Analysis
-
max time kernel
0s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
e91652582204e0b0ed5a985679370c2c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e91652582204e0b0ed5a985679370c2c.exe
Resource
win10v2004-20231215-en
General
-
Target
e91652582204e0b0ed5a985679370c2c.exe
-
Size
512KB
-
MD5
e91652582204e0b0ed5a985679370c2c
-
SHA1
86b3bee0bf1a0d14aaca723f9593ccb1ce60979f
-
SHA256
58e7e1de9ea84e8624aaae7dd4731ec68a6845376b77ad08c86998c42f74e07b
-
SHA512
20c059e2d822d57b6d79da6ff5d1b5f884e745001a67d081a8111c0386f27894ae234e051b82e8377160e4762f74c360ddff145185f16074068afecb0baaac78
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5m
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation e91652582204e0b0ed5a985679370c2c.exe -
Executes dropped EXE 4 IoCs
pid Process 800 znfoynxfyy.exe 4588 nxfyotxkazvrghe.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: wbkmrsbq.exe File opened (read-only) \??\k: wbkmrsbq.exe File opened (read-only) \??\t: wbkmrsbq.exe File opened (read-only) \??\y: wbkmrsbq.exe File opened (read-only) \??\g: wbkmrsbq.exe File opened (read-only) \??\h: wbkmrsbq.exe File opened (read-only) \??\i: wbkmrsbq.exe File opened (read-only) \??\m: wbkmrsbq.exe File opened (read-only) \??\q: wbkmrsbq.exe File opened (read-only) \??\r: wbkmrsbq.exe File opened (read-only) \??\w: wbkmrsbq.exe File opened (read-only) \??\a: wbkmrsbq.exe File opened (read-only) \??\e: wbkmrsbq.exe File opened (read-only) \??\x: wbkmrsbq.exe File opened (read-only) \??\p: wbkmrsbq.exe File opened (read-only) \??\u: wbkmrsbq.exe File opened (read-only) \??\n: wbkmrsbq.exe File opened (read-only) \??\o: wbkmrsbq.exe File opened (read-only) \??\s: wbkmrsbq.exe File opened (read-only) \??\v: wbkmrsbq.exe File opened (read-only) \??\z: wbkmrsbq.exe File opened (read-only) \??\b: wbkmrsbq.exe File opened (read-only) \??\l: wbkmrsbq.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1068-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00080000000231e7-22.dat autoit_exe behavioral2/files/0x00060000000231ed-32.dat autoit_exe behavioral2/files/0x00080000000231e7-23.dat autoit_exe behavioral2/files/0x001000000002313c-19.dat autoit_exe behavioral2/files/0x001000000002313c-18.dat autoit_exe behavioral2/files/0x00080000000231e7-5.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\xzwlkgnkhgjcl.exe e91652582204e0b0ed5a985679370c2c.exe File opened for modification C:\Windows\SysWOW64\xzwlkgnkhgjcl.exe e91652582204e0b0ed5a985679370c2c.exe File created C:\Windows\SysWOW64\znfoynxfyy.exe e91652582204e0b0ed5a985679370c2c.exe File opened for modification C:\Windows\SysWOW64\znfoynxfyy.exe e91652582204e0b0ed5a985679370c2c.exe File created C:\Windows\SysWOW64\nxfyotxkazvrghe.exe e91652582204e0b0ed5a985679370c2c.exe File opened for modification C:\Windows\SysWOW64\nxfyotxkazvrghe.exe e91652582204e0b0ed5a985679370c2c.exe File created C:\Windows\SysWOW64\wbkmrsbq.exe e91652582204e0b0ed5a985679370c2c.exe File opened for modification C:\Windows\SysWOW64\wbkmrsbq.exe e91652582204e0b0ed5a985679370c2c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf e91652582204e0b0ed5a985679370c2c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000_Classes\Local Settings e91652582204e0b0ed5a985679370c2c.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32302C769C5683506D3576A5772E2CD87C8765AB" e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBF9BCF96BF290837F3A4581EC39E1B08E03FE4215023BE1C942E808D6" e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B12847E539EF52CCB9D132E8D4BC" e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FC8D4F27851D9133D7207DE2BDE6E143594067366346D798" e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F06BC3FF1D21ADD10ED1A78A0F9114" e91652582204e0b0ed5a985679370c2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C70E15E0DAB3B8C87FE5EDE534B9" e91652582204e0b0ed5a985679370c2c.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 3044 xzwlkgnkhgjcl.