Analysis

  • max time kernel
    162s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 08:05

General

  • Target

    45b5f66f35a83b37e94c3c6e634938e5.exe

  • Size

    512KB

  • MD5

    45b5f66f35a83b37e94c3c6e634938e5

  • SHA1

    e53a167d1bd7f8ff5496b6d637c7de712ab20bed

  • SHA256

    d97e4e4578b009a7c9c30b05773877f833fd4557f844cf68e2b2e177c8a2c07d

  • SHA512

    6806d8b80b450d195c6e21a65e88f68670a5010e15fdaa035434bf250ee1f60da6e7189cea85fd58787a8a6128f537d243c2a787fdc912eeaee06fb3f6a7a143

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6I:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45b5f66f35a83b37e94c3c6e634938e5.exe
    "C:\Users\Admin\AppData\Local\Temp\45b5f66f35a83b37e94c3c6e634938e5.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SysWOW64\anvifeymzj.exe
      anvifeymzj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\SysWOW64\mhaonbgm.exe
        C:\Windows\system32\mhaonbgm.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3608
    • C:\Windows\SysWOW64\owoxudbairwthve.exe
      owoxudbairwthve.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1148
    • C:\Windows\SysWOW64\mhaonbgm.exe
      mhaonbgm.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4024
    • C:\Windows\SysWOW64\ckxxfzsjhfqpi.exe
      ckxxfzsjhfqpi.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2352
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    ef8bacbe0d6970932f2b7eb7df968381

    SHA1

    fef9aec7f8764d513f9c8b379dc459c6925c8c0f

    SHA256

    50e83eff65ae9094210c5745667057b9a616b936d372b1df2fa6cccf01915438

    SHA512

    65b8aa535b3f6b201c9fe4b373b4285a41c25c4d0aaefa95c622c743f4dcd492dce723b4afb1c5897609bafdcf1a119063f277e357475abbd01c57a4f9a69e84

  • C:\Windows\SysWOW64\anvifeymzj.exe

    Filesize

    512KB

    MD5

    2fef7c0c601424a0ad00698310db8c04

    SHA1

    70baf8d3f0a6a96eb953a422bd2576a28d5fe523

    SHA256

    1fb0b20842f6e9e2ab885de95d4ecad4989cdc553ba4ae4f13f52dbaffd2ba3c

    SHA512

    8c00a2d6db461174a3a038fb5882d692048d4190f1f3479b62a3d05343d2d6c9944f29d1b833b12702a4e9230127dbcbab5b038121397e29dbedbf0907ebc4c7

  • C:\Windows\SysWOW64\ckxxfzsjhfqpi.exe

    Filesize

    512KB

    MD5

    a73d5077b390dc3c2bdec7cebcaa2274

    SHA1

    a62b5a255adaf99e01234557e76c951482c63d8c

    SHA256

    adff6dca53cd1726a541fb34bf844ff2d4ba965ba76364e975ff57362639418d

    SHA512

    24c470cec639286eb29472e4c64947c1b0ac422882fd8cfb6ff7f24ae247c48f337365dd521eb9538d0cf5b5094702891c25e9f6e42da48f1481e3e2efda5da3

  • C:\Windows\SysWOW64\mhaonbgm.exe

    Filesize

    512KB

    MD5

    c62286d07498348bc69a47b497b5f0ba

    SHA1

    4c12731189dd7c75ee26c75b59a5da0656f00191

    SHA256

    1b7a5e95d01c149be9643dbf267f210af99d43ccd58192b8c9e4d26ee1abf4a0

    SHA512

    011e7916487f0fa6b08ba6ab7b4851215b5a259259f4d39b3fc408418f6b84c16c4ddf007c486d2a13bfb29db55d818489fbcbbe4033e67f5aef231c80c0942a

  • C:\Windows\SysWOW64\owoxudbairwthve.exe

    Filesize

    512KB

    MD5

    931d49cc77ef20c43f04d767f1535631

    SHA1

    ec44b91e75c111a2465b4f9a01c3e41a90dc6954

    SHA256

    199052fa3f50f28f2fb6c2582d87549c7b9fb6e9257d9a87c837d78c50dd6027

    SHA512

    2a7eb081be893123a697a6b471ff513e0bbf953cb43c5d327e9b8ea2da79fb4af610b201d848e86619a4e6a62a9ea164ed592c69dde84cc2d5ef91e7aa67716d

  • memory/3988-42-0x00007FFC6C490000-0x00007FFC6C4A0000-memory.dmp

    Filesize

    64KB

  • memory/3988-48-0x00007FFC69EB0000-0x00007FFC69EC0000-memory.dmp

    Filesize

    64KB

  • memory/3988-40-0x00007FFC6C490000-0x00007FFC6C4A0000-memory.dmp

    Filesize

    64KB

  • memory/3988-37-0x00007FFC6C490000-0x00007FFC6C4A0000-memory.dmp

    Filesize

    64KB

  • memory/3988-41-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-45-0x00007FFC6C490000-0x00007FFC6C4A0000-memory.dmp

    Filesize

    64KB

  • memory/3988-46-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-44-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-43-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-73-0x00007FFC69EB0000-0x00007FFC69EC0000-memory.dmp

    Filesize

    64KB

  • memory/3988-47-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-39-0x00007FFC6C490000-0x00007FFC6C4A0000-memory.dmp

    Filesize

    64KB

  • memory/3988-49-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-50-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-51-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-52-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-53-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-54-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-55-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-56-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-57-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-58-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/3988-38-0x00007FFCAC410000-0x00007FFCAC605000-memory.dmp

    Filesize

    2.0MB

  • memory/4216-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB