186ae82b74ef7ebc312fdb18d88cbdfecf3ca9bd31621aa8b1d39ea23a4ebdecc19e65e8b37b4ea09cfab444c58b64c0646dd

    • C:\Windows\SysWOW64\jspnkxoxvamxx.exe

      Filesize

      381KB

      MD5

      30aec9e0b33fbd99234328357879f812

      SHA1

      3c9d37139d4ccfe2b694afba9633170d0f510a92

      SHA256

      15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

      SHA512

      2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

    • C:\Windows\SysWOW64\jspnkxoxvamxx.exe

      Filesize

      92KB

      MD5

      6662b185f19fbf697c56a25c92de7961

      SHA1

      0df0c0df0de3724258df2549c583e3c934aca726

      SHA256

      c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

      SHA512

      c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

    • C:\Windows\SysWOW64\kztqdvvbcv.exe

      Filesize

      512KB

      MD5

      8d8664586753df475aa3e6d1c1d5fad3

      SHA1

      55933977f4cb508d6ea8d44488c7f814396a5d65

      SHA256

      4655520b2a872ac9acb5a90564848aa75fb908359906a97a2f27464d90f422da

      SHA512

      3d6bee06c28ebf66d3ba496a6e0b9239de749e3e7d79fcf4e023a5f24d7f0897b28681b488f72a1a7e6361d7a7632161e1bf06fd198e0c580b23de377efa681d

    • C:\Windows\SysWOW64\raipjcck.exe

      Filesize

      512KB

      MD5

      61f8b9e4d7457f53a4efd1d81133454e

      SHA1

      a89de255bffc66723e5f1e2a67eacc409ac09f44

      SHA256

      5cec4700c2fb0e3edbe0c77c3c2bcd093ccba574f2fb8558bab1670a48d3a3fd

      SHA512

      18999828934385463f9aa36c0b3894b931bebae2e67fbc53e1990fc186aa3fe7e9a1dacf348ef6f0d2308bccdc39d2b58fe28edb312e15637a897323e57d4d9a

    • C:\Windows\SysWOW64\raipjcck.exe

      Filesize

      348KB

      MD5

      b3e1b55752818da128907f3dc079021a

      SHA1

      f7f749c92968bdc80115f48378ecc5a19ffd04e0

      SHA256

      68cb7b8034c41dee63fb762157bb6bb0ead1887eecf678f576f1220433164000

      SHA512

      6de28713fc167647479cab28ed08d21f01e6dd4c44eac8c79d5a65e187fb515da5415bed0df60c70b7f3cedda84c378c11d280daf00573392657942a285f1e21

    • C:\Windows\SysWOW64\raipjcck.exe

      Filesize

      3KB

      MD5

      6a8c4b146ecf4cdeb261984ff257a701

      SHA1

      0bf68d438aa1143541ce5e776c8baff369c5452f

      SHA256

      8ae4fd77d89cae193fc05431cefa0fdc10e513753b258f608beb9598cd302240

      SHA512

      077eea4f0dddd6d441a0b2169756ca6c6798d2acf856e4f56655cccdc39ebdabccf7d84f8fce4860c68d4c62859991f5ba570ac81ae4c47efa084c5f65c62682

    • memory/3088-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/4696-54-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-46-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-48-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-51-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-53-0x00007FFCCC840000-0x00007FFCCC850000-memory.dmp

      Filesize

      64KB

    • memory/4696-55-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-56-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-58-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-59-0x00007FFCCC840000-0x00007FFCCC850000-memory.dmp

      Filesize

      64KB

    • memory/4696-57-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-42-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-52-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-50-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-49-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-47-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-45-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-44-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-43-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-40-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-41-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-38-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-37-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-39-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-121-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-145-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-148-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-149-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-147-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-146-0x00007FFD0EB30000-0x00007FFD0ED25000-memory.dmp

      Filesize

      2.0MB

    • memory/4696-144-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB

    • memory/4696-143-0x00007FFCCEBB0000-0x00007FFCCEBC0000-memory.dmp

      Filesize

      64KB