Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 13:16

General

  • Target

    19b27abb987d5162d029710981820847.exe

  • Size

    512KB

  • MD5

    19b27abb987d5162d029710981820847

  • SHA1

    b585c7dd57a7e9f10f87bcbd492f3c12446fd113

  • SHA256

    eef38e74b284a86c40ecb68777c0cd6b77398b9ce4bc7046694e77673e5bca61

  • SHA512

    6986e785e9257a5a731fbb3a7d9eb718b21a4b3a9200d000d63701c56eda217debcc0331a7d0b6706abfb5ab13407d572aa3c6f8d5057fc7927da36063711347

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6m:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5N

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19b27abb987d5162d029710981820847.exe
    "C:\Users\Admin\AppData\Local\Temp\19b27abb987d5162d029710981820847.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\saylpbworu.exe
      saylpbworu.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Windows\SysWOW64\iyaqcshl.exe
        C:\Windows\system32\iyaqcshl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4420
    • C:\Windows\SysWOW64\nsqlehmgyxmjlth.exe
      nsqlehmgyxmjlth.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4224
    • C:\Windows\SysWOW64\duwbomlqvhxec.exe
      duwbomlqvhxec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1436
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4680
    • C:\Windows\SysWOW64\iyaqcshl.exe
      iyaqcshl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\iyaqcshl.exe

    Filesize

    92KB

    MD5

    6662b185f19fbf697c56a25c92de7961

    SHA1

    0df0c0df0de3724258df2549c583e3c934aca726

    SHA256

    c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86

    SHA512

    c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f

  • C:\Windows\SysWOW64\nsqlehmgyxmjlth.exe

    Filesize

    152KB

    MD5

    bac1439a35feb1f91e2e74c05c4150db

    SHA1

    e105c50524f5acb1457c4b67a8348897f18ffcc5

    SHA256

    028c2509d2743e26bc414331a2e6b1aed3d5f51f94a690a211d03bd563636749

    SHA512

    e660baf725c99f4a69ea7847d6be8af0556ef054e58eed5eae984a47cdb6df299b7e2bea9c2e946fd277e0b7fdfee23d4b75eddb8ecbfc09862c8356e680f7ab

  • C:\Windows\SysWOW64\nsqlehmgyxmjlth.exe

    Filesize

    512KB

    MD5

    176f60aa231a9ad05fb1c35b240d9e91

    SHA1

    d8afffe11d34c91b8ccb3912b5747f428455a076

    SHA256

    ee0ba95b9ac9e77a15b8e1e7b7eaaa4614d9caa83aa244312427f2a026ad3977

    SHA512

    fb236e8244d89d8f3f104527bd512d876d9fbb1893898e0395b8cbc862746459f7614dd4ca50c66ccaa7ff110cb7cfe782b5ace5dc3e3c79f03fa5164512af5f

  • C:\Windows\SysWOW64\saylpbworu.exe

    Filesize

    193KB

    MD5

    a31008e1bf36948c5790f46d6a5b364b

    SHA1

    53e1bd64f986806dc72e3343c87b65f8afed897a

    SHA256

    0fe3f5e6e9138cafa7435072ebda5646c80f646add2cc306b55a468cd10c4886

    SHA512

    1474fa94a858054307521aa2fc7d0880d9ea131693643bf113304ee32d9a7b731a14668d2a2944bcc7e8b7644408bd98ac2bb7f305b0d74447cc13630fa63538

  • C:\Windows\SysWOW64\saylpbworu.exe

    Filesize

    512KB

    MD5

    ef92fdbf97ca082c82c6bbb014dd9f82

    SHA1

    6691a6480fa1792724302580a0101eb344f462fd

    SHA256

    8b373ffe714eb09c8e96bdc82d3ee5808eb6a6c08fe018865ffa0657e8506744

    SHA512

    b6616bea5f4e81f52c0ebb055f7f7ab672c47c660b58f294064d327004133e9e7adb3c7f890b3080184d296f7666f0681fd1a919a289fb2f18780381f80f9929

  • memory/2116-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/4680-38-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-39-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-43-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-44-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-48-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-47-0x00007FF7F5330000-0x00007FF7F5340000-memory.dmp

    Filesize

    64KB

  • memory/4680-49-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-51-0x00007FF7F5330000-0x00007FF7F5340000-memory.dmp

    Filesize

    64KB

  • memory/4680-50-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-42-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-41-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-40-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-37-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-36-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-35-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-104-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB

  • memory/4680-126-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-127-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-128-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-129-0x00007FF7F7C90000-0x00007FF7F7CA0000-memory.dmp

    Filesize

    64KB

  • memory/4680-130-0x00007FF837C10000-0x00007FF837E05000-memory.dmp

    Filesize

    2.0MB