Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2024 14:41

General

  • Target

    15ab0a725fb6a659909cc1faf2600910.exe

  • Size

    512KB

  • MD5

    15ab0a725fb6a659909cc1faf2600910

  • SHA1

    c7522e69040c0780f297937cd7c70a91fa44fc3e

  • SHA256

    caf8e784f7a32ab970dc20feb31848377f4705fd4c093a96123fcdd948be8e4a

  • SHA512

    3adfc2caaa45030e8346c01e8b791f541fb4f663c82d7ea33d72dfa477f355cbc82fb9fa5bbbae857882668930a4615eba245ad2b34583d05cd4208815423412

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6W:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15ab0a725fb6a659909cc1faf2600910.exe
    "C:\Users\Admin\AppData\Local\Temp\15ab0a725fb6a659909cc1faf2600910.exe"
    1⤵
      PID:4180
      • C:\Windows\SysWOW64\lvvaihqyul.exe
        lvvaihqyul.exe
        2⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3240
        • C:\Windows\SysWOW64\bhzkyluf.exe
          C:\Windows\system32\bhzkyluf.exe
          3⤵
          • Executes dropped EXE
          • Enumerates connected drives
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3732
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
        2⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4748
      • C:\Windows\SysWOW64\cfviuwtobndxl.exe
        cfviuwtobndxl.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4852
      • C:\Windows\SysWOW64\bhzkyluf.exe
        bhzkyluf.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4780
      • C:\Windows\SysWOW64\ugfhltjvqbvgujn.exe
        ugfhltjvqbvgujn.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      4f0aeb066d669139ea4a9f51203710f8

      SHA1

      55f7922d399bcc23b7f017d1dde0c1d9570731d1

      SHA256

      f81e2e5fe5cb8cdcc2c3c4fd9e80df0e0cb3e4a42ac467fc57645cc046ea1eae

      SHA512

      fa6cf111619a70763f82adb354e42fdaa88c7d03467eee5bbedc700f179591773c08b0d48ea8c3ea2194ccbd9ce02d4fea2369b7108ec42dd99b087aae0bcade

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      12b138a5a40ffb88d1850866bf2959cd

      SHA1

      57001ba2de61329118440de3e9f8a81074cb28a2

      SHA256

      9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

      SHA512

      9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      c968e8924e1d7c7c1094a05bb4dfd172

      SHA1

      b6a5883f20b1717d51415e9ae2f888ca8e8e066b

      SHA256

      5226ec930687229a53fbba0177aa0d8b8e4196f4f5f2179dc8cca0e3b4c3a955

      SHA512

      83b1853845bd2a00cb425b694fa9fad755f42f9c0be9e868f41ce9df78dc16eaa84ada930745da94444d989652268715c8d1442928abb535e3695fe64d8c0f5d

    • C:\Windows\SysWOW64\bhzkyluf.exe

      Filesize

      512KB

      MD5

      1936223300c6671f0c94f423bb81c1cb

      SHA1

      93936837be52cb592dca38c1ddafcd4927e0bf95

      SHA256

      41e3bc322368cb46404868bb14d38406da990159deec67949fbf57a695a0bb59

      SHA512

      be2c03325d6e85525bd19207dae9d51181e7deac3c08db96cb8b75532857faa8cf883f78b9c5540d4e5c60d3a2bf72ff060931b8a1174ad5485f726a9477bcdb

    • C:\Windows\SysWOW64\lvvaihqyul.exe

      Filesize

      381KB

      MD5

      30aec9e0b33fbd99234328357879f812

      SHA1

      3c9d37139d4ccfe2b694afba9633170d0f510a92

      SHA256

      15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

      SHA512

      2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

    • C:\Windows\SysWOW64\ugfhltjvqbvgujn.exe

      Filesize

      92KB

      MD5

      59ebf1358a9b829f5709baaedeeee6fa

      SHA1

      1409fd65da1b814db0a08feae54366dfca196f1c

      SHA256

      d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

      SHA512

      a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

    • C:\Windows\SysWOW64\ugfhltjvqbvgujn.exe

      Filesize

      94KB

      MD5

      adf240d1843e40ab9617e9dc12bc9b5b

      SHA1

      70923ac6636077728d2721b22d312002f735deea

      SHA256

      f53d3e249050f489475559b9c39548a2afb7157dbd9e87551ef5349fa76ccb62

      SHA512

      e2aec62114f1f6b5e94e0888efc2758e284835e0099abbfd3dd80cf3500a1e0d628c3ecb66b6b48fe051327746af38f2e953e1f816819c6b18126212621e7ccd

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      122e0d7f428c2d7c98733524c85975af

      SHA1

      2ac439e5732a4c0b33440fe3fb96e1f8ac8d0fa1

      SHA256

      b59cc85cc7a7ee5f1f97db0e343a03c32bb1c076127a28bb875f4e8fe9136821

      SHA512

      00621003896bad55221d651f8bf69d5a535aedabf085d8329913d61e3a93b3e6d59da6aa6a6e186120b10aafdcc7d465ff7da4fb6d4d63e1d4e26fd8f2b1de09

    • memory/4180-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/4748-41-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-51-0x00007FFB266D0000-0x00007FFB266E0000-memory.dmp

      Filesize

      64KB

    • memory/4748-38-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-35-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-37-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-39-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-50-0x00007FFB266D0000-0x00007FFB266E0000-memory.dmp

      Filesize

      64KB

    • memory/4748-143-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-48-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-45-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-42-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-40-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-47-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-49-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-46-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-115-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-116-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-117-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-139-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-140-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-141-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-142-0x00007FFB28E70000-0x00007FFB28E80000-memory.dmp

      Filesize

      64KB

    • memory/4748-36-0x00007FFB68DF0000-0x00007FFB68FE5000-memory.dmp

      Filesize

      2.0MB