Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 02:11

General

  • Target

    2409e14c92ac27bfed5b9a2a592f92ce.exe

  • Size

    512KB

  • MD5

    2409e14c92ac27bfed5b9a2a592f92ce

  • SHA1

    bb2863d4842ed205ffe981e4177b1e02e109147e

  • SHA256

    d7193b6d13f06cc41927f3e959939766fc3a44afc0776daca03cc6b71d732650

  • SHA512

    f06345336e403f285d5b73eb17c0a94f086d129e304e1eb83807a11d7ef8fd7a3f773970b2764f9b0839a676107730042558c1e096264c797d21d9d2c21ba0d9

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2409e14c92ac27bfed5b9a2a592f92ce.exe
    "C:\Users\Admin\AppData\Local\Temp\2409e14c92ac27bfed5b9a2a592f92ce.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\SysWOW64\gnivfbyb.exe
      gnivfbyb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3488
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:400
    • C:\Windows\SysWOW64\isaaxizvfxvxc.exe
      isaaxizvfxvxc.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5064
    • C:\Windows\SysWOW64\lveoifruqcoqmdw.exe
      lveoifruqcoqmdw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3172
    • C:\Windows\SysWOW64\pclaguqkpi.exe
      pclaguqkpi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:116
  • C:\Windows\SysWOW64\gnivfbyb.exe
    C:\Windows\system32\gnivfbyb.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\gnivfbyb.exe

    Filesize

    92KB

    MD5

    59ebf1358a9b829f5709baaedeeee6fa

    SHA1

    1409fd65da1b814db0a08feae54366dfca196f1c

    SHA256

    d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

    SHA512

    a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

  • C:\Windows\SysWOW64\gnivfbyb.exe

    Filesize

    512KB

    MD5

    03f5d38696ab5b8c2e7b9f04d2338085

    SHA1

    f14a6e715df60b960fc9033f01264fe5c32555b9

    SHA256

    3e8450b7e2f040cbeb613cf4bb43ad766b7969b9ae7084f2ab3ab1c13d0370bb

    SHA512

    b8f25b3009301652db299ddbacf6e9ea8135407d1e21f36b8460e875a5c43f3b4a4ada6ab014d79c660ae298ce3d6cb0bcfc6d206d395f6cdff6028690366b3e

  • C:\Windows\SysWOW64\lveoifruqcoqmdw.exe

    Filesize

    385KB

    MD5

    279a2620e67ba2860803639715d616fb

    SHA1

    2d61471cafcc1c2fb06dd6ac75396f9e7c856f52

    SHA256

    399ca40a278578c7b9ec69d047c914ea58fcd007d6703c4fcd3db2a892a016f1

    SHA512

    bd2c40f12ad56957ec0c184c0f84fcaeed8bf39efd985fe14130e93f0ac568fc578d215defa208a168b171a5947dd0d0de5b5c46f304b5e9c3b6d377e5438a69

  • C:\Windows\SysWOW64\lveoifruqcoqmdw.exe

    Filesize

    512KB

    MD5

    7ad761648b0cb407fcf3b1d400575942

    SHA1

    073b08601842a7be543fcf7cf274d1b0a79c8801

    SHA256

    419cf72e6af28a227e5ade7b87ffaec6573842efc2e06cafff6bf305c8d5a1f4

    SHA512

    1d67765b97f59dd0fecd0ba26ae62b553d83b56c12bac62585980a75fc2e2023229efd5b672fe3f4f0f5127c6305f319bb62b1f73505a04cc77e45c28908e60e

  • C:\Windows\SysWOW64\pclaguqkpi.exe

    Filesize

    512KB

    MD5

    2a549a7fba68fe16886ba4816ee6a62a

    SHA1

    9544f0154b4d1047b3f125c01523bff08ef90e65

    SHA256

    6dcf076e54c17a362d10df29b0ad0dde08bcd91f7aa842e0bce680247415cb97

    SHA512

    fba4d71112afe0fd3907dc43633726fd6ff7fdadb490ae37a54c35f47ef63df9e2e77d5b448d919adab8ac727e3dde063d131e30a033fcec37d14390595d8a67

  • memory/400-59-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-50-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-44-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-47-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-49-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-51-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-52-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-53-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-54-0x00007FF899550000-0x00007FF899560000-memory.dmp

    Filesize

    64KB

  • memory/400-56-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-58-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-60-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-137-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-57-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-55-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-43-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-48-0x00007FF899550000-0x00007FF899560000-memory.dmp

    Filesize

    64KB

  • memory/400-46-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-45-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-42-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-38-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-37-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-36-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-35-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-41-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-112-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-142-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-141-0x00007FF8DBE30000-0x00007FF8DC025000-memory.dmp

    Filesize

    2.0MB

  • memory/400-140-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-139-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/400-138-0x00007FF89BEB0000-0x00007FF89BEC0000-memory.dmp

    Filesize

    64KB

  • memory/3180-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB