Analysis

  • max time kernel
    151s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 03:19

General

  • Target

    5263ee44519d3d416ec840fd28e3757c.exe

  • Size

    512KB

  • MD5

    5263ee44519d3d416ec840fd28e3757c

  • SHA1

    b9f96e553e4e668d14d01d60ff67e4f647545906

  • SHA256

    84d7ddcbfd77db7442c481199561925908aca7c30f36a28a39ceeafa0e9210ff

  • SHA512

    8929f25b5a14b77f367fd52fcdce3ff915fa55b16777c2439c2452fd8d79fe33ef5a5183ca03954b7bc8d556298ecafb2634f546fcb2e4c19a1f50ac9413154b

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6W:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5r

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5263ee44519d3d416ec840fd28e3757c.exe
    "C:\Users\Admin\AppData\Local\Temp\5263ee44519d3d416ec840fd28e3757c.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\SysWOW64\asxzfnnlfb.exe
      asxzfnnlfb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Windows\SysWOW64\rlxuuhci.exe
        C:\Windows\system32\rlxuuhci.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1764
    • C:\Windows\SysWOW64\hniukgszznxaapo.exe
      hniukgszznxaapo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2456
    • C:\Windows\SysWOW64\rlxuuhci.exe
      rlxuuhci.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4336
    • C:\Windows\SysWOW64\ohuojrakpfeha.exe
      ohuojrakpfeha.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3232
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    09088518ab92493e144b652be17bfaeb

    SHA1

    6902c633c10f380201fc55bdea2996fc4a586ee1

    SHA256

    a3a02b1b7ca6d8b1a37c4a726ccdacdd64e1b7f592ed8bd80943cc44a81be37d

    SHA512

    3957711f7356380eba884e5ccf8874ae2a39c9dc7cb34517049983a1d4de995c39b3a0036ba0d10e2e473e2ed4545713b27fd9af58960be3f5892bde2e7eba1f

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    4a4486e14afc42afc3c299bab4629efa

    SHA1

    9263539e78edb53e6ca462c6e732066daa9d19cd

    SHA256

    c03c7a715ffd3e8ada7d184c638e9fbe8e5197a5979995fb9bcc7787faeb0ae8

    SHA512

    6839469bdaae9310acf32177c9a150db9facca625f9055ffa3301e6c3b801f0814d63188f228d29141b347a395b966eb3cd28e168d10a376b7deae6d35421df4

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    bf2e0d8c3f8afc2aecd15c0fc0ef869d

    SHA1

    7607db2ef5456a006355a29bbf3043fc742c3d6c

    SHA256

    ea8e6f56583fc431f4fe6ac4f5b4c01f6c2207ac7b38dd6fa95d5bb666697d5b

    SHA512

    257a28ad3f53db34cf5750d5c2cc96dcf69c97762da533e831739a64bc990704c9819d5c28badab1ab8352a954246effa1c89674663236e6bedc160091543762

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9ebbe3e021a37a954e255f41bda52624

    SHA1

    1ce68509950cd40adb209eeb518096446c127b31

    SHA256

    b5afde919803f1f6de5ed2e63df5275babb83d5182fac182b3c25314ed5491e1

    SHA512

    0f252462ecbac00f7e4e1a4f93a5b21576a760a26e14eb84cce03e0c6b8b94607389628cdd4af3ba528e02e2f9e2a33ac90a74d581037153f483332abeb66a97

  • C:\Users\Admin\Documents\SetUnregister.doc.exe

    Filesize

    512KB

    MD5

    a0e3c26d0e528781059a538a7b9ee02f

    SHA1

    cc052120bb2be3647b9870f31f1d23829d93e0b9

    SHA256

    6ab35c20ff965f4b8ab321d0598091d6e79365a302e037b3583d27c59a1d8c3f

    SHA512

    5f5319e0fe1314901dcac0e27c4f19279450f275caf44d617bb008e039bf0e2ce5363f536f7a570a93e6c2513fe3bbc945c17575a313cd5e3f76f34734cf61f6

  • C:\Windows\SysWOW64\asxzfnnlfb.exe

    Filesize

    512KB

    MD5

    ba4b27a8e1e4d2e2af5ad8214fca62e4

    SHA1

    fb98c6e66f5b130dbe123c0e6861873c9418d824

    SHA256

    d9ee2924fb9ed907fb94dbc7cab20ba6418b8385405a6f1b7535e9b076ec3d69

    SHA512

    fd1dc06a3f988d44909bcaf382e71204e98eaff5126dc5499a6d9c7e5a320b90c632b843dd9507c2e5eb9036e070c64b37af449a99966ca47ef4ee263291c47c

