Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
22ed4e3f3bf70565d7b06ac317f93aec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22ed4e3f3bf70565d7b06ac317f93aec.exe
Resource
win10v2004-20231222-en
General
-
Target
22ed4e3f3bf70565d7b06ac317f93aec.exe
-
Size
512KB
-
MD5
22ed4e3f3bf70565d7b06ac317f93aec
-
SHA1
f6efda263c340f6d560aac158b82dffafe110794
-
SHA256
f629280bd3147000718ec60d7e6fbdd26f36580c15c6d903b8c6f1e27ae857da
-
SHA512
b49c958bd6b3d3d06e74ac52c2c4fe4ed7659373f09fb74767224e85e2191e6ca8738ee38a463f97b63de15111c7a255066b1cecf95a1dc93aaca4c0f0ae0c38
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5108 ehjdwqhqlj.exe 1340 rpughzjranjwfvx.exe 4404 hyxmwwhp.exe 2356 mrcdzcneesqey.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3676-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hyxmwwhp.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\mrcdzcneesqey.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\mrcdzcneesqey.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\ehjdwqhqlj.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\ehjdwqhqlj.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\rpughzjranjwfvx.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\rpughzjranjwfvx.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\hyxmwwhp.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462C0B9C2383206D4477D1702E2DDF7D8264AA" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCEF9CBFE13F1E783783A4B86EA3E93B08E02FA4362023EE1C845E609A2" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B05844E639EF52C9B9D5329DD4BF" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFCFC485A856E9032D75D7DE2BD93E137584466466344D69D" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7866BB4FF1D21D9D278D0D48A7F9011" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1849C77515E5DBC4B8C87CE5ECE734C6" 22ed4e3f3bf70565d7b06ac317f93aec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 1340 rpughzjranjwfvx.exe 1340 rpughzjranjwfvx.exe 1340 rpughzjranjwfvx.exe 4404 hyxmwwhp.exe 5108 ehjdwqhqlj.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 1340 rpughzjranjwfvx.exe 1340 rpughzjranjwfvx.exe 1340 rpughzjranjwfvx.exe 4404 hyxmwwhp.exe 5108 ehjdwqhqlj.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3676 wrote to memory of 5108 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 28 PID 3676 wrote to memory of 5108 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 28 PID 3676 wrote to memory of 5108 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 28 PID 3676 wrote to memory of 1340 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 27 PID 3676 wrote to memory of 1340 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 27 PID 3676 wrote to memory of 1340 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 27 PID 3676 wrote to memory of 4404 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 26 PID 3676 wrote to memory of 4404 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 26 PID 3676 wrote to memory of 4404 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 26 PID 3676 wrote to memory of 2356 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 21 PID 3676 wrote to memory of 2356 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 21 PID 3676 wrote to memory of 2356 3676 22ed4e3f3bf70565d7b06ac317f93aec.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\mrcdzcneesqey.exemrcdzcneesqey.exe2⤵
- Executes dropped EXE
PID:2356
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4960
-
-
C:\Windows\SysWOW64\hyxmwwhp.exehyxmwwhp.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4404
-
-
C:\Windows\SysWOW64\rpughzjranjwfvx.exerpughzjranjwfvx.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1340
-
-
C:\Windows\SysWOW64\ehjdwqhqlj.exeehjdwqhqlj.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5108
-
-
C:\Windows\SysWOW64\hyxmwwhp.exeC:\Windows\system32\hyxmwwhp.exe1⤵PID:1384