Analysis

  • max time kernel
    176s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:20

General

  • Target

    492aa041e8bc85623d4ee5ca79cb4994.exe

  • Size

    512KB

  • MD5

    492aa041e8bc85623d4ee5ca79cb4994

  • SHA1

    9dfe6b5e7216cec78d6637f8b97ea1dd0db2dceb

  • SHA256

    40981dea368726c7fa3ff82e67c69da71275dde939a5ff28f034df0bd86b0a5b

  • SHA512

    a4ef35f9f29b9d0847fb41413b473dbd1ddc1edec14cfc0265b14fde1eb828e3a47a5a426460d67586ccf744f512a10804ced1c0c8db49e068331134a4491be0

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj60:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\492aa041e8bc85623d4ee5ca79cb4994.exe
    "C:\Users\Admin\AppData\Local\Temp\492aa041e8bc85623d4ee5ca79cb4994.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\SysWOW64\bcauizkzoa.exe
      bcauizkzoa.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Windows\SysWOW64\wygxlmdf.exe
        C:\Windows\system32\wygxlmdf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4828
    • C:\Windows\SysWOW64\htglmeffqjbbrvx.exe
      htglmeffqjbbrvx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1960
    • C:\Windows\SysWOW64\wygxlmdf.exe
      wygxlmdf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4156
    • C:\Windows\SysWOW64\bykzxjqvugdle.exe
      bykzxjqvugdle.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1512
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    f071bcef3a9f74d6df4579db773c7a9f

    SHA1

    342414a6cbc209b4ca92ea7e36a09b2d97e18cfc

    SHA256

    b32c1862274aa9dabeefd45cef4b22fae763c165da5047ff5749a97f784511e5

    SHA512

    9b6d466159767ba011d988602521b49c035cdc4dc196900feaad4619690e3e392c12cceb44c28a3b42175f17ada27a573d76b43fd6eb4c80cb7e9903f6c0aaf0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    78bc718335bc9dee926ed73f8bfda012

    SHA1

    b00817ac3121974e734aeb741305069e6f6e65e9

    SHA256

    2057e3818453a592136c19330f35e9830e831b5ec4c6e109a384e3493f81904a

    SHA512

    7447c9e358745a89a284970df49cdefdc92f5193e777d15e2d188b2450dad8d9a475e3a3bcec29edf102fae6ee99daba2acac0a95ee2e75c5ccd5725a86b704d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    2d775732ecf46801a7ebc3eefc894acc

    SHA1

    c358b3f73c58622c52290432f68d1a7c02bdf470

    SHA256

    f02425424edd668f657000e053b49ddf9b2b92132927ca28fed3774425313dc6

    SHA512

    fb1da7d5e7d32fe4851f02c06d92bd780ac19a0e49b882007e578f3391e1c78013222f49dac4060e68e177d7260a27ed7b68e79bc57c79e2ca92ec3f2cd9623b

  • C:\Windows\SysWOW64\bcauizkzoa.exe

    Filesize

    512KB

    MD5

    b2fdd5ca36c2ba36c56cfa1f85d3d4a9

    SHA1

    73c6a70f063be782c79c5a566c594197fbeb2724

    SHA256

    dae3b6d2be57d568cac77d957b877ddcfa5fb5ae7add5add0ebe8bca5ef3843b

    SHA512

    97e1a8bc6fb8979543258c73d7b2e62313a1de44c71083e804e8499145787b2d3dc1bb96f70894f36281bfecc143290110c3212f0d9951dd7b83cc82ad2c7000

  • C:\Windows\SysWOW64\bykzxjqvugdle.exe

    Filesize

    512KB

    MD5

    091ead7fc5857cbb866a9edc33469da4

    SHA1

    ccfb742c7005e06a3fbd0b6477315d5f9e144406

    SHA256

    9de7c17176eccc969eb4c6327216a34f3ba9d0c0978416b3a0818fb7c31a3dae

    SHA512

    79ed703b3f8c15206b446b0038976d8e91384147707df18cc8c46f5b591b24db45262482533fa9cdf76b8223c7f86c250a84dd03be8810bb3ba1eabe2c16b51b

  • C:\Windows\SysWOW64\htglmeffqjbbrvx.exe

    Filesize

    512KB

    MD5

    c2326ab69d0fd8555e3e4d400151e565

    SHA1

    ffaf83d0c9ec98116e85f71595c23a0f96fb8c40

    SHA256

    243ae8e2f8c392c2f331a54a95bf062b7748fb5b57d5b35f7f5df341dc068c0d

    SHA512

    fc218d8f161d3cea68030ca550710d32fac132bb2c9948811fe017e629e9d26e926ed8581c59fd742defbde7754e7d39857c629eae7038af4601f41ec6d3c470

  • C:\Windows\SysWOW64\wygxlmdf.exe

    Filesize

    512KB

    MD5

    5af76e7cbcf94f3a857e009365c02be9

    SHA1

    2cc921abfb05c798ed843c54f09f03ee2851367e

    SHA256

    2e77414ec9b6a38359945da72ed19f7dc4e04bd518c92c2dbad48076b64e3adf

    SHA512

    1b2a9faa825c130c73b545710dc42818a3ac81e3188171d3a6cbc3f56aa3ed211a63252ab1470f9f184c7beae702d88f1e9ef3dabb439b81df4dce90c5afeae7

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • memory/1276-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3960-37-0x00007FFF9BE30000-0x00007FFF9BE40000-memory.dmp

    Filesize

    64KB

  • memory/3960-43-0x00007FFF9BE30000-0x00007FFF9BE40000-memory.dmp

    Filesize

    64KB

  • memory/3960-44-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3960-45-0x00007FFF99CC0000-0x00007FFF99CD0000-memory.dmp

    Filesize

    64KB

  • memory/3960-46-0x00007FFF99CC0000-0x00007FFF99CD0000-memory.dmp

    Filesize

    64KB

  • memory/3960-42-0x00007FFF9BE30000-0x00007FFF9BE40000-memory.dmp

    Filesize

    64KB

  • memory/3960-41-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3960-65-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3960-66-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3960-67-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3960-40-0x00007FFF9BE30000-0x00007FFF9BE40000-memory.dmp

    Filesize

    64KB

  • memory/3960-38-0x00007FFF9BE30000-0x00007FFF9BE40000-memory.dmp

    Filesize

    64KB

  • memory/3960-39-0x00007FFFDBDB0000-0x00007FFFDBFA5000-memory.dmp

    Filesize

    2.0MB