  • C:\Windows\SysWOW64\asxzfnnlfb.exe

    Filesize

    64KB

    MD5

    d76d22b81130bc9206c7c947d7a9ea5e

    SHA1

    5956e88a6ec7949ce5a350e21703307d855f34b1

    SHA256

    b96acd28ea28c51de470bf63ebbc33a346440fe63e236ab9f092e0cb3035b870

    SHA512

    112f4f23127929556f27e12a7979ebd1536af790c92f8ff7870a5b39470bd02d83fbf1697e7ab3eccebd71c44ae7bfbd1dac9c39fefa6e15a488baf840b8aaf1

  • C:\Windows\SysWOW64\hniukgszznxaapo.exe

    Filesize

    512KB

    MD5

    03224af7f1b6148db659d0d4909f083a

    SHA1

    b57cb42d301a2b5b5384d6d2d5322759a3b51134

    SHA256

    e608279fa452e3e18c9a7624d5bc5f1417be9430efb41b8a7d1e93375b66b6d3

    SHA512

    9d04f0c20b8fc6bf685ddaba106c0d8792f29975f9b153f12eecdc8afeadae042f3309c00650b00d01b37fa1e4865bba8a201cb996b87aacd1155bfc0e7a04eb

  • C:\Windows\SysWOW64\ohuojrakpfeha.exe

    Filesize

    512KB

    MD5

    e226a051bdd4cb9858e125a7a6bb1441

    SHA1

    7efc186f31364766f625c068bb20e7b963fe87b6

    SHA256

    011257d82ef4d2d3605ec9ef97a11800dec103b86cefa5709d1c1a3283c2fae4

    SHA512

    62a24175ee5add59fffb7c50345f55c664d2bc2058e74e66d590b67ab480793b6740694366970ad4cc662db7a6cf0ae8121aa44e07f9492c07f7e3b59cd88302

  • C:\Windows\SysWOW64\rlxuuhci.exe

    Filesize

    512KB

    MD5

    ee1299277308f46be89903e37bdc9e71

    SHA1

    557f8ab4b7a56ae86eb0887ce4cfae5f967c1995

    SHA256

    b7d3d1b1d6830a57cf8903eb01935fe7a3d4707595e0ff380216689d398fbc3e

    SHA512

    a810936c67c7da64de4f38cf909a7178d0cd98fd3a4063cd8e8a6127f3a522181c1111442102e0424b210fd713e62dd9f5fdeedb16090c543cca466d72f67848

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    8094041a812f66bde6a5efbbddd46f40

    SHA1

    be9ee3b6fbce1ffe1c70f396db0bf6256428491b

    SHA256

    e95467335e7804339ec4fb444712ab9c84d652f713c5bebf6c5fab0e2cbac6a0

    SHA512

    37c823cd479899ceec871516be04f7f995e5b31132a2ed895ca7418c41d65f53c683bdda029e8cd23b5b36158b72b5779ec9a3ff087c323c38811c268a2ac30e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    f3a92558e7038b84567c44d5c4e18d4f

    SHA1

    4c19a145a981b93515016d2f98196bce5c59c1c4

    SHA256

    9c2f609ce83c1a78bcf59d22545f2575e3d78adc78edbf20fffdaba4c049ab6a

    SHA512

    f7e214be2d73d95506fb992501d7f27888cb9551406343424de5b57d8735f0c72ab20a3189f97278dc66119751038d0b746b6d7a86f76667020af206c272c9e2

  • memory/3496-46-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-92-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-47-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-48-0x00007FFADA730000-0x00007FFADA740000-memory.dmp

    Filesize

    64KB

  • memory/3496-49-0x00007FFADA730000-0x00007FFADA740000-memory.dmp

    Filesize

    64KB

  • memory/3496-37-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-45-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-40-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-43-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-42-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-41-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-90-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-91-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-44-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-93-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-94-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-39-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-121-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-122-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-125-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-124-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-123-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/3496-126-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-127-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-128-0x00007FFB1CBF0000-0x00007FFB1CDE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3496-38-0x00007FFADCC70000-0x00007FFADCC80000-memory.dmp

    Filesize

    64KB

  • memory/4120-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB