Analysis

  • max time kernel
    176s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2024 19:17

General

  • Target

    ac6e9cfd8e27ba1289c9b11f9405d2a2.exe

  • Size

    512KB

  • MD5

    ac6e9cfd8e27ba1289c9b11f9405d2a2

  • SHA1

    48fb4fe988be98ef3d14365cada22ae850f073cc

  • SHA256

    8a5eb1194ce5b26c4ddb52a3fb8326bcdee8936527f9a03dd3d580e256b564ca

  • SHA512

    8d57778823a8aec91d9393f681777d4906d63cd7731c2a2c342c105e25dc9e051fe2ca4a5c771c46263e0b7cabbbb3fea0b0d39b4d20168f431c475e04e907d1

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6a:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5n

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac6e9cfd8e27ba1289c9b11f9405d2a2.exe
    "C:\Users\Admin\AppData\Local\Temp\ac6e9cfd8e27ba1289c9b11f9405d2a2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\SysWOW64\wnemfukrbf.exe
      wnemfukrbf.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\lrljhwvo.exe
        C:\Windows\system32\lrljhwvo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3728
    • C:\Windows\SysWOW64\nvsdsnfgceiazwt.exe
      nvsdsnfgceiazwt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3300
    • C:\Windows\SysWOW64\jjvgjweqbdcpd.exe
      jjvgjweqbdcpd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1696
    • C:\Windows\SysWOW64\lrljhwvo.exe
      lrljhwvo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:636
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    17fb415d79f2b5eebaa5a6c475991bf3

    SHA1

    9b9a40c5a15aa04f05f9a8e1ecacca1e1f3a3e19

    SHA256

    bca06799e50d73d8d457d9d18edfd31b143274e17253c552fd5ebdc0746ff61b

    SHA512

    4f2b015195b8c39fadecfd74462ccb17207d92c9d16b307612f0b04e5e8806e703803b59d79cfcf185476a53240ed97515cf8fd903b856398324176120fd8997

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    49034b9d502cd61e6259393c4d9a2dee

    SHA1

    fe723b597ac95e1a5fb04a4288e13d65e28af0ac

    SHA256

    0d58446742922f9c532820dbf62a5f962b9b68f6d600db8ac5b4fc7da3d2334a

    SHA512

    8dbad4c5b8297c1a18634996a84961e79d68cc2adc9985dea1124636258265dd6c34f9df978c31cb40fbb82b31fed9c610ae164cbe0bfec4141e748f021a8df5

  • C:\Users\Admin\Documents\PublishConvert.doc.exe

    Filesize

    512KB

    MD5

    3cd7c4d477189b5cc0ac477d76471bcd

    SHA1

    f1bc57e5dc10ca02ae42d550edcf4c38a217f6a3

    SHA256

    99cd6eb13ac97d2390cbf4418690af3b7546b406ee25414b3e5be0976611ac42

    SHA512

    0c1c733c1454dcb9fcbd0c2e16613c677a6136a5d7035b4d4b44f95fbde81679d230edd2ebdcebfdb7c8a556366ff316e5a6cfab47c1a5b7924f4076ec95c18b

  • C:\Windows\SysWOW64\jjvgjweqbdcpd.exe

    Filesize

    512KB

    MD5

    4c6762d6e3717725bff5159af2d5418c

    SHA1

    98907213c2a1aab38967b5b4371c3aaccdafd304

    SHA256

    682736182a81046417b5cd6bb49aa37d868b6b47dd96c1eabfd88565bc089679

    SHA512

    5c6000066ec7f697cd9c71a7ac6de5277baaf51e059d301bada4b8a063607fa43919836786d47b21f28993fd47ce02ac7947556680682eb5dac8fe33b05b1051

  • C:\Windows\SysWOW64\lrljhwvo.exe

    Filesize

    512KB

    MD5

    1dfd81358b6df8f25047d66bbb45f685

    SHA1

    c753ddd5a790940950d363987f5882b1ac54ae79

    SHA256

    71978026505d9c10e1866cecd46ea930d3f25b6a0ffc9af80db70d2ae1e47a23

    SHA512

    f5f2c11a57acd42e301b8e80c379d87fa1547479c58f50ef9d438349c6b248e5ef35e951ee72612127642caca888776509c7b83cb8bdbe6ed4c8bdfb7a42074f

  • C:\Windows\SysWOW64\nvsdsnfgceiazwt.exe

    Filesize

    512KB

    MD5

    18f8cfe38037450c38defd34b6513063

    SHA1

    bf634196fabe7b120ec147d5108eeff2ee1d372e

    SHA256

    f6f34a1b06f65677eb6638ddbcbff657d72e926e0afb49b832cfd391cc41705e

    SHA512

    36a33eaa97c853effde4cbe2c7147b85fce19a04b669eb48a61722462374c1ace6f139ef57b718664943d7ac73edfc79d3acf5224f9ceafd7013a478500a3ca9

  • C:\Windows\SysWOW64\wnemfukrbf.exe

    Filesize

    512KB

    MD5

    ba5c4ff91c8c1b5d96927b2d923afc7b

    SHA1

    8135b328dac351b17e6569b5c1e844bd6560d071

    SHA256

    56490c80c1a414e47aeaa28ad155b9520dc225c0776b0615f14d6446face4051

    SHA512

    c5d296108162295fb389c9415389424444b07a2dbfdf665687d0a1d376f7230f32f30f30ba209573319e3d5cde6400cfe5f171e33d50fae5d593ac93993d3788

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    b73f1fafe9ded372de69ea28296ea81e

    SHA1

    2565519dfb73f8c9dd655406f64084457a0d3705

    SHA256

    de48634ab5a606846b156978e5cf6b42e22043ae00bf627bf88ea212d69e9ead

    SHA512

    8dd0fa25c30a74965b930b027b94c597e6e352c79b7b73f688b124ed86a9a27f6418ca4987add2c08d7f2d0e7905edb0302239ed38bd0375c22837331d48af26

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    5b030d45da0422cc543f2296f7c01835

    SHA1

    e8a5604994f7850412b9f06b063ac77f25c240ab

    SHA256

    3c166910627d18f8c1da1cc2167673c8746c409656aa7914434dfaefe1add864

    SHA512

    73574ac93c9713213e8e6b3a1dfc03be7e44111722158f108044dc9413d02ca02f92f58fa62ce65019c5859fece6088b371eace47d4d41e8c200c1e4da9b929d

  • memory/1680-47-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-61-0x00007FFB87030000-0x00007FFB87040000-memory.dmp

    Filesize

    64KB

  • memory/1680-49-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-48-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-51-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-50-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-52-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-56-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-55-0x00007FFB87030000-0x00007FFB87040000-memory.dmp

    Filesize

    64KB

  • memory/1680-57-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-58-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-59-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-60-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-54-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-53-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-46-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-151-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-93-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-97-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-98-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-44-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-45-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-43-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-40-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-39-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-145-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-146-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-147-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-148-0x00007FFB89830000-0x00007FFB89840000-memory.dmp

    Filesize

    64KB

  • memory/1680-149-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1680-150-0x00007FFBC97B0000-0x00007FFBC99A5000-memory.dmp

    Filesize

    2.0MB

  • memory/1876-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB