Analysis

  • max time kernel
    156s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:31

General

  • Target

    22ed4e3f3bf70565d7b06ac317f93aec.exe

  • Size

    512KB

  • MD5

    22ed4e3f3bf70565d7b06ac317f93aec

  • SHA1

    f6efda263c340f6d560aac158b82dffafe110794

  • SHA256

    f629280bd3147000718ec60d7e6fbdd26f36580c15c6d903b8c6f1e27ae857da

  • SHA512

    b49c958bd6b3d3d06e74ac52c2c4fe4ed7659373f09fb74767224e85e2191e6ca8738ee38a463f97b63de15111c7a255066b1cecf95a1dc93aaca4c0f0ae0c38

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 16 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 57 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe
    "C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\knklgogmsh.exe
      knklgogmsh.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\gcpqkvan.exe
        C:\Windows\system32\gcpqkvan.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2552
    • C:\Windows\SysWOW64\gcpqkvan.exe
      gcpqkvan.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2856
    • C:\Windows\SysWOW64\npmasbjixesxztw.exe
      npmasbjixesxztw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2664
    • C:\Windows\SysWOW64\topxyygvfllyi.exe
      topxyygvfllyi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2860
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1160
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2628
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2264

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      985fc60a03c8c77c1d388c721772c181

      SHA1

      096bfdf55a527fe8ed049c7b638b3e2102113ec2

      SHA256

      5320c96885b5c7c76d6ea67a64eb7a5ca62b48b302c774ac058a7916913a2113

      SHA512

      e45a52e89da3cdcfaeea5f9a1711ddd643c8641bd68bd13c7623bb20501c08733b25164fae8e3544edb6ab308db46208ae391fec643dc2e6d185d8290dcd31ad

    • C:\Users\Admin\AppData\Roaming\MoveClose.doc.exe

      Filesize

      512KB

      MD5

      ae06c2b6a76dcdc39eb8f83b530d9e45

      SHA1

      9d538ab202e6d384012b5151baaef4a369080a89

      SHA256

      a03ddcc463f655e59f55e5ec77712b5863f86830ae1be700ecab34cba3a1d85d

      SHA512

      2e24ecc0bbb244e3be486a3db755a2863d60910198edd74a03ea81e87262bf60877d8481cfb39d903e2c74e82a163334315d027b70bdb9ca696274b25f0dc12c

    • C:\Windows\SysWOW64\gcpqkvan.exe

      Filesize

      55KB

      MD5

      98da9368a470ab71beb58b1b89b762c6

      SHA1

      2eb68e38e36b367cd315e9832ff5be2a43402d2c

      SHA256

      b7351fbb246f10feb7596d28aa2a29cc295e464ae41d965da8227f5d3e3449f4

      SHA512

      994159af2a45a58d60a4d39056dff5a613c4d4338d9345e51883759abdc3a80fafdbca68da3ecaa0fb1802f35ed03f669c7acf69b3d59496f2f7d4ede41ddf99

    • C:\Windows\SysWOW64\gcpqkvan.exe

      Filesize

      79KB

      MD5

      5e863b29afe7ef7aaae5b3fda13afc86

      SHA1

      b405100c211d1fb9a3338a19ef252027172b1127

      SHA256

      4c5548079d892eb098ed6f560915ec105a06fb5bd23db3f98beedcbc7ad53052

      SHA512

      561582918dc045b0d468168b29bc243f800fbc1abb0244cf4bda6819568d7bdf6b7f091bdb1d7833e7740373227e56ef095061c7787c4e67428db273e9c9ce08

    • C:\Windows\SysWOW64\gcpqkvan.exe

      Filesize

      512KB

      MD5

      08602bfd930efb60dcd06bae2bba7aad

      SHA1

      dd9ea9e77977b9e42dcd58d02f8d11f3c3b349ac

      SHA256

      6522881ef4b526951d0ce52a288d53d63d90b20f0126f5d03c4a3eac4704f997

      SHA512

      aa2fe6132d81d48fd593633926484a978fea993ce503022ef551c880710cfa451e6631bb5465792012bcf8adf6225c900f22e7752317f18d95ac64d0af6e26af

    • C:\Windows\SysWOW64\knklgogmsh.exe

      Filesize

      212KB

      MD5

      259d8c4ed400fe6471744a5c925383d0

      SHA1

      9c37f94ba5a9af30a5adaaa3a81533307e746348

      SHA256

      c38016f312fa78cdcbd1b8ece788a8f8b28ac72820022e8dd58078946d78eeaf

      SHA512

      4dec25d5ed2896ed3efb2b79112d4c51b2666205e46cc9df987b2bfbb4e59b4eb3883109b7f3b6064f823b798096c7999044bbc6e7396bca8a68786bf0cdd0ab

    • C:\Windows\SysWOW64\npmasbjixesxztw.exe

      Filesize

      154KB

      MD5

      93843b3a39e1a4e006dcb331afdcef8c

      SHA1

      ba17c68915b3223cd5641e536ec6295442b68735

      SHA256

      88b51c2d84ba38fef5c146021fcff0a4f95f1b444e1774249e748e93ac4458b3

      SHA512

      e3566e8fadbf0149d4a5da316fad3b00416fca62b473511415c2cd514391eeb485a855464c0172120ea8c9eadaed7dba7e2f78af981f8ba34e71f2eddde48adc

