Analysis

  • max time kernel
    210s
  • max time network
    219s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2024 14:40

General

  • Target

    2b80011bbbee3f57ba7ee431b1e1904f.exe

  • Size

    512KB

  • MD5

    2b80011bbbee3f57ba7ee431b1e1904f

  • SHA1

    6bb90708595987f5f9a0dff7a7f738020433ed2f

  • SHA256

    0a927d7e6771b961587b4d6cf122083077ee92714c4ae2548767f636af9f9881

  • SHA512

    7fabbf7fb5cd692c7d6af3b2e26e9e73bf4f44bc67101d1a71bc64e908117445a2affa2cc3f0699f585fc305ac398cc4e6278e079ab8d45d556e5f1aeb256388

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6F:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5c

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b80011bbbee3f57ba7ee431b1e1904f.exe
    "C:\Users\Admin\AppData\Local\Temp\2b80011bbbee3f57ba7ee431b1e1904f.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\SysWOW64\rvghrrbdlj.exe
      rvghrrbdlj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:416
      • C:\Windows\SysWOW64\xwbweype.exe
        C:\Windows\system32\xwbweype.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1332
    • C:\Windows\SysWOW64\sokkkowlwjlscwl.exe
      sokkkowlwjlscwl.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c cgtlivbdvbrxs.exe
        3⤵
          PID:2020
      • C:\Windows\SysWOW64\xwbweype.exe
        xwbweype.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4384
      • C:\Windows\SysWOW64\cgtlivbdvbrxs.exe
        cgtlivbdvbrxs.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3252
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      1188f1ab15c3064827744f330755b1c1

      SHA1

      81089cd7096335c4e59f2df358c624472f8bd8b5

      SHA256

      d1843706a09bff9227b69ca243efb2dc35c32ac7de89937593b35097d40e1343

      SHA512

      76575072f9cec9d2ca6fea1869085d887e335f4c49771db8828068bcc039dc2a72d1b0afdbefdbdaf5cbd8853e3b7473356d9b0b9ba7e5eb3dcba4346357909d

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      216KB

      MD5

      5b9c43f3acda66288926108bbd9f64d4

      SHA1

      db391a04ba3434f316df01e0ec713ae2aff18ae0

      SHA256

      8f6da58c2e35705e5f94a8d1a20b6ceda1b5df3c2cbd886f3226689e22ee35bc

      SHA512

      11f80c9fd767a70bb5bf784f8975a63394ef0898b43a589f7054db3a0d1e390dfe043a04444437c7c238345c635064cafa0d8b70523ff346e5f53421d8ee6f5c

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      6d0dac17266cfa0b856e9e30cddb0439

      SHA1

      bdf661c912d73f7038219270ae53d3a62943b7b6

      SHA256

      eca69c8210d84ea7ed7c8640b11514893abb0446234b582e21cc56bae53f7878

      SHA512

      d63b3aca0681626a2fc7416e1df1c6d204bd15b3a97aafe28d656bb10b9ed73d670de65125e113198c5a1fe382b4c600e2a49e118b65e5c146d73545b07db414

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      43340c592f003ef9eedd51a11411d5d1

      SHA1

      cd42edd53f041e8a5c3a66de43f9a256d7f4dd78

      SHA256

      1fd34ed8c805ef5dc7e4d9ec8d9da448e481892cc4353e936d61181d44160c9d

      SHA512

      65859e3a4a0af144e38bc4a8bb3cff217dfe33ecdf6b63587a023905e4b2afbdb82a6293a88c86e40ba90c52558c967c720ff13a67b26c890c43d8b16c383506

    • C:\Windows\SysWOW64\cgtlivbdvbrxs.exe

      Filesize

      512KB

      MD5

      21c56716e338a1dc731492714fe0765e

      SHA1

      d2dbc31313fbd372174eca356abf849e0852f721

      SHA256

      0687ebbcab88e9536ab8a771f644e5ea6d959c3906966efc19ad28cde0d0e526

      SHA512

      925e5176f8c598fa9b566bbac0dc09fd167206c49f9da0a08e01cd1ccfbdd8253c1d9178c96a334f4471aaad14f1e8d3b1bc7b6e4c083f56bb1b0162c183e852

    • C:\Windows\SysWOW64\rvghrrbdlj.exe

      Filesize

      512KB

      MD5

      225f8231e521a33c83693fae0a7e2ffb

      SHA1

      bb3bee5c379da215c43d6b3a185f524d32edfd22

      SHA256

      e1f8f6e74ab710339bfc1627fd3006bd3d3066178b76300947eaf6f907126dea

      SHA512

      3ef9771556ed93182c823aa3f7d76dba7fc80ae4260bc53dda6a586e87f299e3d554ff371e35af81469d8b2631826c5aab6e888964cd930fcdf2b85a590a5dee

    • C:\Windows\SysWOW64\sokkkowlwjlscwl.exe

      Filesize

      512KB

      MD5

      f7a9f2925b2c800e2f717addd45314c2

      SHA1

      0835d070633f85d73af67357bd8b7f212874f564

      SHA256

      656f691d6930536363bda80c1362ac5b9df80ec5d5d278e2ed5f9d93d67276c1

      SHA512

      86cde80d5a035f8de0fe2b1c5adfde6e8c45ec9d4b2e97f56c1f4c38fe20b3c1734ae8cd11a93b4ca972ee49ef6f554f4619debcc05e605f07c674ddf9bf7d0f

    • C:\Windows\SysWOW64\xwbweype.exe

      Filesize

      512KB

      MD5

      70f3c547f09f0b30f66841ef245f99eb

      SHA1

      99e43cff3296bae42bed64d41042266d9a176ae6

      SHA256

      db1e68dcb2959e906578404ae40e304161a5f1de84f3ae3e8a0a96d65280f619

      SHA512

      2bf9622f6cf6692622e0cd9ede889faabbc5747b0b520d12b468299d95a1015796d6e1aea3373017be4ba7c8879b1868c0e89ee0a3bb1f52cf980d581ead7db2

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • memory/1464-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/4620-50-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-56-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-45-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-46-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-47-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-48-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-49-0x00007FFCDC570000-0x00007FFCDC580000-memory.dmp

      Filesize

      64KB

    • memory/4620-42-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-51-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-52-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-53-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-54-0x00007FFCDC570000-0x00007FFCDC580000-memory.dmp

      Filesize

      64KB

    • memory/4620-55-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-44-0x00007FFCDE670000-0x00007FFCDE680000-memory.dmp

      Filesize

      64KB

    • memory/4620-57-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-58-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-59-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-60-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-65-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-66-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-67-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-43-0x00007FFCDE670000-0x00007FFCDE680000-memory.dmp

      Filesize

      64KB

    • memory/4620-41-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-40-0x00007FFCDE670000-0x00007FFCDE680000-memory.dmp

      Filesize

      64KB

    • memory/4620-38-0x00007FFD1E5F0000-0x00007FFD1E7E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4620-39-0x00007FFCDE670000-0x00007FFCDE680000-memory.dmp

      Filesize

      64KB

    • memory/4620-37-0x00007FFCDE670000-0x00007FFCDE680000-memory.dmp

      Filesize

      64KB