Analysis

  • max time kernel
    0s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 09:58

General

  • Target

    6530bee7e1be1c0ad8ee8bf3112c8f99.exe

  • Size

    512KB

  • MD5

    6530bee7e1be1c0ad8ee8bf3112c8f99

  • SHA1

    4688b181b59ee7e3eab0b6261643158d248a0dce

  • SHA256

    1352c2619563807f4c4157281dc09b5851d6a36d160fa570e5bf86280d2df0e5

  • SHA512

    1f447e9c93d3de0ea4031e032eec68f35e29a02bcc2e41db78a4bfd14643d1cd690054c70eba653eb9e3775f109d7efc8a43ef3206d344af0cac2bc94d3bac88

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj61:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\SysWOW64\vknstruocoapb.exe
    vknstruocoapb.exe
    1⤵
    • Executes dropped EXE
    PID:2688
  • C:\Windows\SysWOW64\sqxgzlfj.exe
    C:\Windows\system32\sqxgzlfj.exe
    1⤵
    • Executes dropped EXE
    PID:2716
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
    1⤵
      PID:2528
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:852
      • C:\Windows\SysWOW64\sqxgzlfj.exe
        sqxgzlfj.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2680
      • C:\Windows\SysWOW64\uqqixkpcrtozfon.exe
        uqqixkpcrtozfon.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2740
      • C:\Windows\SysWOW64\qhiqpqgazq.exe
        qhiqpqgazq.exe
        1⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1204
      • C:\Users\Admin\AppData\Local\Temp\6530bee7e1be1c0ad8ee8bf3112c8f99.exe
        "C:\Users\Admin\AppData\Local\Temp\6530bee7e1be1c0ad8ee8bf3112c8f99.exe"
        1⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2148

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\qhiqpqgazq.exe

        Filesize

        512KB

        MD5

        f437f9a64b767de8f760f16eb411ca10

        SHA1

        188d1a909369993d5c262bfcf2fbf4dcaca2c4e5

        SHA256

        215acf9bf346cca04dbf33db1cd4657486ca509a88e9b024869f2a336892aa02

        SHA512

        48ea1692e30145d43683573162d9aed73db4004f58c141ba8eb8b10aab47addb9b640de7bb0c89b92aac6614abb20fc99683982012d3ec89f29ebcd94d65e469

      • C:\Windows\SysWOW64\uqqixkpcrtozfon.exe

        Filesize

        382KB

        MD5

        badd716c7c48a8241873d9251da496d1

        SHA1

        6bd2a072c8f64a1780fe75d983cb7b6584985c6d

        SHA256

        ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7

        SHA512

        7bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5

      • \Windows\SysWOW64\uqqixkpcrtozfon.exe

        Filesize

        381KB

        MD5

        30aec9e0b33fbd99234328357879f812

        SHA1

        3c9d37139d4ccfe2b694afba9633170d0f510a92

        SHA256

        15aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563

        SHA512

        2060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415

      • memory/2148-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/2528-44-0x000000002FAF1000-0x000000002FAF2000-memory.dmp

        Filesize

        4KB

      • memory/2528-45-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2528-46-0x0000000070B6D000-0x0000000070B78000-memory.dmp

        Filesize

        44KB

      • memory/2528-78-0x0000000070B6D000-0x0000000070B78000-memory.dmp

        Filesize

        44KB

      • memory/2528-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB