Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/01/2024, 15:18

General

  • Target

    3ea9667a123232514bdb0155733965cc.exe

  • Size

    512KB

  • MD5

    3ea9667a123232514bdb0155733965cc

  • SHA1

    4bfcc2fe1c35cfb84f02f20e0ffa7dc8c102f896

  • SHA256

    a2befb5c75de6b5c5fd4580ee035689c0e43baf843c498428017fb37f00ba182

  • SHA512

    402f8ee17e3d89eb35f595fa0dd15625d982b3a77158e4ee3569600fd8b31b275966150232e39feeef0495907c137ddd81c621603354c74f6f73bbf5f1bd6db5

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ea9667a123232514bdb0155733965cc.exe
    "C:\Users\Admin\AppData\Local\Temp\3ea9667a123232514bdb0155733965cc.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\SysWOW64\ephqrdkoyj.exe
      ephqrdkoyj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Windows\SysWOW64\nzrjjvnm.exe
        C:\Windows\system32\nzrjjvnm.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2636
    • C:\Windows\SysWOW64\llwmlxnqhswdbwx.exe
      llwmlxnqhswdbwx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Windows\SysWOW64\nzrjjvnm.exe
      nzrjjvnm.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2648
    • C:\Windows\SysWOW64\ptdysizltudqv.exe
      ptdysizltudqv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2708
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      e7a54fd9adbad3f49078d8a53c8c24fe

      SHA1

      d491bf7d5564876e7dd0b888b33a8dbb55a4d1c7

      SHA256

      af61bbe6b2c3aba6add58aaaf5515b4a861a9cdbfeb70d371c38b37a598a9dca

      SHA512

      b38e29c21c4c1ed0d5e90fd62977bbff44b872db163b67fe417eb57375ae3c60db5d7cbc7869bd100f89fc84af2e8c55f70849147b4f6ce0c729bf78311438e5

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      8bd18cfa5d23cfaab8cbe7dfacefd077

      SHA1

      4f85a8a7f5ef42befab679c909c8d45d743820e7

      SHA256

      1bfcbfee48bc0cbe32c28f91bb8f10eecab3d43d4ffd560f9451ec74425fc697

      SHA512

      d97f7b3724d2e8a788b890f0ce66ebc5ebd154de07172a110297f1dcdff021bc3f7b5f4c92d84ce039a568f059333f1de322717053e9a3c918527bd13d2df5b3

    • C:\Users\Admin\AppData\Roaming\MergeLock.doc.exe

      Filesize

      512KB

      MD5

      44b88c5a42daf4eee8ad351be4b72e26

      SHA1

      1a2001de705cda35f3e9347ddc8958001f33d239

      SHA256

      bb0628b7c1f82438e18c893776a31fdd3f74e8f1e00ba599570c86929340d268

      SHA512

      91aed152b44c2e0d33c788a6e35c5140cd53f8e7c4746697f9af829871fd0d4b21ca1b3f3a961a5de09767903f8036ec9e6d045717ebee8cc7b7e9b7a9fdc66f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      9b217fe383f0993a8e8e9bb4d88a09e8

      SHA1

      db6eded46b3f8b970b71fd8c73d51da6ef3e5435

      SHA256

      bf6856f97373fbe70cf68eb395ced243e5bb16b5a41d2cf2900c4d99adde24bf

      SHA512

      ed3021cbc684907de856bd091e01993642d5a9e6c2b8994f65c3e9899543c054f39c0d11068ecca366b479a2aa0689f6b6102baba598ec73a466f335b74589bd

    • C:\Users\Admin\Documents\FormatSet.doc.exe

      Filesize

      512KB

      MD5

      50168787b57ddfdf5a38be24b03a1246

      SHA1

      100b992f0ce896fdc0dfa459062235c398d13bc9

      SHA256

      caea85fd74bbf67a66f4325fba0b76e3eeda4f1ad5610e2913daa3d15a2956b2

      SHA512

      fa2c8f199107d942d004568236b1072dfde9bfe7ffea3ebe85366c519c6e167fa05272f44672ab8b5a7b7a0c227b26c44374fbbe1bed45917e989679756fa701

    • C:\Windows\SysWOW64\llwmlxnqhswdbwx.exe

      Filesize

      512KB

      MD5

      9c7afd365e56fd0a6fbaeeb601d08074

      SHA1

      ffece807c2814935afac4f9687a95bad2b86971f

      SHA256

      4fcab5ba09faa8c9002b228cd3d1deceb274ce05b9df44694b8e5d7ea06084aa

      SHA512

      ccc54f1a5135e2ff3f9852c8d0160bed3f5b08f585cf6cbf6db644be8328878663218d35d0818d9b0a47ada7816796174fa19609a0cc05790f4f0fb9291a4e6b

    • C:\Windows\SysWOW64\ptdysizltudqv.exe

      Filesize

      512KB

      MD5

      4084818d84b5295f80994bf0ffec0e50

      SHA1

      41e3f590a3cec485580c7f68f197de17ef355d78

      SHA256

      ba803e79f1a17791fa9d1e63d83f4bce6503a2e800222ff5b0c5ad844fad7773

      SHA512

      791c74ba34b448ee58755ddca789bfb585c1e31da9e293edcb514f36da5a65d6e38d34e615b1c44673230a1bdce777a59d1539ccbcad11a598b6e2cb06dcadd9

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\ephqrdkoyj.exe

      Filesize

      512KB

      MD5

      31008baad95238ade45b13de70c0ef2c

      SHA1

      1fa524a5e6c2ec381b80dc074c99db323a229482

      SHA256

      2d6f514d79c862433790ad3f0fbf5d1e73255e3f883434c8f4b12a3f41611bc0

      SHA512

      303e405d22d107275af5e684602a6df9afd1c3f9871cff77043222c7ec09c8538e619f7c40fb8ead54d7ddd2d17c2a87ccdd881051afc244a3243d4e71064ebf

    • \Windows\SysWOW64\nzrjjvnm.exe

      Filesize

      512KB

      MD5

      316299e7c2bbf6f747c6bcb683ecf1da

      SHA1

      739d58bf2b0f6f51fa8cca41b768c4effbd9210c

      SHA256

      2e06eada3daf3aa507d772e934ca6212566b599c164ca2e841201ac8c0303ede

      SHA512

      1f5849b67ae7c569f14f7244730aec6121498d42f83b4197f899df7d2872c03d504fa3b21d5919d3efcbf4d77c122f64f4ca2eb60625030d284b1a1072f84c77

    • memory/1308-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2208-47-0x0000000070E1D000-0x0000000070E28000-memory.dmp

      Filesize

      44KB

    • memory/2208-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2208-45-0x000000002F0C1000-0x000000002F0C2000-memory.dmp

      Filesize

      4KB

    • memory/2208-87-0x0000000070E1D000-0x0000000070E28000-memory.dmp

      Filesize

      44KB

    • memory/2208-108-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB