Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
a2be4f604814769f99fb39550df6b59a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a2be4f604814769f99fb39550df6b59a.exe
Resource
win10v2004-20231222-en
General
-
Target
a2be4f604814769f99fb39550df6b59a.exe
-
Size
512KB
-
MD5
a2be4f604814769f99fb39550df6b59a
-
SHA1
eec48a7f65d41dd8811f4b97ef4572a3386e1d83
-
SHA256
60b0481e62f0dc12b89e8881b21ab7fa6ee06e4f8d4cf5533942306ba4e55f1a
-
SHA512
c9737a1309608df7661f165d568bc9bc1f5707148d43af8ba20d1a2454cb48860ee9747c601c81da8af310e0bcf727562c19d2ef5acf0d74cd94c304166e6cd4
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1660 pwrtuhvhpp.exe 2024 taksgbbwszclsxi.exe 2768 ignmkgzz.exe 1304 gyezbzwdjwfgv.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1712-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0008000000023207-5.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\gyezbzwdjwfgv.exe a2be4f604814769f99fb39550df6b59a.exe File opened for modification C:\Windows\SysWOW64\gyezbzwdjwfgv.exe a2be4f604814769f99fb39550df6b59a.exe File created C:\Windows\SysWOW64\pwrtuhvhpp.exe a2be4f604814769f99fb39550df6b59a.exe File opened for modification C:\Windows\SysWOW64\pwrtuhvhpp.exe a2be4f604814769f99fb39550df6b59a.exe File created C:\Windows\SysWOW64\taksgbbwszclsxi.exe a2be4f604814769f99fb39550df6b59a.exe File opened for modification C:\Windows\SysWOW64\taksgbbwszclsxi.exe a2be4f604814769f99fb39550df6b59a.exe File created C:\Windows\SysWOW64\ignmkgzz.exe a2be4f604814769f99fb39550df6b59a.exe File opened for modification C:\Windows\SysWOW64\ignmkgzz.exe a2be4f604814769f99fb39550df6b59a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf a2be4f604814769f99fb39550df6b59a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8FACCF966F2E3830C3B4386993E96B38C03FE4312034CE2CD45E808A3" a2be4f604814769f99fb39550df6b59a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC2B12D47E039EF53C5BAD5339FD4CC" a2be4f604814769f99fb39550df6b59a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8FFC8E485C821B9141D62D7E92BD90E141584067416342D6E9" a2be4f604814769f99fb39550df6b59a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F668B2FE1821ABD273D0A18B7D906B" a2be4f604814769f99fb39550df6b59a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C67C1591DBC5B8BE7C94EC9437B9" a2be4f604814769f99fb39550df6b59a.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes a2be4f604814769f99fb39550df6b59a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32432D7F9D5282206D4276A777202CD67C8E65D9" a2be4f604814769f99fb39550df6b59a.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1660 pwrtuhvhpp.exe 1660 pwrtuhvhpp.exe 1660 pwrtuhvhpp.exe 2024 taksgbbwszclsxi.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1712 a2be4f604814769f99fb39550df6b59a.exe 1660 pwrtuhvhpp.exe 1660 pwrtuhvhpp.exe 1660 pwrtuhvhpp.exe 2024 taksgbbwszclsxi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1660 1712 a2be4f604814769f99fb39550df6b59a.exe 26 PID 1712 wrote to memory of 1660 1712 a2be4f604814769f99fb39550df6b59a.exe 26 PID 1712 wrote to memory of 1660 1712 a2be4f604814769f99fb39550df6b59a.exe 26 PID 1712 wrote to memory of 2024 1712 a2be4f604814769f99fb39550df6b59a.exe 25 PID 1712 wrote to memory of 2024 1712 a2be4f604814769f99fb39550df6b59a.exe 25 PID 1712 wrote to memory of 2024 1712 a2be4f604814769f99fb39550df6b59a.exe 25 PID 1712 wrote to memory of 2768 1712 a2be4f604814769f99fb39550df6b59a.exe 19 PID 1712 wrote to memory of 2768 1712 a2be4f604814769f99fb39550df6b59a.exe 19 PID 1712 wrote to memory of 2768 1712 a2be4f604814769f99fb39550df6b59a.exe 19 PID 1712 wrote to memory of 1304 1712 a2be4f604814769f99fb39550df6b59a.exe 24 PID 1712 wrote to memory of 1304 1712 a2be4f604814769f99fb39550df6b59a.exe 24 PID 1712 wrote to memory of 1304 1712 a2be4f604814769f99fb39550df6b59a.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2be4f604814769f99fb39550df6b59a.exe"C:\Users\Admin\AppData\Local\Temp\a2be4f604814769f99fb39550df6b59a.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\ignmkgzz.exeignmkgzz.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:3716
-
-
C:\Windows\SysWOW64\gyezbzwdjwfgv.exegyezbzwdjwfgv.exe2⤵
- Executes dropped EXE
PID:1304
-
-
C:\Windows\SysWOW64\taksgbbwszclsxi.exetaksgbbwszclsxi.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2024
-
-
C:\Windows\SysWOW64\pwrtuhvhpp.exepwrtuhvhpp.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1660
-
-
C:\Windows\SysWOW64\ignmkgzz.exeC:\Windows\system32\ignmkgzz.exe1⤵PID:4184