Analysis
-
max time kernel
0s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:45
Behavioral task
behavioral1
Sample
28b8ed75cd19b5757d211deee7434a97.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28b8ed75cd19b5757d211deee7434a97.exe
Resource
win10v2004-20231222-en
General
-
Target
28b8ed75cd19b5757d211deee7434a97.exe
-
Size
255KB
-
MD5
28b8ed75cd19b5757d211deee7434a97
-
SHA1
48c719e8196394fa6abc48dcd1e875ee44587fa3
-
SHA256
065a61e2f1aa4d6ccf47ef5d681deb57d81a24332fc069f0af730584589e1b6e
-
SHA512
1f717fe6afcae2422c5c24f9b5f8ebd3284c485c5279c394261710f1fd7a11592400fbcded6f72cead4d6762f98c04d94c903d53cc5b28331347a5f046e746e7
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ9:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1124 gedzgoewhe.exe 2860 kjaqocdwwbzonef.exe 4620 caprnkom.exe 4064 hwfvyiarevtwo.exe -
resource yara_rule behavioral2/memory/3816-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-24-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-34-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3816-32-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000023228-27.dat upx behavioral2/files/0x0007000000023221-18.dat upx behavioral2/files/0x0007000000023224-5.dat upx behavioral2/memory/4064-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4620-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-113-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4620-114-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-119-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-118-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4620-117-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-116-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-115-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-121-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-124-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-128-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-127-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4620-126-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-125-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4620-130-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3100-129-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-131-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-134-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-135-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-142-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-143-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-144-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-177-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-176-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-174-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-180-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-179-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-178-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-183-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-182-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-181-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4064-186-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-185-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-184-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2860-188-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1124-187-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
AutoIT Executable 53 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2860-24-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3816-32-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3100-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4620-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-113-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4620-114-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3100-119-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-118-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4620-117-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-116-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-115-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3100-121-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-124-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3100-128-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-127-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4620-126-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-125-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4620-130-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3100-129-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-131-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-134-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-135-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-142-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-143-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-144-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-177-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-176-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-174-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-180-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-179-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-178-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-183-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-182-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-181-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4064-186-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2860-185-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-184-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1124-187-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gedzgoewhe.exe 28b8ed75cd19b5757d211deee7434a97.exe File created C:\Windows\SysWOW64\kjaqocdwwbzonef.exe 28b8ed75cd19b5757d211deee7434a97.exe File opened for modification C:\Windows\SysWOW64\kjaqocdwwbzonef.exe 28b8ed75cd19b5757d211deee7434a97.exe File created C:\Windows\SysWOW64\caprnkom.exe 28b8ed75cd19b5757d211deee7434a97.exe File opened for modification C:\Windows\SysWOW64\caprnkom.exe 28b8ed75cd19b5757d211deee7434a97.exe File created C:\Windows\SysWOW64\hwfvyiarevtwo.exe 28b8ed75cd19b5757d211deee7434a97.exe File opened for modification C:\Windows\SysWOW64\hwfvyiarevtwo.exe 28b8ed75cd19b5757d211deee7434a97.exe File created C:\Windows\SysWOW64\gedzgoewhe.exe 28b8ed75cd19b5757d211deee7434a97.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 28b8ed75cd19b5757d211deee7434a97.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF9FCFB482682689031D72E7D94BCEFE137584166436242D79B" 28b8ed75cd19b5757d211deee7434a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78068B2FE6D21ACD179D1A78B7B9011" 28b8ed75cd19b5757d211deee7434a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193DC67914E7DBC7B9BE7FE3EDE737BA" 28b8ed75cd19b5757d211deee7434a97.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 28b8ed75cd19b5757d211deee7434a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C7D9C2D82556A4476A670232DD97D8664DC" 28b8ed75cd19b5757d211deee7434a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABEFABEF917F298837F3B42869F3E96B388028F42620349E1BF429E08D3" 28b8ed75cd19b5757d211deee7434a97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB1B12B44EE389953BFBAA0329AD7CB" 28b8ed75cd19b5757d211deee7434a97.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 1124 gedzgoewhe.exe 1124 gedzgoewhe.exe 1124 gedzgoewhe.exe 2860 kjaqocdwwbzonef.exe 2860 kjaqocdwwbzonef.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 3816 28b8ed75cd19b5757d211deee7434a97.exe 1124 gedzgoewhe.exe 1124 gedzgoewhe.exe 1124 gedzgoewhe.exe 2860 kjaqocdwwbzonef.exe 2860 kjaqocdwwbzonef.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1124 3816 28b8ed75cd19b5757d211deee7434a97.exe 28 PID 3816 wrote to memory of 1124 3816 28b8ed75cd19b5757d211deee7434a97.exe 28 PID 3816 wrote to memory of 1124 3816 28b8ed75cd19b5757d211deee7434a97.exe 28 PID 3816 wrote to memory of 2860 3816 28b8ed75cd19b5757d211deee7434a97.exe 27 PID 3816 wrote to memory of 2860 3816 28b8ed75cd19b5757d211deee7434a97.exe 27 PID 3816 wrote to memory of 2860 3816 28b8ed75cd19b5757d211deee7434a97.exe 27 PID 3816 wrote to memory of 4620 3816 28b8ed75cd19b5757d211deee7434a97.exe 26 PID 3816 wrote to memory of 4620 3816 28b8ed75cd19b5757d211deee7434a97.exe 26 PID 3816 wrote to memory of 4620 3816 28b8ed75cd19b5757d211deee7434a97.exe 26 PID 3816 wrote to memory of 4064 3816 28b8ed75cd19b5757d211deee7434a97.exe 25 PID 3816 wrote to memory of 4064 3816 28b8ed75cd19b5757d211deee7434a97.exe 25 PID 3816 wrote to memory of 4064 3816 28b8ed75cd19b5757d211deee7434a97.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\28b8ed75cd19b5757d211deee7434a97.exe"C:\Users\Admin\AppData\Local\Temp\28b8ed75cd19b5757d211deee7434a97.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:3220
-
-
C:\Windows\SysWOW64\hwfvyiarevtwo.exehwfvyiarevtwo.exe2⤵
- Executes dropped EXE
PID:4064
-
-
C:\Windows\SysWOW64\caprnkom.execaprnkom.exe2⤵
- Executes dropped EXE
PID:4620
-
-
C:\Windows\SysWOW64\kjaqocdwwbzonef.exekjaqocdwwbzonef.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2860
-
-
C:\Windows\SysWOW64\gedzgoewhe.exegedzgoewhe.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124
-
-
C:\Windows\SysWOW64\caprnkom.exeC:\Windows\system32\caprnkom.exe1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD57bc473e30ab68cdfb43623ca035f4369
SHA1929aa878d64fe496822673cb44255a868e64cdfb
SHA256c9395a24eef17fcce4c6ef0f23a4d6fcfc182fcacb6d41ef455fc13c97774b91
SHA5126425e3d5e9e38460fc269424a62ae8bf6012ed4bb47ae6be75719ea48cce7958631f2bb8804d56d68505044feba9894e10a60cf241cb2e1b4e8a22bdf893b883
-
Filesize
255KB
MD5bfb2bb7b4b7c4eea61006e8ba75bfe9e
SHA1e8a567964820d129e13d0ecff0433ee3a5b586f0
SHA2568d890f850f5563e8546340145e70394a4a31592739c475e79512af2562f0af21
SHA512fa4a2dffabd5d1d3bffa2b24bc46c526318f046606b5a506ef720de636ab92f4cea134e5d6a01e4ecd79c3cf923996eac9012439752972f4affb50ad9a63b0c2