Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
5c0f6d72b434499429a0d8c642d6ad57.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c0f6d72b434499429a0d8c642d6ad57.exe
Resource
win10v2004-20231215-en
General
-
Target
5c0f6d72b434499429a0d8c642d6ad57.exe
-
Size
512KB
-
MD5
5c0f6d72b434499429a0d8c642d6ad57
-
SHA1
c8356d85394613fc2890f1208d0002ea1a680ba9
-
SHA256
3c8b2411d5efcb418d713105aefc2e17f93d374268e194d7a700619141ae9e45
-
SHA512
aa6533d6380302afa7ba6772ec02b8f8b738c2b0e35d445a4e005fda144164d3fc8d455b19f51d45785b4558ff58dff8ba9534728bd8661b05bbfd260ad6b469
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6O:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5F
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" uyjrmaxiqv.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" uyjrmaxiqv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" uyjrmaxiqv.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" uyjrmaxiqv.exe -
Executes dropped EXE 4 IoCs
pid Process 2412 uyjrmaxiqv.exe 3032 lxikvpohgnsiapu.exe 2608 tkdtndjn.exe 2876 ialubugsvwtja.exe -
Loads dropped DLL 4 IoCs
pid Process 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" uyjrmaxiqv.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" uyjrmaxiqv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" uyjrmaxiqv.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2912-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0007000000014667-34.dat autoit_exe behavioral1/files/0x000a0000000143ec-39.dat autoit_exe behavioral1/files/0x00090000000141c0-32.dat autoit_exe behavioral1/files/0x000a000000013a71-26.dat autoit_exe behavioral1/files/0x0006000000015018-75.dat autoit_exe behavioral1/files/0x0006000000014ef8-69.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ialubugsvwtja.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File created C:\Windows\SysWOW64\uyjrmaxiqv.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File opened for modification C:\Windows\SysWOW64\uyjrmaxiqv.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File created C:\Windows\SysWOW64\lxikvpohgnsiapu.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File opened for modification C:\Windows\SysWOW64\lxikvpohgnsiapu.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File created C:\Windows\SysWOW64\tkdtndjn.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File opened for modification C:\Windows\SysWOW64\tkdtndjn.exe 5c0f6d72b434499429a0d8c642d6ad57.exe File created C:\Windows\SysWOW64\ialubugsvwtja.exe 5c0f6d72b434499429a0d8c642d6ad57.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 5c0f6d72b434499429a0d8c642d6ad57.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B1214795389F53BFBAD6329FD7C8" 5c0f6d72b434499429a0d8c642d6ad57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB9F9BCF964F192840F3A4186ED3999B08802FA4212034BE1CF459909D6" 5c0f6d72b434499429a0d8c642d6ad57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" uyjrmaxiqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" uyjrmaxiqv.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 5c0f6d72b434499429a0d8c642d6ad57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF8FFF9482C826D9141D65B7D92BCEEE634584066436334D7EC" 5c0f6d72b434499429a0d8c642d6ad57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F46BB8FE6A21ABD10ED1D48B7A9116" 5c0f6d72b434499429a0d8c642d6ad57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32462D089C2382226A3176D1772E2CD77C8F65DF" 5c0f6d72b434499429a0d8c642d6ad57.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" uyjrmaxiqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh uyjrmaxiqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc uyjrmaxiqv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg uyjrmaxiqv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C70814E2DBC7B9C17C93EC9637CB" 5c0f6d72b434499429a0d8c642d6ad57.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 3032 lxikvpohgnsiapu.exe 3032 lxikvpohgnsiapu.exe 3032 lxikvpohgnsiapu.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 2412 uyjrmaxiqv.exe 3032 lxikvpohgnsiapu.exe 3032 lxikvpohgnsiapu.exe 3032 lxikvpohgnsiapu.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe 2608 tkdtndjn.