Analysis

  • max time kernel
    160s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 10:36

General

  • Target

    3ca1017ce9db8d1410b6a80d36010a29.exe

  • Size

    512KB

  • MD5

    3ca1017ce9db8d1410b6a80d36010a29

  • SHA1

    e7c33a26079f18203552ad8a46826d68357ca112

  • SHA256

    2a3d618022b62a1229e1ff44a667540070672c2789707b82a2fae3bdde1acfd0

  • SHA512

    4f91de27eacb90480463c56b2763862a72ff8789500d0d64cd7ffeb180813eab877e3fe2c01a715c1d61f55220edc1faa13e28ca474217f716ab3700a076639b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj66:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ca1017ce9db8d1410b6a80d36010a29.exe
    "C:\Users\Admin\AppData\Local\Temp\3ca1017ce9db8d1410b6a80d36010a29.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\bstcdbtesd.exe
      bstcdbtesd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\vxvonjps.exe
        C:\Windows\system32\vxvonjps.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2428
    • C:\Windows\SysWOW64\rysbhsrkwqsyosq.exe
      rysbhsrkwqsyosq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1436
    • C:\Windows\SysWOW64\vxvonjps.exe
      vxvonjps.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2236
    • C:\Windows\SysWOW64\kutejmjsvfbif.exe
      kutejmjsvfbif.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4036
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    f3cc204ea25e332ffc3bb90ffae723ed

    SHA1

    7fc8e2d9d9e0c5fc014fe2add02468d45482e13f

    SHA256

    b77b16dafa2ac9f0b9b109d92699829e8a1c6cdb36f089ef433a9c105080c529

    SHA512

    8de722daf054d35a8e250bd3cfa2ab0852d1219ee79e04fd060959cc2d28c21ca5b468946da23fe457149c34cf9bce29cb2b88df192899f7086688c15c43b4c2

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    87e55c780b938707a25a312141508152

    SHA1

    a9a70175edd6f6be1a46aa45c9e49cf0c256c43f

    SHA256

    cfec24e65e86cc8e5fac5cc7810efd808a89bd06bb3f80567fd916d219ad3eea

    SHA512

    47eb6d515a34f1bd606c4db2f580773f37760726757f79683edd752afa38cd4c18cec65e8944bc07c0ef8228f4e85e37cb7c710d33fe48a536036def7c370dc9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    56b80b7e7550ec6dba5bda7b1569034d

    SHA1

    20ace4e1ad8ce35d4ccf302688c8cbc8352148f1

    SHA256

    442270d05eecd0deeddb1fb8992c6ceef1334deaf94ff7190dcad9bf32de7162

    SHA512

    4acee507a3243c40897dac541b2078da278d2637ee9ebbb0b2ec08baf92876f9349cc35da5c9dae1f21b578b19f636d2ca018269f01aa59991c5a6cf21cc8f07

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    0db13daf0d17d65066d3f5c690a149dc

    SHA1

    324c62d23ba8d18b6c17e905f1e2270edcce2e41

    SHA256

    ae2368c7fbbb6fbdbf1407c55a9ec062220340a6d6290680bd27483acf239d66

    SHA512

    99054df28a74c008a5caf7ef882f2f5942e63fbbc964a34515b1c6e02786c5741c5ec3ae512453491658e78be2c69967201623563bc7930f3c312a311f89be38

  • C:\Windows\SysWOW64\bstcdbtesd.exe

    Filesize

    512KB

    MD5

    2d6f6b7a80deb8e8597444a2780ac1dc

    SHA1

    c8b426eacb37b5878c5b04b9dd5809a892fe9235

    SHA256

    d9f924b0ef60080ee72f4ffd07943e42b63ac686b6ab30617ec9d9d032e505e6

    SHA512

    0a331bfaa2381c3af1d4b264b02a84be454472e1982a7a38b07893578de2e3092511d84ec27b352823bdca3a14d648a026e664830a7367dbfb26bb6e91a2b618

  • C:\Windows\SysWOW64\kutejmjsvfbif.exe

    Filesize

    512KB

    MD5

    2e5f3c2d6dd51ad2104a9ad5c7738129

    SHA1

    99ff9f5985e2e3967e6388903388eee2ba918d99

    SHA256

    f1bc89db2c47f8a921a69fdde0e885ef700e70a6d95751dca0a3fdccfd615de1

    SHA512

    9a15b772720a2b28354936646b0cedeb12475599ef863ad26873a5c300b9cc63c87342e1ff48b43055809181c4010f88643c701c43f42251c820cc4f73e4af09

  • C:\Windows\SysWOW64\rysbhsrkwqsyosq.exe

    Filesize

    128KB

    MD5

    33be84de0fa03c6883fec2ead970e3ba

    SHA1

    dbe35ed4343779aa93200c24966ccb805e18f223

    SHA256

    ef0f2733bf476c4dc632a27627cb24681d552719aafcc969eec5db1a90996887

    SHA512

    3e93ab8677009d404503e243038ae323b1bc55af56c8c53bd3d44f5313ed4383c987ccb1f1f0e86111fc36db67c7b1b76de4eb4b1c6742baadffd70d7dc6c093

  • C:\Windows\SysWOW64\rysbhsrkwqsyosq.exe

    Filesize

    512KB

    MD5

    3a30b4221b716c689438b00cb50d786e

    SHA1

    1cb39ca61a798debcc876bf270d7718f332f81fa

    SHA256

    ffee4f8aa9d706d386e8336f52df70b41c532b07baa79bac7b5c950f4069c136

    SHA512

    1e184389009951a88e15ffe5655539c6e6e9e627d93114748c49df186b5200174c5e394df187b7eba3af78f8c1e1a9946d6cb11e498ce73376703c2f62f6abc0

  • C:\Windows\SysWOW64\vxvonjps.exe

    Filesize

    512KB

    MD5

    41f85c90cdb9af6c574740df541cfa82

    SHA1

    626db7f45d55b1cbf43fa25dc3475f7c6e74ff01

    SHA256

    021629b79e8dae38ae8880f937e042fbe1d539ccbdb7da3f216111dfa578d4cd

    SHA512

    75e6c4f1d1b048d645b6db4c132d4cfd1cdf014403883ebb18ded67204ed9b105543d4ba9c0b81c7426a1c4aae36bc805272454110f440ad8f29e65ded0238fd

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/2376-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/5032-41-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-43-0x00007FFCAE310000-0x00007FFCAE320000-memory.dmp

    Filesize

    64KB

  • memory/5032-42-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/5032-40-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-54-0x00007FFCAE310000-0x00007FFCAE320000-memory.dmp

    Filesize

    64KB

  • memory/5032-62-0x00007FFCF0B90000-0x00007FFCF0D85000-memory.dmp

    Filesize

    2.0MB

  • memory/5032-38-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-39-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB

  • memory/5032-37-0x00007FFCB0C10000-0x00007FFCB0C20000-memory.dmp

    Filesize

    64KB