Analysis

  • max time kernel
    0s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 01:31

General

  • Target

    22ed4e3f3bf70565d7b06ac317f93aec.exe

  • Size

    512KB

  • MD5

    22ed4e3f3bf70565d7b06ac317f93aec

  • SHA1

    f6efda263c340f6d560aac158b82dffafe110794

  • SHA256

    f629280bd3147000718ec60d7e6fbdd26f36580c15c6d903b8c6f1e27ae857da

  • SHA512

    b49c958bd6b3d3d06e74ac52c2c4fe4ed7659373f09fb74767224e85e2191e6ca8738ee38a463f97b63de15111c7a255066b1cecf95a1dc93aaca4c0f0ae0c38

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe
    "C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Windows\SysWOW64\mrcdzcneesqey.exe
      mrcdzcneesqey.exe
      2⤵
      • Executes dropped EXE
      PID:2356
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:4960
      • C:\Windows\SysWOW64\hyxmwwhp.exe
        hyxmwwhp.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4404
      • C:\Windows\SysWOW64\rpughzjranjwfvx.exe
        rpughzjranjwfvx.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1340
      • C:\Windows\SysWOW64\ehjdwqhqlj.exe
        ehjdwqhqlj.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5108
    • C:\Windows\SysWOW64\hyxmwwhp.exe
      C:\Windows\system32\hyxmwwhp.exe
      1⤵
        PID:1384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3676-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/4960-37-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-39-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-42-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-47-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-49-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-52-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-53-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-55-0x00007FFB898B0000-0x00007FFB898C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-56-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-58-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-59-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-57-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-54-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-51-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-50-0x00007FFB898B0000-0x00007FFB898C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-48-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-46-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-43-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-41-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-40-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-38-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-36-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-35-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-117-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-140-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-142-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-146-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-145-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-143-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-144-0x00007FFBCC130000-0x00007FFBCC325000-memory.dmp

        Filesize

        2.0MB

      • memory/4960-141-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB

      • memory/4960-139-0x00007FFB8C1B0000-0x00007FFB8C1C0000-memory.dmp

        Filesize

        64KB