Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
5c7621b4003a08922095e160be8a1474.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c7621b4003a08922095e160be8a1474.exe
Resource
win10v2004-20231215-en
General
-
Target
5c7621b4003a08922095e160be8a1474.exe
-
Size
512KB
-
MD5
5c7621b4003a08922095e160be8a1474
-
SHA1
0e6c17a860747f929dd3abe41da5926d27396f48
-
SHA256
bf35a155a6ea06ff48d879db20312a0007aa823d84e110f7835a1b552e26c605
-
SHA512
783066a4499df3c1b5867e50d3b4f19e96e2cef7dd22a8a0cf4c182d0713c398b986302452350963f95d2646df325be87575e63b881c87f212e96993683c6822
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2800 btyhcpfwlc.exe 2900 ozrlovrxqofuzul.exe 3844 oovppbgy.exe 4812 tucjyjimcnxng.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4680-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00090000000231f9-24.dat autoit_exe behavioral2/files/0x000d00000002315a-19.dat autoit_exe behavioral2/files/0x000d00000002315a-18.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tucjyjimcnxng.exe 5c7621b4003a08922095e160be8a1474.exe File created C:\Windows\SysWOW64\btyhcpfwlc.exe 5c7621b4003a08922095e160be8a1474.exe File opened for modification C:\Windows\SysWOW64\btyhcpfwlc.exe 5c7621b4003a08922095e160be8a1474.exe File created C:\Windows\SysWOW64\ozrlovrxqofuzul.exe 5c7621b4003a08922095e160be8a1474.exe File opened for modification C:\Windows\SysWOW64\ozrlovrxqofuzul.exe 5c7621b4003a08922095e160be8a1474.exe File created C:\Windows\SysWOW64\oovppbgy.exe 5c7621b4003a08922095e160be8a1474.exe File opened for modification C:\Windows\SysWOW64\oovppbgy.exe 5c7621b4003a08922095e160be8a1474.exe File created C:\Windows\SysWOW64\tucjyjimcnxng.exe 5c7621b4003a08922095e160be8a1474.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33412D7C9D2083576A3F77D070202DD97D8264DA" 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABAF9BEFE16F195837F3A4781993E99B38E02FB4315023CE2C4459E08A6" 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC4B15A449338E252CEBAD03292D4CF" 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF5FC82485A851B9031D72D7D9CBDE0E1315932664F6330D7EA" 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08168C6FF6721AAD17AD0A38B7F9060" 5c7621b4003a08922095e160be8a1474.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1848C67D14E6DBBEB9BC7CE6EDE234C8" 5c7621b4003a08922095e160be8a1474.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 Process not Found 4680 Process not Found 4680 Process not Found 4680 Process not Found -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 2800 btyhcpfwlc.exe 2800 btyhcpfwlc.exe 2800 btyhcpfwlc.exe 3844 oovppbgy.exe 2900 ozrlovrxqofuzul.exe 3844 oovppbgy.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 4680 5c7621b4003a08922095e160be8a1474.exe 2800 btyhcpfwlc.exe 2800 btyhcpfwlc.exe 2800 btyhcpfwlc.exe 3844 oovppbgy.exe 2900 ozrlovrxqofuzul.exe 3844 oovppbgy.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2800 4680 5c7621b4003a08922095e160be8a1474.exe 29 PID 4680 wrote to memory of 2800 4680 5c7621b4003a08922095e160be8a1474.exe 29 PID 4680 wrote to memory of 2800 4680 5c7621b4003a08922095e160be8a1474.exe 29 PID 4680 wrote to memory of 2900 4680 Process not Found 28 PID 4680 wrote to memory of 2900 4680 Process not Found 28 PID 4680 wrote to memory of 2900 4680 Process not Found 28 PID 4680 wrote to memory of 3844 4680 Process not Found 19 PID 4680 wrote to memory of 3844 4680 Process not Found 19 PID 4680 wrote to memory of 3844 4680 Process not Found 19 PID 4680 wrote to memory of 4812 4680 Process not Found 27 PID 4680 wrote to memory of 4812 4680 Process not Found 27 PID 4680 wrote to memory of 4812 4680 Process not Found 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c7621b4003a08922095e160be8a1474.exe"C:\Users\Admin\AppData\Local\Temp\5c7621b4003a08922095e160be8a1474.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\oovppbgy.exeoovppbgy.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4456
-
-
C:\Windows\SysWOW64\tucjyjimcnxng.exetucjyjimcnxng.exe2⤵
- Executes dropped EXE
PID:4812
-
-
C:\Windows\SysWOW64\ozrlovrxqofuzul.exeozrlovrxqofuzul.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2900
-
-
C:\Windows\SysWOW64\btyhcpfwlc.exebtyhcpfwlc.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2800
-
-
C:\Windows\SysWOW64\oovppbgy.exeC:\Windows\system32\oovppbgy.exe1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD530aec9e0b33fbd99234328357879f812
SHA13c9d37139d4ccfe2b694afba9633170d0f510a92
SHA25615aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563
SHA5122060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415
-
Filesize
92KB
MD559ebf1358a9b829f5709baaedeeee6fa
SHA11409fd65da1b814db0a08feae54366dfca196f1c
SHA256d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06
SHA512a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417