Analysis

  • max time kernel
    157s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 13:22

General

  • Target

    4917ba3beadc5eef20ca601a0b7d8058.exe

  • Size

    512KB

  • MD5

    4917ba3beadc5eef20ca601a0b7d8058

  • SHA1

    782dc660354cb7b447f6648f8c193ba5b9f4ac83

  • SHA256

    13a803e227775518e0edfe175167a9ea93252962773cbc9f20da3cc0cd698167

  • SHA512

    52779a6dced5078271fb376cc7c67cb0984804ff8b8bf8b5cf4939a65eff35961ce5849e90472c9988f54885cc9fc26e0d8e2151120cbeba698fa21de2fe57e0

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4917ba3beadc5eef20ca601a0b7d8058.exe
    "C:\Users\Admin\AppData\Local\Temp\4917ba3beadc5eef20ca601a0b7d8058.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Windows\SysWOW64\vqvmwoygmi.exe
      vqvmwoygmi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\udjkjjhj.exe
        C:\Windows\system32\udjkjjhj.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5016
    • C:\Windows\SysWOW64\gbddptkyepaalxy.exe
      gbddptkyepaalxy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3104
    • C:\Windows\SysWOW64\udjkjjhj.exe
      udjkjjhj.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4988
    • C:\Windows\SysWOW64\gwauabewnmmdk.exe
      gwauabewnmmdk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3272
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    6423c3d19d11e31c0ae54bfd2b22b8f5

    SHA1

    324f37e8b9f7a520cc70d504b54073c2227c1270

    SHA256

    5b71e8bee5c870b14cbf52aef63fb7fc1b61841a5248165048b6c3f08c89528d

    SHA512

    9fb30387e3ff4734c1fea32c3a94b6ce53782025b10577694c81ce315efc7cd7b0f318a31f932ec91bde5895fae8fcc074de8bffaf3bfd062d5362876fafa9c6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ec1ab70297a1ac84da6e6d96015e5eea

    SHA1

    9bb4476b86d0a838efc24cf4d50a166aea97dfff

    SHA256

    89280d2faa06c64c051a47afb899ba2d8d6eeb84aa5b1fef5839d21cecf0ac4f

    SHA512

    13b6ead3b30030ff7b520f811431a41a7d9700d49efa9c03fd638b692f310767db2783c1c1643d47128a830652f4c9214917e4aacc9f63f148d9be244a765e93

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    818f80c294142e860aa3242acc162bff

    SHA1

    5f94da329abc65a2bc1a25e12517f1087e9e6e06

    SHA256

    15dd7bb91632bcf300dfbf58a769b0976ef4eeea2bbd58dcfc007c4f34464455

    SHA512

    218d97fb782b13bd4481cc5d7c917368ed360956121ba9f9612c037ba2722f1d75ca511be4759ac5356b450c855fb7a361334d59bb81f978b6ff589ff0b2ed34

  • C:\Windows\SysWOW64\gbddptkyepaalxy.exe

    Filesize

    512KB

    MD5

    bb07c290be2005bf030b7b782c036e09

    SHA1

    2982f9f3986b8576b294233ebfa677de8df34ab7

    SHA256

    3de7f4b51f9f75c8a81c8de4fe17d18d4636903982751dcfa7a78f3fb3ad3de0

    SHA512

    ee45a33fd85ed43eed7bfe21faf3cbf3b9a13e1a762eb6e42196f01cda3992bcee9c1bb934a6965b508a34cc2877dcc120e93bfdc7a792044f66c5c62bf5d3d4

  • C:\Windows\SysWOW64\gwauabewnmmdk.exe

    Filesize

    512KB

    MD5

    e010a360385ed0e1386f1ae636a0a3be

    SHA1

    9f603b93b09c989dcced6285704603a8a661891b

    SHA256

    96eb55174f6ad03bef8d6c0a162ddc7a799671e04a72cd579efb59b49477795f

    SHA512

    3f2c544c96bc2f5167e14ae85cb6b8228c7f623d906762341dc1bb307b46fc6a30b7e2b421afa6a57a774c42cd1a68ca33f5cb7d66b85f5dd9af6509e9f82868

  • C:\Windows\SysWOW64\udjkjjhj.exe

    Filesize

    512KB

    MD5

    04be35adda58d1037af626409d632262

    SHA1

    18860d26260fa0972d426b8ae2fe6cfe7669c36e

    SHA256

    49ca807b0c35c8c4beb715b6370f84c0ad36e1bb5848c9de40fb1ae34b577cc7

    SHA512

    ec60c94662156cd7580638bdd732b2168fb3547a2df41842303295dc2d5c4bc90ea8dbc5e4a573c6405bfae66684bb02687c414e9c0696f310aa7dbec350094f

  • C:\Windows\SysWOW64\vqvmwoygmi.exe

    Filesize

    512KB

    MD5

    aec22116d4e7c31ab97a7730e02aab18

    SHA1

    3e1697b7e14dd09e48afcb28aac51d57733f22a5

    SHA256

    c555e399d0db8b78b2dda34166a0cf62ccdeb69f939455be4b49cd865e4d5f04

    SHA512

    9b5c09cdc0934d849026e7fbaae1e19480e2a9b41d42413d5d321439028baa0a1b7769c04087b5e4cb4317968312be561b073cada2c59b76ec97f75e0302ee81

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    034168bd7834d83a7f2e8933f34cd46c

    SHA1

    7025ca99be411dc1fa7711ed4bcd1004dfaeb5b9

    SHA256

    9fb5038fdd0cbf1661f7fab12657dab2c3808177c8a9c98293bb5738ea562a47

    SHA512

    20c787ef1a5713ee4c0f147512255032208866a25c8c85e2ea8f40c144da5e05075ee904c936a6fa2618fd0b376519c5149a12ebf2b8db89a1ce3e70b061e4b9

  • memory/180-48-0x00007FF953840000-0x00007FF953850000-memory.dmp

    Filesize

    64KB

  • memory/180-39-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-42-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-44-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-45-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-46-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-47-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-123-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-49-0x00007FF953840000-0x00007FF953850000-memory.dmp

    Filesize

    64KB

  • memory/180-41-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-38-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-43-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-72-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-40-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-37-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-115-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-116-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-118-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-119-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-120-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-117-0x00007FF955A10000-0x00007FF955A20000-memory.dmp

    Filesize

    64KB

  • memory/180-121-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/180-122-0x00007FF995990000-0x00007FF995B85000-memory.dmp

    Filesize

    2.0MB

  • memory/4440-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB