Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 13:03

General

  • Target

    4213e024bc4f015c556788cca0b65ecb.exe

  • Size

    512KB

  • MD5

    4213e024bc4f015c556788cca0b65ecb

  • SHA1

    33b9a14783b91d8c5adea252353a8ed1e4ce2d5b

  • SHA256

    f39cb551404435ca1292f4671d84519dac7969927ef5c622009b746338e89c4c

  • SHA512

    3b7c68c575285cee4c837f5e7969f11b650a0f9827d2314dc9426542ec897e5393585628f1306d5351efd00568270488d26cefeec416fe55456191ac7e367b55

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5K

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4213e024bc4f015c556788cca0b65ecb.exe
    "C:\Users\Admin\AppData\Local\Temp\4213e024bc4f015c556788cca0b65ecb.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\SysWOW64\gncywgfigj.exe
      gncywgfigj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Windows\SysWOW64\hynpczhl.exe
        C:\Windows\system32\hynpczhl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4240
    • C:\Windows\SysWOW64\khuajycwrlfoulw.exe
      khuajycwrlfoulw.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1984
    • C:\Windows\SysWOW64\hynpczhl.exe
      hynpczhl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4532
    • C:\Windows\SysWOW64\rqsekccsmkuib.exe
      rqsekccsmkuib.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5036
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    383KB

    MD5

    934ed045b796e575bf81d60cf435f0ef

    SHA1

    b1f193965dad0397fbe483ccdc48b59976d44f72

    SHA256

    1d10e104044b2243e721816a1554ae175093156947efb94337719dbc50231c48

    SHA512

    bce519556c5c7f8d3627cbd6bd96859a2124ab342b4acf033d5d6dae48972735dafcc6dcb010b18d76084c617a47548e89c7f89b7f09b77ba0b7a1a0329effbb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    0c59a5f4b604bdb95d678de25e7be485

    SHA1

    b2f63dc74e24096cfaec01add4039bb6b4221650

    SHA256

    4f67992a112a96b5f8fee2357028d149d02be8c07cfff8b729fc33ad27ab5561

    SHA512

    9e31d6948d8d5d1ad4b8ec7ee4910eebda596ca73fd23dd72401e400c661b993b04ce907aa796597773feb9ef6f598b0c852b091996ec03d6bf69b74d5054e4b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    3a409192e8631b18e8722da41cd5ffd9

    SHA1

    5d316d0344a1dfc563d4e4c373a72dce97d61672

    SHA256

    9a461ff1385505772d88b50e191efcc649977977f2e712ca72ca43fa60fb622d

    SHA512

    e0c127e8812f6d9572b96790be160c19fa717014107add7f55347ddcad5f51f34ad12fb2a68604ab567061f8760e3df489461cc742596c55688b78a1f1047018

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    7fd2e56b1e5a14a95379ac525634335d

    SHA1

    f1b8532b68c2698a11ee21e506f602a681d6ecb0

    SHA256

    fff229b9359ec0004df6bbff411c31e7919512886b08276b5eb884928bc0b6dd

    SHA512

    453e58878d8ca74392d64e7b7ddb1749decd7dcfc3676dd5890cb7eed76a483258352b231933c173bcec5e1ddff2484b5fd619760a1ca6671fc1b33307a12621

  • C:\Windows\SysWOW64\gncywgfigj.exe

    Filesize

    512KB

    MD5

    6315e3cc3d1b7822cc0f9540fbfc0e2f

    SHA1

    5f0493536e05045f609428601d20b0a7dd5779dd

    SHA256

    0b47eeeb659330ccdc26d7b53c788f86be69d729fcb5a8789103681507150827

    SHA512

    a4323e6c66ac295d9ea35632e9ed6e1ea984e039d972cec73e6d6be9d60f46e48e63ed1130963aabef0e99ffd4d0a9260366dd367ca546f7c8ba4768aea6fa92

