Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 01:33

General

  • Target

    4cfe24956411f1f7a3b95a04229d5293.exe

  • Size

    512KB

  • MD5

    4cfe24956411f1f7a3b95a04229d5293

  • SHA1

    bba35897ee81481662ed5974e0bc4e9016e90ee9

  • SHA256

    d38362a740d3a0ad30fa3d0caebde282a376f574eeaeaf34e3e21e1a4851d7b5

  • SHA512

    1cdf39f4a9498970829f226cc5f5384c2798961bbfd5e61d2203c6fd9ebac9e75362c2ae4739b2f7a2a250115091f7aed117dfa9c72461d63a22f6a8b1110f53

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cfe24956411f1f7a3b95a04229d5293.exe
    "C:\Users\Admin\AppData\Local\Temp\4cfe24956411f1f7a3b95a04229d5293.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\SysWOW64\eldxrihqum.exe
      eldxrihqum.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\ozrobuke.exe
        C:\Windows\system32\ozrobuke.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1572
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4112
    • C:\Windows\SysWOW64\ielkqjhyfebgq.exe
      ielkqjhyfebgq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4680
    • C:\Windows\SysWOW64\ozrobuke.exe
      ozrobuke.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:972
    • C:\Windows\SysWOW64\jbbcuwiffjvfcoi.exe
      jbbcuwiffjvfcoi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5100

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          46230c2d350295efc0ecbcb6a1c5cad3

          SHA1

          80e05ecf798685d7a7e28fdf82f075c37c480bae

          SHA256

          0810fe6185df099ae3e42c42df66c493829f9dff7fadb23547501e34792ebe79

          SHA512

          95d1e472d0573cff9d329fd1162c3da2cecef08d124f7a501e73a5f7d2ad25d6481dddc6c7632af04093170bda5e762648d90f9aa46726f739a3fe943b1e1008

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          a94202fc8b92c470298e86e817ac190d

          SHA1

          8ff3bb93a09808353df943d2911fc46351202b72

          SHA256

          02ab090778fa1758e163cca475f7967a5b996a244b537e0b8952f5d84aeb0d84

          SHA512

          2fd321844417880c42ba893f71705b909692b05ba3e68448d95c81dff509f4e5bd64e80605043b3c69912d03d16401033c5a8ca7a3e5540df0f542fc5219dcc5

        • C:\Windows\SysWOW64\eldxrihqum.exe

          Filesize

          512KB

          MD5

          aa9db9a196c4f26d5aedaca290fab9de

          SHA1

          1420abc356e607ee2678cb3dc256332739988a76

          SHA256

          3fe730645806a7887f4a90b6c44b168a06d9683caca4977cd0fcd8e74dcb4c42

          SHA512

          35ded877bf7fe48bee0e65c69b0a6ecb79427f25863cbf64d35f5608d22ebcdd4f87ae50db2570633be54938222fed88f4caa0f30bac4a8756620f4a7d958adc

        • C:\Windows\SysWOW64\jbbcuwiffjvfcoi.exe

          Filesize

          420KB

          MD5

          d5999df1c65bc409c0957f45707bd576

          SHA1

          492d91e63b0c81e4b3025b16cb7d7bd1d059bea0

          SHA256

          82b191393f61fcf8294bd7f6ba97ca9136cdba333626dc3a48c5778d66f43462

          SHA512

          fd886745257b28bfe61eb274ab6bf36f1228d7190af19c65e09593f3b635cdae76e31957cec91519531819563379a3b2ac95716679a034b9a93b56fa6128e8d5

        • C:\Windows\SysWOW64\jbbcuwiffjvfcoi.exe

          Filesize

          22KB

          MD5

          5b2151030f75a29e9af25d5ac3d347e5

          SHA1

          298a7d5067e7d5ae55fbbcda011525d053b36484

          SHA256

          fe36ff5b0400e073e682e7a6cd1b3deef4a2a3ed257d496092a3801ecd14dc95

          SHA512

          6a54d1d2b53fc2abd77d56537e8b9ece25b284ef8582eac027eed13b553ae508573e5c591e4cd78378855b8b909332970815296fa8f57e8d7810fd5b563f08e4

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          69KB

          MD5

          01027d9a8aaba0db3afba16049b548ab

          SHA1

          d01f65dc1616e1efc5db420223207030b18a0862

          SHA256

          c39714367601de243f099c8c57940d2e8d0df66922f11e294a436068893253d2

          SHA512

          8a0bcfcc9d33bb8d0921253bd0395674e44253cd33fc113e2d6eadcf96889f0661981ea34fc358c41becb5c98029c55466c9ba399ba957ccb7416428b85b2a28

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          129KB

          MD5

          29c94ef88d19a45925130a51117e97ae

          SHA1

          f992bd40fbf42767274e4471aeb75f7babfc2d08

          SHA256

          19cbd5b61e27447da670f23f5b8ce2f66c066385fb446345b636edff6d2f2a38

          SHA512

          7de55896425914a1b49363c8d0417abb6647281f17afb217788e44fdccddc01239f2f6b36782ad721a2b4507ca36d03a5ac68c65f6e1cefd8ed0c5240c9aa77e

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          186KB

          MD5

          43a6664259cecdc0069f7cd56bc6e6fc

          SHA1

          c7a7edf5bb2fd45997297d680f632679302af52a

          SHA256

          22b86df46877ea01af13d1fa5818e80896b4b0041471ba07ca0bde9298610729

          SHA512

          89239207115ddc779ddfd14a98c66deee142e53f0a68dc0248914fe0a8e0a6760966eea1793829225d159d0bb58aa1e1c3f9d3a460b8e9cae53a24e449a215f1

        • memory/1568-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/4112-50-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-51-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-45-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-42-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-41-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-39-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-36-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-37-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-35-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-48-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-52-0x00007FFF6EF90000-0x00007FFF6EFA0000-memory.dmp

          Filesize

          64KB

        • memory/4112-46-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-49-0x00007FFF6EF90000-0x00007FFF6EFA0000-memory.dmp

          Filesize

          64KB

        • memory/4112-47-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-40-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-38-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-100-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-101-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-102-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB

        • memory/4112-124-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-125-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-126-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-127-0x00007FFF70FF0000-0x00007FFF71000000-memory.dmp

          Filesize

          64KB

        • memory/4112-128-0x00007FFFB0F70000-0x00007FFFB1165000-memory.dmp

          Filesize

          2.0MB