Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 00:07

General

  • Target

    54f3c113280b05d6b04095c2a62aa0a3.exe

  • Size

    512KB

  • MD5

    54f3c113280b05d6b04095c2a62aa0a3

  • SHA1

    1fbb8bba89a5d57c50361a25669d103909cf5c6a

  • SHA256

    f5c1e2b62ffa6bb8137f29183d4003b5053ad1234d90e372b5d2019bc29fae73

  • SHA512

    64c5b63e222a509dce98179b885bc44cddfd20af0413a557c745d1b9bed6cd70d1151601e9cdc4f315140b81b30b7d20e00b2df11dd49341a04e36ff4d5a1428

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6s:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54f3c113280b05d6b04095c2a62aa0a3.exe
    "C:\Users\Admin\AppData\Local\Temp\54f3c113280b05d6b04095c2a62aa0a3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\udbiwshcrkmnpev.exe
      udbiwshcrkmnpev.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5092
    • C:\Windows\SysWOW64\phmuccrf.exe
      phmuccrf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1624
    • C:\Windows\SysWOW64\ezowoekbjqgqj.exe
      ezowoekbjqgqj.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2896
    • C:\Windows\SysWOW64\cxabbyootw.exe
      cxabbyootw.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\SysWOW64\phmuccrf.exe
        C:\Windows\system32\phmuccrf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5076
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\cxabbyootw.exe

    Filesize

    512KB

    MD5

    83258c91b94c2f62409549e7b502943a

    SHA1

    cc9fb114313e19de8bec82aca28c81ff8a44883d

    SHA256

    21df4f70213e3483cee3ec2a0e8731113f990c4e3f80bfa75773ee37a026c8e5

    SHA512

    6a32e691fd1c5597b1334f33036a18179f3fce692080e199da7c0b6b2421d7aaa9976b72d9043b71f7d69f6c87ab5606443c2d3e166bf27f62ca4e6e1ca1b3c3

  • C:\Windows\SysWOW64\ezowoekbjqgqj.exe

    Filesize

    512KB

    MD5

    e885be75076698ec74c94ba6cad445df

    SHA1

    9186cc5e4ed0a122ae6bd82b6ae2394ca00a3cc9

    SHA256

    cab336617339a2e8d2a0394e166c0d594a2c635dea71ccf9c8076dc7d9dec5b1

    SHA512

    30ae1aeef930bc59ecdff68540efd06f2a949d6f87a4f20932b6f5052e4a5e7375d5b2a72532a740ab3a9f4e96bae0432ace46d2f0878d34b126cffc21820836

  • C:\Windows\SysWOW64\ezowoekbjqgqj.exe

    Filesize

    93KB

    MD5

    257f28bd5bdc2b725434b7ab570814e7

    SHA1

    972446e0f8d210c5d6f42a57a921391a236d564d

    SHA256

    d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

    SHA512

    c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

  • C:\Windows\SysWOW64\phmuccrf.exe

    Filesize

    512KB

    MD5

    1d20315a9aaa8fbaae0ca4a0453275c4

    SHA1

    f13cb2fed2f2b0bc84695da24c66878b7cffab6c

    SHA256

    9aab620e65adbf3edc3ec3188bc7c945bd9ce13c37c6d5c6192720d1051cb5ce

    SHA512

    e394e9dbbdbc5375ac6bf9decc3fa74d9fcefd52c71287771298a82842d24e6e9e89365d3952c720445f3f9001165d0e15618b6482fed4ef5cffd499219fafdf

  • C:\Windows\SysWOW64\phmuccrf.exe

    Filesize

    102KB

    MD5

    58e3cf3cbd3a37aca0dc1dba3d9ae29a

    SHA1

    0e6e42387976ba06941f018300b5a1acddf269bf

    SHA256

    8d8be860de883301830372e18d126dd53422698bd34f052bd33387807f33d651

    SHA512

    b43b3a7bce6286411f84860985192a09845eebe54905b167f965bb990cb3abc7e01388df4f30c34f25e098dc8860ecd40b7e7d70c71853ff08f962ef6000fd6f

  • C:\Windows\SysWOW64\udbiwshcrkmnpev.exe

    Filesize

    512KB

    MD5

    00d72f53002f16bb814994caff893e1f

    SHA1

    6ce040db5d7e2da099ed1694fa623040a1e24ee1

    SHA256

    fa54c7c3fa7a5c18401eb7726e862d1699045de0f7e6eccd33b66b1333d0f4b6

    SHA512

    caa9aa0f002024682055abd282b522355839cc348a8f8001a2e0a3b3c1b3148db7776bdbbca91a155d393a8abf583b6d81c9600c94983faf4f35a0fb6f9cf39b

  • memory/1648-45-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-42-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-39-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-48-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-50-0x00007FF7EFC70000-0x00007FF7EFC80000-memory.dmp

    Filesize

    64KB

  • memory/1648-52-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-54-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-55-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-53-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-51-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-49-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-56-0x00007FF7EFC70000-0x00007FF7EFC80000-memory.dmp

    Filesize

    64KB

  • memory/1648-142-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-47-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-43-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-36-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-40-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-41-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-38-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-37-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-35-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-113-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-114-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-115-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-137-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-138-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-139-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-141-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-140-0x00007FF7F1CD0000-0x00007FF7F1CE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-143-0x00007FF831C50000-0x00007FF831E45000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB