Analysis

  • max time kernel
    163s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 10:05

General

  • Target

    7c3e2f25b38bcf552dfa900262f1d38d.exe

  • Size

    512KB

  • MD5

    7c3e2f25b38bcf552dfa900262f1d38d

  • SHA1

    91be266a488d497ba6d89b8081070e940ebe69c8

  • SHA256

    9b5aa9778fc519c831218453ea7f648d17025d42161aaba13faea55673193169

  • SHA512

    7591335e2bc68684a3977f23735408750446866ed838eb501b4c4e0f64cecff38a8eca025ebe35ec9caf16f9a6d46320c51c5e587b83a8f5bf6f79381766a1db

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm52

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c3e2f25b38bcf552dfa900262f1d38d.exe
    "C:\Users\Admin\AppData\Local\Temp\7c3e2f25b38bcf552dfa900262f1d38d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\SysWOW64\veusvceugb.exe
      veusvceugb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\auszkcik.exe
        C:\Windows\system32\auszkcik.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1728
    • C:\Windows\SysWOW64\ybrgtoerzeoyxwq.exe
      ybrgtoerzeoyxwq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1820
    • C:\Windows\SysWOW64\mgkzitvvlwguk.exe
      mgkzitvvlwguk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2740
    • C:\Windows\SysWOW64\auszkcik.exe
      auszkcik.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3808
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          1e1f767a7dd7755f4eb451a555716a05

          SHA1

          75e5d2a2ea19224f4f858dc9753eee6549a67a8c

          SHA256

          baecb932790468d9d04270e85898dcb72ede7517d03495ffbd3049abd47e6363

          SHA512

          0cd9363e123c509910e6056dbf3da40b00c5ccedbe2bb37247b81bfb2cd86c60ac05e02249b6f7cb9dac8270044be78b85d5e7a9a6fed5651b0e11e41600686d

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          094f438226f1c77e19f89fabc63ce084

          SHA1

          b4993c0a3fd7962195cf995702b25eab35054b51

          SHA256

          364ed9d190c443ee0140cc9c36c387efd15ac1155ce0691122a937d42f2301a0

          SHA512

          936bea0ac598e6332703672c9781398d5f07e723bc9fc8427394634c084c3d675e637a69d1b45b8019d625a34f19eee2aea7267225a3f7bb709ba300db64e8db

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          327ffc593ee4009c450f78aac6ba3337

          SHA1

          a20c336b55391450f03ba033074e2f030c6b0fa9

          SHA256

          f3eb2ee70f26377e3a82a0fdc8fb7ed947b4abb403551b9e6d076d39224be854

          SHA512

          ad5e9b612df1b43bf0651a6889f8ded42536a7111796e4b0239469bc2de2a669a264d94d515ff112fb6d1b8884ada8bd1d4c44ba36d1291bbecea2a0dd8d0139

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          9c59b969b091e1dc0107b3586199a4da

          SHA1

          72d7571a15bf8ea37703bdafcb1d9da67ed666bd

          SHA256

          0e633b0b26a1181ddb2929edd3a2158115661a0760e823f89f728bb8edd1353f

          SHA512

          4de8fffdfb8300912cc3a046dc873567891247dc323b62736036d9690f6cb399eb0228f93b13448056f26dc7a032fa9a6273bbdc8f1537d6d61a6d91471f4608

        • C:\Windows\SysWOW64\auszkcik.exe

          Filesize

          512KB

          MD5

          0369f7526604d4638b41b153b9d67739

          SHA1

          5c7953f3c0496d33538d246556ae329924c5f010

          SHA256

          ebe163da99f71fcd68e4f106348601aead18be68e3972fa143fe949506fcd242

          SHA512

          3ca3e389c6ed655b90ff7337dc66af2c655f2e5c7255cbff0723df144800731a8dc0a93ced594b650ddfd25c0ec556c97b4c06fa37167968574718eab83b9c89

        • C:\Windows\SysWOW64\mgkzitvvlwguk.exe

          Filesize

          512KB

          MD5

          406821a02a1747ce9b7e6bc265a27895

          SHA1

          033eab3bb66e6fdf6d50e3096e313f2ffcf4eafd

          SHA256

          c5457396785e4045a22cd011080a92fbf3e0ec967db1ee4e451b95767276045e

          SHA512

          ba6086c80b2a6184aa083a82154a87bb48c32fa74b4fc971bff5b24a9eaaa4b0b5a959292210854313f720bef59832327b228acfe8f60229421d75f0205e37de

        • C:\Windows\SysWOW64\veusvceugb.exe

          Filesize

          512KB

          MD5

          6a0b3f37bad5397e5311b34742619aad

          SHA1

          35089cc5332020a9983f5953f5ca0e236aeb486f

          SHA256

          9605913373ba90fb72bbf701b81824fc97df00f0840bab3404f4f632bcce0427

          SHA512

          392331758d3a9c153f9c559a41de9a8ada5a415ae9954134d3a624f58171a08d8f37b973f8abe680f7b263c09b886bfb682d6dce4c614d4b60101c8207b0bde9

        • C:\Windows\SysWOW64\ybrgtoerzeoyxwq.exe

          Filesize

          512KB

          MD5

          19bd5174ed2500278d2c45b108257e8a

          SHA1

          93c258f4bff9069d9f081417e0f3c622fef7d030

          SHA256

          b227853671e810dd1cca5bf85ced34e6f740322c8921bca3b080b7cdbbecea86

          SHA512

          dede80910a5530c29abc2e8709c9c01f519ec6eb90597ac45389c7d781e86b624466cb2aba078fa2e9f19265c49af657438e946aa7820e7b02718ef1a8915db7

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • memory/2756-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4424-39-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-40-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-44-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-45-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-46-0x00007FF97BA10000-0x00007FF97BA20000-memory.dmp

          Filesize

          64KB

        • memory/4424-41-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-42-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-56-0x00007FF97BA10000-0x00007FF97BA20000-memory.dmp

          Filesize

          64KB

        • memory/4424-64-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-68-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-69-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-43-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-38-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-37-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-118-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-119-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-121-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-122-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-123-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-120-0x00007FF97DA70000-0x00007FF97DA80000-memory.dmp

          Filesize

          64KB

        • memory/4424-124-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-125-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB

        • memory/4424-126-0x00007FF9BD9F0000-0x00007FF9BDBE5000-memory.dmp

          Filesize

          2.0MB