Analysis
-
max time kernel
0s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
456100149c888632d506e284a781f8ba.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
456100149c888632d506e284a781f8ba.exe
Resource
win10v2004-20231215-en
General
-
Target
456100149c888632d506e284a781f8ba.exe
-
Size
512KB
-
MD5
456100149c888632d506e284a781f8ba
-
SHA1
7df789ab96b880fca25d777c1f3eb3061e8c1912
-
SHA256
706ebd55037495d00ac11c9218bd3838ab6dfc6f3ef81a7f987dab11330a435d
-
SHA512
df390377afb52d81a593cda4db37bd0ba29c103c084f51c6357be85aba69121755266cf2e0dea26ab77fbe8ab4efd1288ad6886b803a28df25c4e0f9b29ae803
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj65:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Y
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4940 ngvvibeiic.exe 1288 asofmhefoiewdqt.exe 4856 xaaxjbvq.exe 4088 anjnvhcxpcbfi.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/208-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000c00000002315a-18.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\anjnvhcxpcbfi.exe 456100149c888632d506e284a781f8ba.exe File created C:\Windows\SysWOW64\ngvvibeiic.exe 456100149c888632d506e284a781f8ba.exe File opened for modification C:\Windows\SysWOW64\ngvvibeiic.exe 456100149c888632d506e284a781f8ba.exe File created C:\Windows\SysWOW64\asofmhefoiewdqt.exe 456100149c888632d506e284a781f8ba.exe File opened for modification C:\Windows\SysWOW64\asofmhefoiewdqt.exe 456100149c888632d506e284a781f8ba.exe File created C:\Windows\SysWOW64\xaaxjbvq.exe 456100149c888632d506e284a781f8ba.exe File opened for modification C:\Windows\SysWOW64\xaaxjbvq.exe 456100149c888632d506e284a781f8ba.exe File created C:\Windows\SysWOW64\anjnvhcxpcbfi.exe 456100149c888632d506e284a781f8ba.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 456100149c888632d506e284a781f8ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC70B14E7DAC5B8CF7C95EDE737CF" 456100149c888632d506e284a781f8ba.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 456100149c888632d506e284a781f8ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33342C7F9D5682596A3576D270232CD77D8764DA" 456100149c888632d506e284a781f8ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB4F9CEF962F1E4837D3B32869E3997B08002FD4314023EE1CA459A09D5" 456100149c888632d506e284a781f8ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B12B47EF38EA53C4BAD03393D4BC" 456100149c888632d506e284a781f8ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FF89482A851F9045D72F7D96BCE5E632594467456341D79D" 456100149c888632d506e284a781f8ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78068B1FE1D22D8D279D0A58A789016" 456100149c888632d506e284a781f8ba.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 4940 ngvvibeiic.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 208 456100149c888632d506e284a781f8ba.exe 4940 ngvvibeiic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 208 wrote to memory of 4940 208 456100149c888632d506e284a781f8ba.exe 29 PID 208 wrote to memory of 4940 208 456100149c888632d506e284a781f8ba.exe 29 PID 208 wrote to memory of 4940 208 456100149c888632d506e284a781f8ba.exe 29 PID 208 wrote to memory of 1288 208 456100149c888632d506e284a781f8ba.exe 28 PID 208 wrote to memory of 1288 208 456100149c888632d506e284a781f8ba.exe 28 PID 208 wrote to memory of 1288 208 456100149c888632d506e284a781f8ba.exe 28 PID 208 wrote to memory of 4856 208 456100149c888632d506e284a781f8ba.exe 27 PID 208 wrote to memory of 4856 208 456100149c888632d506e284a781f8ba.exe 27 PID 208 wrote to memory of 4856 208 456100149c888632d506e284a781f8ba.exe 27 PID 208 wrote to memory of 4088 208 456100149c888632d506e284a781f8ba.exe 25 PID 208 wrote to memory of 4088 208 456100149c888632d506e284a781f8ba.exe 25 PID 208 wrote to memory of 4088 208 456100149c888632d506e284a781f8ba.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\456100149c888632d506e284a781f8ba.exe"C:\Users\Admin\AppData\Local\Temp\456100149c888632d506e284a781f8ba.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:3592
-
-
C:\Windows\SysWOW64\anjnvhcxpcbfi.exeanjnvhcxpcbfi.exe2⤵
- Executes dropped EXE
PID:4088
-
-
C:\Windows\SysWOW64\xaaxjbvq.exexaaxjbvq.exe2⤵
- Executes dropped EXE
PID:4856
-
-
C:\Windows\SysWOW64\asofmhefoiewdqt.exeasofmhefoiewdqt.exe2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Windows\SysWOW64\ngvvibeiic.exengvvibeiic.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4940
-
-
C:\Windows\SysWOW64\xaaxjbvq.exeC:\Windows\system32\xaaxjbvq.exe1⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD559ebf1358a9b829f5709baaedeeee6fa
SHA11409fd65da1b814db0a08feae54366dfca196f1c
SHA256d251f3126813d9f42461b0d23153c37c405979347a47fb0f04e0503beaf31a06
SHA512a2d71b94a087aa6d376f4f065d9f7ff987fd50ea93949372fa9ef5b6692b45cef7ae267c88376b9d2953e4476496f67af1173e9f0f8ba81101dc94c6872cf417