Analysis
-
max time kernel
0s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
Resource
win10v2004-20231222-en
General
-
Target
4a3fb4e1f4f9b3ca096d79c97a8919e1.exe
-
Size
512KB
-
MD5
4a3fb4e1f4f9b3ca096d79c97a8919e1
-
SHA1
7f44fd0c2627a885eba16025c681eb0b8dfbf38d
-
SHA256
bf8d972cd7da52d8e6ce3c79996c1f444ce57fbce63d44329abe13c2bfba31d8
-
SHA512
dfc33f856fb658106f392ca0b589b91a60d24a544ad683b5cb960db7b6e6e3348af527be372402e68f5ba5638500c0027bc9b68b99f82d907a55392fba568e84
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6u:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm55
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3968 rtxymzwyrt.exe 4936 ufkufpwgfbhipev.exe 5036 wyjxqrje.exe 2692 ujdgekxbwcqcy.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/224-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000a00000002312d-19.dat autoit_exe behavioral2/files/0x0009000000023131-5.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\ujdgekxbwcqcy.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\ujdgekxbwcqcy.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\rtxymzwyrt.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\rtxymzwyrt.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\ufkufpwgfbhipev.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\ufkufpwgfbhipev.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File created C:\Windows\SysWOW64\wyjxqrje.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe File opened for modification C:\Windows\SysWOW64\wyjxqrje.exe 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC70914E1DABEB9CE7FE7ED9534CD" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412D7C9D2182566A3177A177212DD77CF565DD" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCFFAC9F966F2E5830F3A41819C3996B089028F4360034BE2CE429E09D3" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B05847E438EA52CFB9D0329FD7B8" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF4FF8D485F856F913DD72C7E9DBDEFE635594466466346D69D" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB9FE6F21D9D27ED0A08A0C9166" 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 3968 rtxymzwyrt.exe 3968 rtxymzwyrt.exe 3968 rtxymzwyrt.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 3968 rtxymzwyrt.exe 3968 rtxymzwyrt.exe 3968 rtxymzwyrt.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe 5036 wyjxqrje.exe 4936 ufkufpwgfbhipev.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 224 wrote to memory of 3968 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 20 PID 224 wrote to memory of 3968 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 20 PID 224 wrote to memory of 3968 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 20 PID 224 wrote to memory of 4936 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 224 wrote to memory of 4936 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 224 wrote to memory of 4936 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 28 PID 224 wrote to memory of 5036 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 27 PID 224 wrote to memory of 5036 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 27 PID 224 wrote to memory of 5036 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 27 PID 224 wrote to memory of 2692 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 26 PID 224 wrote to memory of 2692 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 26 PID 224 wrote to memory of 2692 224 4a3fb4e1f4f9b3ca096d79c97a8919e1.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3fb4e1f4f9b3ca096d79c97a8919e1.exe"C:\Users\Admin\AppData\Local\Temp\4a3fb4e1f4f9b3ca096d79c97a8919e1.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rtxymzwyrt.exertxymzwyrt.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3968 -
C:\Windows\SysWOW64\wyjxqrje.exeC:\Windows\system32\wyjxqrje.exe3⤵PID:1940
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:5040
-
-
C:\Windows\SysWOW64\ujdgekxbwcqcy.exeujdgekxbwcqcy.exe2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Windows\SysWOW64\wyjxqrje.exewyjxqrje.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5036
-
-
C:\Windows\SysWOW64\ufkufpwgfbhipev.exeufkufpwgfbhipev.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5badd716c7c48a8241873d9251da496d1
SHA16bd2a072c8f64a1780fe75d983cb7b6584985c6d
SHA256ad4373bfa026f66380b8ce44d6bc300d146770114fb10087019af7c616dc11d7
SHA5127bf3f09216e2ba376053e668963797cd78f91119467917a84f467dd3110d6bd26592784cdf7cefd293413ff5b6dbe10a996d89627177235d9f109732c05f36c5