Analysis

  • max time kernel
    218s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:11

General

  • Target

    0154e979c47c87c2d24802207fc5386a.exe

  • Size

    255KB

  • MD5

    0154e979c47c87c2d24802207fc5386a

  • SHA1

    2747c48692ea737ab40b83e6bdca966c65ead99f

  • SHA256

    777fb35a12a82cf001941d9a7617d361f5b2c68871c52daee80c99ad47a9a3a3

  • SHA512

    c323bcd8d26a9721cc98f882cd2c799458788c7b0eb372e1680332835ef08fe2e6492c710cf4c33357f8389126c6f846c201728e807de9f196c417caeb13df00

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJd:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIo

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 59 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 46 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 45 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0154e979c47c87c2d24802207fc5386a.exe
    "C:\Users\Admin\AppData\Local\Temp\0154e979c47c87c2d24802207fc5386a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\SysWOW64\ezunthgjdr.exe
      ezunthgjdr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\apzdnsjb.exe
        C:\Windows\system32\apzdnsjb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:544
    • C:\Windows\SysWOW64\xdtqriafejilkwj.exe
      xdtqriafejilkwj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:484
    • C:\Windows\SysWOW64\qrmqakemfdnus.exe
      qrmqakemfdnus.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2908
    • C:\Windows\SysWOW64\apzdnsjb.exe
      apzdnsjb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2384
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1340
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2316
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4fc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2076

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\apzdnsjb.exe

      Filesize

      251KB

      MD5

      f58d7677c1410a3efa1e24f56040b701

      SHA1

      cabfcb911a1450f5d73b41152516b83108a89c1b

      SHA256

      5b60e289aa24657f40552bd978d8a6fa77368c96925f59a02ecd3a69a516a76e

      SHA512

      1e5e3b1bdd633b75b200fae4fce96900d2cc5e0a6974a7b41415e372ba1822b29215c2487af9671cd79067515df0db00969d677b3e8e0fa168ae77d4832d3b54

    • C:\Windows\SysWOW64\apzdnsjb.exe

      Filesize

      210KB

      MD5

      17a0db9f972fc978d6ebd41203bf320f

      SHA1

      1e850cc84d0f50a1f15fcab0ef50a925a382435c

      SHA256

      9fbe7a636f34576d768924c8bf3efafbabebaedaa6ec520a1ae8a9bcf939ee2b

      SHA512

      a167f27e1b0d65018c7175f94906b928c07225dcd2df5e5a0b70c70c011f1924dd2de0b08f17d0f93dd02e5b976731245da2dd4b6ad731667bb7449c287de6b2

    • C:\Windows\SysWOW64\qrmqakemfdnus.exe

      Filesize

      255KB

      MD5

      fe1b8b74c6e4b0cbe44512dcd362b04d

      SHA1

      bd9a7bde07a4c10e85f2ec6c5b72d888986261f6

      SHA256

      8ac1134dc60902d858faa457632640e44adba93b2bc8e875929618f61123c53d

      SHA512

      62ae7ee5f4dc1c630875d26b4ee6ddc9ffad807bbdd4236a6ee15c35b583bc306058147d99f81ca6335ceea6c3653af6282d1c4b4d725e165bf1f7c0227d9e4e

    • C:\Windows\SysWOW64\xdtqriafejilkwj.exe

      Filesize

      255KB

      MD5

      02ba2bbdf241471fe0d1b91f0401b3fb

      SHA1

      bee7bcd73de14a6394c5751f15e41a03f45b2367

      SHA256

      472a92eb23ed1deaa9e35a91d536155e26b817f28f76ef46e9e9f3f31cc19d49

      SHA512

      f10787cfa3b247de7cb7148a4272f8ca2cc2bcdf5d3649c710fcfd3d7abfb2e2189d6a35d26db530ee9635fc33ea576c85037398b73befb5d07b2a9bdb27327d

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\apzdnsjb.exe

      Filesize

      255KB

      MD5

      af4fa33978725b8d21b1f120126e7daa

      SHA1

      403234f1f10e59903641e275b6f6c34fc854641d

      SHA256

      fdb81d1327604246c817548987233edda7a746b4fea17a4ab0e416a48a670196

      SHA512

      6e073a8c7f78c4825e4f8cc5d020c55da67439fc6ebbf722291d2c00dce8fec8f78faf921c8bf4dcb8f84a28127a2cdf0f996731830c2ad4fada6216780158af

    • \Windows\SysWOW64\apzdnsjb.exe

      Filesize

      189KB

      MD5

      72abf19fb71bce634774bcfb82db49c6

      SHA1

      c6dfcd1b9d5867b42c2b6f9dfefda5f230540a0f

      SHA256

      a18bca490d7b81824dd603593ef11c3912d73970d968c04a4b16a2fc6af5812a

      SHA512

      4ec9cc12ea2c1b9c0f35dacd477e0b91b8d6907a9dd4805a9e3ed54ea45eef0d16af0d24923d36214f2819c076480b2bc9a2b122cbda133269e355c4979ce095

    • \Windows\SysWOW64\ezunthgjdr.exe

      Filesize

      255KB

      MD5

      0dfba27041132a2914468b46f5eb912b

      SHA1

      7dcc3727cfa8e426fbb0d1fae18dbec8df59c8a5

      SHA256

      3054cf77f6f767657c8b60cd8dd27a762fe115edb43fe743810e327d14f80c3e

      SHA512

      cf9ba85971c86a07a9488e0eb5bb479793f8dd18ae67a23790632786bec4880556b0d7079e58429cc36f8c2d34a7d36f1ca1cd7cac23bd6fa2d06cdf79583d21

    • memory/484-120-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-43-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-69-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-115-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-101-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-79-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-61-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/484-125-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-118-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-92-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-52-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-98-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-128-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/544-64-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-73-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-94-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-129-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-60-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-67-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-124-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-119-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-74-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/1956-39-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2316-68-0x00000000043F0000-0x00000000043F1000-memory.dmp

      Filesize

      4KB

    • memory/2384-99-0x000000007169D000-0x00000000716A8000-memory.dmp

      Filesize

      44KB

    • memory/2384-54-0x000000002FF71000-0x000000002FF72000-memory.dmp

      Filesize

      4KB

    • memory/2384-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2384-56-0x000000007169D000-0x00000000716A8000-memory.dmp

      Filesize

      44KB

    • memory/2668-62-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-44-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-126-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-116-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2668-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-2-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-1-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-42-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2684-53-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-0-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-23-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-15-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2684-22-0x0000000002E70000-0x0000000002F10000-memory.dmp

      Filesize

      640KB

    • memory/2908-47-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-71-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-117-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-122-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-97-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-127-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2908-63-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB