Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2024, 00:53

General

  • Target

    4ce8e53fed7f54f5cc2326d3d7889085.exe

  • Size

    512KB

  • MD5

    4ce8e53fed7f54f5cc2326d3d7889085

  • SHA1

    57ce0516816f95800473052343eba0c4e320a0a9

  • SHA256

    3bd363b764a65f450f5ea63d4b23f4670c4be74c1f18a14fa925a79919c5c4b0

  • SHA512

    76e346a26a33107d4ca7b8d6d748d07f0d0a385533d776524753fe9a47efd5b195505bd0e9c07a63b80672ab350961353db5f850e82245be1a587a24ca7a747f

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5H

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ce8e53fed7f54f5cc2326d3d7889085.exe
    "C:\Users\Admin\AppData\Local\Temp\4ce8e53fed7f54f5cc2326d3d7889085.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Windows\SysWOW64\zxbegpvpbo.exe
      zxbegpvpbo.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\pzmspwya.exe
        C:\Windows\system32\pzmspwya.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2608
    • C:\Windows\SysWOW64\swswzkykpptreze.exe
      swswzkykpptreze.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2812
    • C:\Windows\SysWOW64\pzmspwya.exe
      pzmspwya.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Windows\SysWOW64\zhbqyqsjzkiik.exe
      zhbqyqsjzkiik.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2724
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      dbef128d66849c71f35e74bea4e8c2fc

      SHA1

      54aab994fec8f1d3a6b339c260e61eb85345877c

      SHA256

      a3fc551c06b6f1fca2500ad44b159075cbc6be395ecdc6416ac73da3e6362133

      SHA512

      b9c79b3c7ba9e0ae4dc87600d4dccae6dfb71f4265be72245501d575d4a557c7a6e632f6bdff1673496796484ef7a9e535dee130705fc54bb6636014731c283b

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      482KB

      MD5

      6c056ebf87e1652bd1f289f27359b253

      SHA1

      f5dad35e5db2cdf33d038972e5211d4788314df8

      SHA256

      6307fc90f839c02c2b6ad7a1d2d7d2e3a1d09fafc3e4ff70bb5100c612f8547a

      SHA512

      7c8bd982711c991de5da57834d12f56c747069040ffaebb7c5829142ba00eabc0f436f05d69398a930acd2eab803b0c70ea8f56c01490a48a0ceb6653369308f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      2cedbec72c3c08179147d7c4c6c8383a

      SHA1

      0641924773a282258771672af19694e34471cc92

      SHA256

      b4d7be894ac7023e242fbac250210cf026e4110baf24666a53f8cca9429c862e

      SHA512

      4d1fcb70129a84d93fe5d3369d28cf3b2baa53ba74dd8169eafd0435d15f2932709dde540c1da0bb30ffa4118c6fdde74f299e71cd6c30701b1747ae85b15382

    • C:\Users\Admin\Desktop\ShowSwitch.doc.exe

      Filesize

      512KB

      MD5

      e41089b17572ccd17d9db895a4bc3afd

      SHA1

      53d762262f8b222714040675110cca0bc886e97f

      SHA256

      0d2bb29b558baf53cd33f4af0af53d83c9ec01920135fb848ab6a3b4394d30be

      SHA512

      4b65e5b120dd062dd01327d82e9e7035a636e3fb9bcbca254f3fd9dcb6c3f4c7e119bcb36839cde471d6680dcc6088dee47e11bc5019b7aa5ba7c6f1bd79bb96

    • C:\Windows\SysWOW64\swswzkykpptreze.exe

      Filesize

      512KB

      MD5

      cf36ff967ed19f4bd2a0d827aa856086

      SHA1

      d683110e99632c188c2d08dd0498f02f6dd4801d

      SHA256

      ef178643bb3bbdde1643c2d99de9cab81fc50b533b1848d0b1390774b0995d54

      SHA512

      40140ce892613ea514bb92b4f08b184e55245e89551d0b6ac63a1f95e46f7e751b323ad0163a6014f5470923ee7f78f6cab76da657fdc348ff58ec7d75d24687

    • C:\Windows\SysWOW64\zhbqyqsjzkiik.exe

      Filesize

      512KB

      MD5

      5fdb31534602d4f24fc2c44080323598

      SHA1

      783ec5ebc6bc4d00fa03ac611f263b019cc8cfd7

      SHA256

      3e60af9915adc7c6dc3de1a7cd84dc06d96ea65373756e10f0f99fd419531c39

      SHA512

      7beae17476e5cf063cff1cb2c9a8eb19666cca596f46f2d8969394b0615eb1f8ab512335d734973198307076c4cbfeeed6a18a8a805a59c8a49c7484cbda8c5f

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\pzmspwya.exe

      Filesize

      512KB

      MD5

      c9efd817d443756b84ef2ef47ea30601

      SHA1

      53b8c1a4747f9c0da3d9413256c592c99d70970c

      SHA256

      9899840f53a10ad6d5f3cf233e324a6539e9cb64a1e04644d1f3a3da4797822d

      SHA512

      624040aba4828692818060255ea87b5f3c2a8c0caf98d34a3947b7edbe9929a5a292230c34fdeb608cdb2a0d46d8a3c03419f0096b47883fb728d095e901e4b4

    • \Windows\SysWOW64\zxbegpvpbo.exe

      Filesize

      512KB

      MD5

      4763c3f012585b7e4951f70491c9e77e

      SHA1

      b92042f1e86a59a07d92e18d57745356e9d15ea6

      SHA256

      42a4363a62e6c6d325702ff4dd270bc803a52be99a9ec15a06c09ffacf2b14b1

      SHA512

      53f1a46ab049dd61c7771b94b5b86bf4f07895bd1880d3e908139dfae2870b49fee2d7099057626ef3c6ef527810e5026977aeb76772e801c6d2b62da0b42370

    • memory/2680-47-0x00000000713AD000-0x00000000713B8000-memory.dmp

      Filesize

      44KB

    • memory/2680-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2680-45-0x000000002F9D1000-0x000000002F9D2000-memory.dmp

      Filesize

      4KB

    • memory/2680-82-0x00000000713AD000-0x00000000713B8000-memory.dmp

      Filesize

      44KB

    • memory/2680-103-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2952-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB