Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
9d1745465d5f57a9966eb3b6d7bd4779.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9d1745465d5f57a9966eb3b6d7bd4779.exe
Resource
win10v2004-20231215-en
General
-
Target
9d1745465d5f57a9966eb3b6d7bd4779.exe
-
Size
512KB
-
MD5
9d1745465d5f57a9966eb3b6d7bd4779
-
SHA1
d535d2d1265d23b5f3f8656387146c442bce2d15
-
SHA256
983ae865d66db88250cf897ae4133a3a27cd1b4489946edca65c835c5ec4de2b
-
SHA512
1ea95e820b8e5994873178655c6fb935c6fec3194de09ec45da9ed878f0494d5126717ef461f063218a725d8901d184594d7e2b057e3c3975bc8a5cce1d5864e
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6X:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" pfnwnqmzhd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" pfnwnqmzhd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pfnwnqmzhd.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pfnwnqmzhd.exe -
Executes dropped EXE 4 IoCs
pid Process 2764 pfnwnqmzhd.exe 2756 sxyvxperhupbaeo.exe 2336 gcbwilrt.exe 2008 zgnblqzugqwdr.exe -
Loads dropped DLL 4 IoCs
pid Process 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" pfnwnqmzhd.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" pfnwnqmzhd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" pfnwnqmzhd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2508-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\sxyvxperhupbaeo.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File opened for modification C:\Windows\SysWOW64\sxyvxperhupbaeo.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File created C:\Windows\SysWOW64\gcbwilrt.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File opened for modification C:\Windows\SysWOW64\gcbwilrt.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File created C:\Windows\SysWOW64\zgnblqzugqwdr.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File opened for modification C:\Windows\SysWOW64\zgnblqzugqwdr.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File created C:\Windows\SysWOW64\pfnwnqmzhd.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe File opened for modification C:\Windows\SysWOW64\pfnwnqmzhd.exe 9d1745465d5f57a9966eb3b6d7bd4779.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 9d1745465d5f57a9966eb3b6d7bd4779.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pfnwnqmzhd.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 9d1745465d5f57a9966eb3b6d7bd4779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C70B1593DAB7B9C07FE6EC9F34CD" 9d1745465d5f57a9966eb3b6d7bd4779.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" pfnwnqmzhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32432C7E9C2782586A3277D170542DAD7D8664DD" 9d1745465d5f57a9966eb3b6d7bd4779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCDF9BCFE64F2E484783A41869E3E93B0FE03F14268033BE1CF429E08A5" 9d1745465d5f57a9966eb3b6d7bd4779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F268C3FE1A21DFD273D0D28A7D9063" 9d1745465d5f57a9966eb3b6d7bd4779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pfnwnqmzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B1294797389E53BEBAA533E8D4BB" 9d1745465d5f57a9966eb3b6d7bd4779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FFBFFFB482E85139134D65F7EE6BC93E135584666406343D6ED" 9d1745465d5f57a9966eb3b6d7bd4779.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc pfnwnqmzhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf pfnwnqmzhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs pfnwnqmzhd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2756 sxyvxperhupbaeo.exe 2756 sxyvxperhupbaeo.exe 2756 sxyvxperhupbaeo.exe 2336 gcbwilrt.exe 2336 gcbwilrt.exe 2336 gcbwilrt.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2764 pfnwnqmzhd.exe 2756 sxyvxperhupbaeo.exe 2756 sxyvxperhupbaeo.exe 2756 sxyvxperhupbaeo.exe 2336 gcbwilrt.exe 2336 gcbwilrt.exe 2336 gcbwilrt.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2764 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 22 PID 2508 wrote to memory of 2764 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 22 PID 2508 wrote to memory of 2764 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 22 PID 2508 wrote to memory of 2764 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 22 PID 2508 wrote to memory of 2756 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 21 PID 2508 wrote to memory of 2756 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 21 PID 2508 wrote to memory of 2756 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 21 PID 2508 wrote to memory of 2756 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 21 PID 2508 wrote to memory of 2336 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 20 PID 2508 wrote to memory of 2336 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 20 PID 2508 wrote to memory of 2336 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 20 PID 2508 wrote to memory of 2336 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 20 PID 2508 wrote to memory of 2008 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 17 PID 2508 wrote to memory of 2008 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 17 PID 2508 wrote to memory of 2008 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 17 PID 2508 wrote to memory of 2008 2508 9d1745465d5f57a9966eb3b6d7bd4779.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d1745465d5f57a9966eb3b6d7bd4779.exe"C:\Users\Admin\AppData\Local\Temp\9d1745465d5f57a9966eb3b6d7bd4779.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2140
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2224
-
-
-
C:\Windows\SysWOW64\zgnblqzugqwdr.exezgnblqzugqwdr.exe2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\SysWOW64\gcbwilrt.exegcbwilrt.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2336
-
-
C:\Windows\SysWOW64\sxyvxperhupbaeo.exesxyvxperhupbaeo.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2756
-
-
C:\Windows\SysWOW64\pfnwnqmzhd.exepfnwnqmzhd.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2764
-
-
C:\Windows\SysWOW64\gcbwilrt.exeC:\Windows\system32\gcbwilrt.exe1⤵PID:2576
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:864