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 3044 xzwlkgnkhgjcl.exe 3044 xzwlkgnkhgjcl.exe 3044 xzwlkgnkhgjcl.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 800 znfoynxfyy.exe 4588 nxfyotxkazvrghe.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 800 znfoynxfyy.exe 4588 nxfyotxkazvrghe.exe 4588 nxfyotxkazvrghe.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 800 znfoynxfyy.exe 4588 nxfyotxkazvrghe.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 1068 e91652582204e0b0ed5a985679370c2c.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe 3044 xzwlkgnkhgjcl.exe 4588 nxfyotxkazvrghe.exe 800 znfoynxfyy.exe 2312 wbkmrsbq.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1068 wrote to memory of 800 1068 e91652582204e0b0ed5a985679370c2c.exe 87 PID 1068 wrote to memory of 800 1068 e91652582204e0b0ed5a985679370c2c.exe 87 PID 1068 wrote to memory of 800 1068 e91652582204e0b0ed5a985679370c2c.exe 87 PID 1068 wrote to memory of 4588 1068 e91652582204e0b0ed5a985679370c2c.exe 98 PID 1068 wrote to memory of 4588 1068 e91652582204e0b0ed5a985679370c2c.exe 98 PID 1068 wrote to memory of 4588 1068 e91652582204e0b0ed5a985679370c2c.exe 98 PID 1068 wrote to memory of 2312 1068 e91652582204e0b0ed5a985679370c2c.exe 97 PID 1068 wrote to memory of 2312 1068 e91652582204e0b0ed5a985679370c2c.exe 97 PID 1068 wrote to memory of 2312 1068 e91652582204e0b0ed5a985679370c2c.exe 97 PID 1068 wrote to memory of 3044 1068 e91652582204e0b0ed5a985679370c2c.exe 95 PID 1068 wrote to memory of 3044 1068 e91652582204e0b0ed5a985679370c2c.exe 95 PID 1068 wrote to memory of 3044 1068 e91652582204e0b0ed5a985679370c2c.exe 95 PID 1068 wrote to memory of 2132 1068 e91652582204e0b0ed5a985679370c2c.exe 88 PID 1068 wrote to memory of 2132 1068 e91652582204e0b0ed5a985679370c2c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e91652582204e0b0ed5a985679370c2c.exe"C:\Users\Admin\AppData\Local\Temp\e91652582204e0b0ed5a985679370c2c.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\znfoynxfyy.exeznfoynxfyy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:800 -
C:\Windows\SysWOW64\wbkmrsbq.exeC:\Windows\system32\wbkmrsbq.exe3⤵PID:4248
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:2132
-
-
C:\Windows\SysWOW64\xzwlkgnkhgjcl.exexzwlkgnkhgjcl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3044
-
-
C:\Windows\SysWOW64\wbkmrsbq.exewbkmrsbq.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2312
-
-
C:\Windows\SysWOW64\nxfyotxkazvrghe.exenxfyotxkazvrghe.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD50e151ec3919b72f9a6c7fe60d10f4ea0
SHA191fb01badc6db9808233ff95abf39c37982a8c85
SHA256f644299fe8f10c5f3e24c1943fc808270b5d4f853e2316abf091c8d18344193c
SHA51241d25f82ce04a14c21d19a9ad2d12663714221b6ecb1c3ee579a4a134949de0bfb3e6212e9acf97d0659d50e7a034dcdc103ecbedd8a71fbfefdc30f5728c12b
-
Filesize
95KB
MD5325d35d16810bf2ca20f49e9369ceafc
SHA116a818972ea75b6656eba8b6ca090be9e0bc8f03
SHA2568798efdb1d409d30daf09e596ff0a6875f2f9b89e08c16e891206ddf0771a645
SHA512a0664efd0a950150ffa3b7f79d76038579f20835e4b99043db61586a475ca9f06f1907b7cbdc46e36feb556a8d4cbf473a7f8a5aa51872a41b997c8904284893
-
Filesize
416KB
MD52abeeb511cf907c6f98948f1d353d907
SHA1c18056fa175d5a45f714463f6be457635e36f633
SHA256ea830a674fdc9bca3d2a122319ba8a50740accad73c1cd4146f0d3f5534c338d
SHA5121591d0abcb9f94ae0ae97343e8904ca05322e9a152de24e32747e733d1b86ae9f2cb11430a8902cc4d4679407e3ecc796c21ac25a1deebf1c834cfe2b9df24a1
-
Filesize
157KB
MD52b86fa5d78b76d8dd71930240ffb0bf3
SHA132d61bf71aa0a7fa59ab851ff5555828d878369f
SHA2569880692568a5911ed807944583e19c10ea1d0000a1dc3e972e8748938e3f88d2
SHA512f96cbb126421088d5effe18db01d0349cf1dc5436fb0440665d2736c1f58045bf059b671ac5487a2c0b18da0fff17f15591865143168955e9e016b6d0337f5da
-
Filesize
149KB
MD5aa8615d5e073d6b347331f8ca06e73c4
SHA12ded5b731a3f88b8a0fbcf227fa75eafcb7bed1d
SHA256882acb9ac6273b1d8a77258f6102e6f7942e023653286b48f27fd00b2b8dbb27
SHA5128490a2c9b28ffa6d2007169b47f879144649a992589a49bc912b9534cb8661fccead9a1eed61b9ae8a8a9b605e9d34ec4c2b05668a39a70fa0cf17dba55cb216