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2412 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 23 PID 2912 wrote to memory of 2412 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 23 PID 2912 wrote to memory of 2412 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 23 PID 2912 wrote to memory of 2412 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 23 PID 2912 wrote to memory of 3032 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 16 PID 2912 wrote to memory of 3032 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 16 PID 2912 wrote to memory of 3032 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 16 PID 2912 wrote to memory of 3032 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 16 PID 2912 wrote to memory of 2608 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 22 PID 2912 wrote to memory of 2608 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 22 PID 2912 wrote to memory of 2608 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 22 PID 2912 wrote to memory of 2608 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 22 PID 2912 wrote to memory of 2876 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 19 PID 2912 wrote to memory of 2876 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 19 PID 2912 wrote to memory of 2876 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 19 PID 2912 wrote to memory of 2876 2912 5c0f6d72b434499429a0d8c642d6ad57.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c0f6d72b434499429a0d8c642d6ad57.exe"C:\Users\Admin\AppData\Local\Temp\5c0f6d72b434499429a0d8c642d6ad57.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\lxikvpohgnsiapu.exelxikvpohgnsiapu.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3032
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2768
-
-
C:\Windows\SysWOW64\ialubugsvwtja.exeialubugsvwtja.exe2⤵
- Executes dropped EXE
PID:2876
-
-
C:\Windows\SysWOW64\tkdtndjn.exetkdtndjn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2608
-
-
C:\Windows\SysWOW64\uyjrmaxiqv.exeuyjrmaxiqv.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2412
-
-
C:\Windows\SysWOW64\tkdtndjn.exeC:\Windows\system32\tkdtndjn.exe1⤵PID:2760
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2700
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1824
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD57767d1cce46c5a88bd83156bee28b707
SHA18d356c6717bab522993d6006e616079ed8119edb
SHA25625cccef1cffdf65bd96ae2cbd5e94f127ab2cc3bf3d846b4b55f1697ebf4750b
SHA5122b2698c298bab9fead5bfc924376feb3db8fe063e0b6bbdf45c5fc2d620945c54cd64453531726f60cf66bb15aafcfdcffee0a9dfc0159dfc292dbc173fc39b5
-
Filesize
512KB
MD5afc3e5bfe5189b059de89b65186adc75
SHA1cbe67eaa7e513bfa64bed3c536f22eda271ea24a
SHA256d2e16bc58b783d458da39b937ecc778876ebdf0c02a5cf0837643336875c2c3f
SHA512c7c4dc07bb71cbb5af41933a51766f83f17124d75bd649b3283cde988dc3504c3927452ca74b51f6704b38bc39f98cd3f84fe2132356c5a549b6b67ac1e569b3
-
Filesize
512KB
MD520badd0b3517bb3fa89a7ebe418657d1
SHA1c8eac8ec70e3b909b5f3cb1efc3cdc2e971023ed
SHA2566ba26349c6c7ebb09cf2b9dd991fee3e1acc6380209e5e22861ccac172522318
SHA512f47b12334a6715bf71939e186ce623b491e86cfd9c38ebd65f4e8ab748e339c30af00b4c666cc3d1ede1105a8aab614c8f61481746b69b7d224b63bc5b644fe7
-
Filesize
512KB
MD528eb58f8a2248c05b388b72e4e5d4dc3
SHA1404fbe8302428276014a2d82878a90a200fe56e0
SHA256395fce9fa6f95bd4a489e39b04b48571fd875e3081f5cc3490f50bc88f703d97
SHA512c0c31f9bb8c2e2a1bab860ae6d5c4f6f17e09d921e59862acc0ee807f06b504a07947dbf585d8a52fbf0efa85df61d9b24c2242b4498935f8d440efcb05618cd
-
Filesize
512KB
MD5e51a09a2560846fd0b99cfc41d795f69
SHA156aff39a298917d8e18cd1584bf66dad7263f214
SHA2561438e57ad9b2b6b77616ffa41b921bbd31bc7110581a24fa7d8aaf85e710347d
SHA5120340b7a4c9ee6cae99e426e3712c9e19754d38e6d041499bfd868769f8446fcb8e5444e330ddef4d7c9618c1a3353ecbc0f79665099b55f5d5df38cf7ef8b380
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5a7668cb8822a4eda63d0c3ec465d1f27
SHA1f76b414f4ddf51fe9f3b5d88a07db9aaac9b5ca3
SHA256be21528d5393b831c5f3f70cb423d09321099920b7ca5ab52bcb52e8863bce72
SHA512ea1e4c44a72ee95ab5a06f842d84fc63c07c29165c4a4dce1d313664eb1f2e3234140a9574e93e259899fbff938859f5dd55fb314ec5763084161daf03422adb