Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 19:52

General

  • Target

    a2be4f604814769f99fb39550df6b59a.exe

  • Size

    512KB

  • MD5

    a2be4f604814769f99fb39550df6b59a

  • SHA1

    eec48a7f65d41dd8811f4b97ef4572a3386e1d83

  • SHA256

    60b0481e62f0dc12b89e8881b21ab7fa6ee06e4f8d4cf5533942306ba4e55f1a

  • SHA512

    c9737a1309608df7661f165d568bc9bc1f5707148d43af8ba20d1a2454cb48860ee9747c601c81da8af310e0bcf727562c19d2ef5acf0d74cd94c304166e6cd4

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6e:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2be4f604814769f99fb39550df6b59a.exe
    "C:\Users\Admin\AppData\Local\Temp\a2be4f604814769f99fb39550df6b59a.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\ignmkgzz.exe
      ignmkgzz.exe
      2⤵
      • Executes dropped EXE
      PID:2768
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
        PID:3716
      • C:\Windows\SysWOW64\gyezbzwdjwfgv.exe
        gyezbzwdjwfgv.exe
        2⤵
        • Executes dropped EXE
        PID:1304
      • C:\Windows\SysWOW64\taksgbbwszclsxi.exe
        taksgbbwszclsxi.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2024
      • C:\Windows\SysWOW64\pwrtuhvhpp.exe
        pwrtuhvhpp.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1660
    • C:\Windows\SysWOW64\ignmkgzz.exe
      C:\Windows\system32\ignmkgzz.exe
      1⤵
        PID:4184

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1712-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB

      • memory/3716-41-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-134-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-54-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-53-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-55-0x00007FFFBAB00000-0x00007FFFBAB10000-memory.dmp

        Filesize

        64KB

      • memory/3716-52-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-51-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-50-0x00007FFFBAB00000-0x00007FFFBAB10000-memory.dmp

        Filesize

        64KB

      • memory/3716-48-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-47-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-45-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-39-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-49-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-46-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-44-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-38-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-37-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-36-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-35-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-104-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-108-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-109-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-133-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-135-0x00007FFFFD210000-0x00007FFFFD405000-memory.dmp

        Filesize

        2.0MB

      • memory/3716-40-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-132-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB

      • memory/3716-131-0x00007FFFBD290000-0x00007FFFBD2A0000-memory.dmp

        Filesize

        64KB