  • C:\Windows\SysWOW64\hynpczhl.exe

    Filesize

    512KB

    MD5

    4ccb062f33382762b99ad75f1ba2a5cb

    SHA1

    45f3f1390b0c11e307cce0c710c4cbe1bd42a1c8

    SHA256

    cfcaa4d91905368d5a138a492a2f5d9ee94a255a781f3047854b5f308cf3f77b

    SHA512

    ac3d004b5648147d8376fe4a56845c07cfc3f1ba397300783c8680a96aa826318344098bde2e88d96e9d0201c3e2b475aef78fbf73ad411ef4821800430d25ce

  • C:\Windows\SysWOW64\khuajycwrlfoulw.exe

    Filesize

    512KB

    MD5

    ef509e18c2b55c52b5bd36514d39f554

    SHA1

    5cc324e803456f8efa2ad1a25eff0edac652e025

    SHA256

    4e2343816242c2f00be561d483e8794e0a9bad5a3440b6fe3c23b9899ced0c2f

    SHA512

    67d8188c910d8f2581165abf59c3f25a753cdab45dcbb02e059e840d2924ec88635d002d6b7b510d508340db2f2f86c2e618459c2b641d1cb03b0895f22c7494

  • C:\Windows\SysWOW64\rqsekccsmkuib.exe

    Filesize

    512KB

    MD5

    cd48a287cabfd9bc2f7d9d3ad6ab95a9

    SHA1

    0e6721a6e68fd2142ded21d7a4541181995ffa90

    SHA256

    19f7ee2a9192ba7a86effb2dfc778658400c5e6d7a7aab00ae55134642d724b1

    SHA512

    249f6dd773ca41ec78fc999724a36f89c12d863ea90f38c7d8e4038009911d07a3aeb6c45e6dbb3c718483f5b49befa93986ffda02b500936207ad10e4ef1a44

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Users\Admin\Documents\AddUse.doc.exe

    Filesize

    512KB

    MD5

    fe29cdf8017f8f31091f290c3cac1d15

    SHA1

    52146e32d0818af70a9e90fed1c15706818c81b4

    SHA256

    9dbf33d090be2c3c67d3e0bd0261433d866d2d4b325eb7aec69e5322c69f5362

    SHA512

    e6af8749e211d336d716e2ba8a43eeb3ffae868545fda0a928662d4c349c11f33f704c50e96ae3434bdac5a03daa13781f779a37b393bc0c6d3812c5fded093c

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    356718f4d82e9e2b1144d84cdffb0ada

    SHA1

    ba0fdc7d0bb02662ae351cd1574d565e20bcaffc

    SHA256

    96eba40027a93b58bbcd5d7360e8a6c3935cd696dc8f5ab82cc566a8ed34e85b

    SHA512

    5416aab5afa11ed7d340fe2276ffc7ec41b9b9374611f5cf2a194a32e5a870330cccbfd27cab0a73acbd635269da180ba4f3a4f8e2f924548fe9e5cded74a97b

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    af61e9b7d91289c0ffb2eb2ec7b29eea

    SHA1

    46fb2b9a0d0df0a4eda6acb8122851bf51edc7ea

    SHA256

    6735b03ca974077bac795a216c32fefc34aa4e8775ff7c55dd081139f84771b8

    SHA512

    d37a4c6a33c829f4102ee824de6d7a1d1fe0f67627d4a6db53696a463b64371c4ec9a09e4e5628d26c18a0b443d40bdb171ec388d18dcedbf4bc057107516e75

  • memory/2884-36-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-39-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-45-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-43-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-47-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-49-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-50-0x00007FFB153D0000-0x00007FFB153E0000-memory.dmp

    Filesize

    64KB

  • memory/2884-51-0x00007FFB153D0000-0x00007FFB153E0000-memory.dmp

    Filesize

    64KB

  • memory/2884-41-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-42-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-40-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-145-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-37-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-44-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-38-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-35-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-114-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-115-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-116-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-138-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-139-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-141-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-142-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-143-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/2884-140-0x00007FFB17D30000-0x00007FFB17D40000-memory.dmp

    Filesize

    64KB

  • memory/2884-144-0x00007FFB57CB0000-0x00007FFB57EA5000-memory.dmp

    Filesize

    2.0MB

  • memory/5088-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB