Analysis

  • max time kernel
    0s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 10:50

General

  • Target

    456100149c888632d506e284a781f8ba.exe

  • Size

    512KB

  • MD5

    456100149c888632d506e284a781f8ba

  • SHA1

    7df789ab96b880fca25d777c1f3eb3061e8c1912

  • SHA256

    706ebd55037495d00ac11c9218bd3838ab6dfc6f3ef81a7f987dab11330a435d

  • SHA512

    df390377afb52d81a593cda4db37bd0ba29c103c084f51c6357be85aba69121755266cf2e0dea26ab77fbe8ab4efd1288ad6886b803a28df25c4e0f9b29ae803

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\456100149c888632d506e284a781f8ba.exe
    "C:\Users\Admin\AppData\Local\Temp\456100149c888632d506e284a781f8ba.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:3592
      • C:\Windows\SysWOW64\anjnvhcxpcbfi.exe
        anjnvhcxpcbfi.exe
        2⤵
        • Executes dropped EXE
        PID:4088
      • C:\Windows\SysWOW64\xaaxjbvq.exe
        xaaxjbvq.exe
        2⤵
        • Executes dropped EXE
        PID:4856
      • C:\Windows\SysWOW64\asofmhefoiewdqt.exe
        asofmhefoiewdqt.exe
        2⤵
        • Executes dropped EXE
        PID:1288
      • C:\Windows\SysWOW64\ngvvibeiic.exe
        ngvvibeiic.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4940
    • C:\Windows\SysWOW64\xaaxjbvq.exe
      C:\Windows\system32\xaaxjbvq.exe
      1⤵
        PID:5076

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\ngvvibeiic.exe

        Filesize

        92KB

        MD5

        59ebf1358a9b829f5709baaedeeee6fa

        SHA1

        1409fd65da1b814db0a08feae54366dfca196f1c

        SHA256

        d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06

        SHA512

        a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417

      • memory/208-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/3592-48-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-143-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-39-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-43-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-45-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-50-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-52-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-54-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-53-0x00007FFE41490000-0x00007FFE414A0000-memory.dmp

        Filesize

        64KB

      • memory/3592-51-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-55-0x00007FFE41490000-0x00007FFE414A0000-memory.dmp

        Filesize

        64KB

      • memory/3592-49-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-40-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-35-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-47-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-44-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-42-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-41-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-36-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-115-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-116-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-117-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-144-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-46-0x00007FFE835D0000-0x00007FFE837C5000-memory.dmp

        Filesize

        2.0MB

      • memory/3592-142-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-141-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-140-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB

      • memory/3592-139-0x00007FFE43650000-0x00007FFE43660000-memory.dmp

        Filesize

        64KB