    • C:\Windows\SysWOW64\npmasbjixesxztw.exe

      Filesize

      66KB

      MD5

      c142c17c37df3ff9890c58c9a3ab0d11

      SHA1

      2177cc5231ec445013005e7e667b48c41d1aa2c4

      SHA256

      c06deea0ef05e13b21510bf49ca18069b1f3f895a6f350d5df3da40761221f73

      SHA512

      3537d741f197846f09a04a675ae1058d45b8892abc8067ca1c44fb188d2460849f0ffdb6efd677617cb70784b0b11c2a9391f97d4dcc424b86a10a2869a57d4b

    • C:\Windows\SysWOW64\npmasbjixesxztw.exe

      Filesize

      512KB

      MD5

      b7f0937b1273d1a7843309c2365bae36

      SHA1

      1892f2fc267347d26aea99aa7782bc8cecd70dda

      SHA256

      c504fccf1398f71e917a57a216cd335ef792a00f39a7c27d3f59caf1c589c577

      SHA512

      c232765e54c2bdb345ac09a51729434909aaaf54880ec10faa4e75ab467dec108259252bc92b92503dc3646bea7df9164d682fee9f98ce66d958f87dd208790c

    • C:\Windows\SysWOW64\topxyygvfllyi.exe

      Filesize

      86KB

      MD5

      c7deae8a410fc9af44e192bf002bb163

      SHA1

      52d5a0e4073c15d74ac309dae039ade1d52dec27

      SHA256

      6aa38368d4a4e4eb01c2ca6506e39768f324b3dbcf6b356c46bb909befda4a88

      SHA512

      61a5689603e51890415db16cd294563182e1ccd372034677b9f4f83dd2aef0a94ddc569e3b8abd7641a363336e83b6dbc90acd1c06e3dafd800c83f2c40f0346

    • C:\Windows\SysWOW64\topxyygvfllyi.exe

      Filesize

      39KB

      MD5

      32a346a366ceb4c4d9950e0ee8ca9442

      SHA1

      b741233d3cc598d1fec0f96cd33c66dd134448c1

      SHA256

      d20c5037f6495344334b30d636ec468d7371796577d7d014a914e4893d866fef

      SHA512

      444608a82f7db2a9efc68eaff5e63583bf9922ef8b2f0137443e0651dec1f56fa63101f3bdf79225f3b725d5a8b12f65e014d7089a52cbf275ca4b4430c938e2

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\gcpqkvan.exe

      Filesize

      251KB

      MD5

      94e58585be1acfc67c4a264e6492be6b

      SHA1

      d4cd322aa2ff59b138959a9f8e0dc92c935660b3

      SHA256

      3c884dfe16636fccfee9e7c944aa157a6f1b74268e944574093d6c833ce26f22

      SHA512

      12a1c02f911376d4af9a9aeb0320c5a8ccf1ec4be24719b820d8271493b38e8cb3e37ace41561feea88498872207639fa1b4ed0f844efc1fb1be544e0f70fc4d

    • \Windows\SysWOW64\knklgogmsh.exe

      Filesize

      512KB

      MD5

      4ef6326fb2ad00c3f825875781f9d260

      SHA1

      ea7841484decb17f97d8a82ddcb789afb264524a

      SHA256

      779b37ee9b7e8ccd392584b8accfa9ab3c1f372c7257fc77372374b0a16c5ca8

      SHA512

      4741a1efdefe2c13cdd77848da6d43ec19bef4dc5d08d201a94b8e55711cbf50c71a5f13c73a22514405432b88daa720089e898c6997667865943951a10d3524

    • \Windows\SysWOW64\npmasbjixesxztw.exe

      Filesize

      266KB

      MD5

      450a216a2da65be72a5353b283a2dc60

      SHA1

      238df0e1ea17bc0b03e4a122e0c229e3b24c874e

      SHA256

      91296d3175a222521a87c984cd28e6c9cb4af73b2b5cc1b2cce9d9c6b8b65f45

      SHA512

      c244f73ac98e96e978168aef844002120cb857f79d8a628e1aa75b4d14d81337b22373e9b575ff96914167cf815262ff7a4f41fe0b215027971857b9dc357329

    • \Windows\SysWOW64\topxyygvfllyi.exe

      Filesize

      183KB

      MD5

      ff53324f679db7c844f1959bcfd3d8ad

      SHA1

      f95f8e909e24e2fff0e3561fb5a45020669b153c

      SHA256

      5aa135f6c0d559fa6420f63d70e9cd1441947455e79701b3302f048d1518303e

      SHA512

      20d95d499720f04fa6efe54760c88fe82b6abe34df69bf5ad87fb3f1f7eefe69252f7fc65af251a285fcdee6a890e14f430fc615c520e485fd0bb4442be340bf

    • memory/2172-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2264-82-0x0000000003ED0000-0x0000000003ED1000-memory.dmp

      Filesize

      4KB

    • memory/2264-87-0x0000000003970000-0x0000000003980000-memory.dmp

      Filesize

      64KB

    • memory/2264-75-0x0000000003ED0000-0x0000000003ED1000-memory.dmp

      Filesize

      4KB

    • memory/2628-67-0x00000000046B0000-0x00000000046B1000-memory.dmp

      Filesize

      4KB

    • memory/2908-47-0x0000000070D5D000-0x0000000070D68000-memory.dmp

      Filesize

      44KB

    • memory/2908-80-0x0000000070D5D000-0x0000000070D68000-memory.dmp

      Filesize

      44KB

    • memory/2908-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2908-45-0x000000002FC51000-0x000000002FC52000-memory.dmp

      Filesize

      4KB