Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 12:23

General

  • Target

    5673e35832ec37db9ee71760ef26bf73.exe

  • Size

    512KB

  • MD5

    5673e35832ec37db9ee71760ef26bf73

  • SHA1

    77d214f5333054a525e25c642f5d9596061dbbdb

  • SHA256

    78756bffbb2a78a1e0ae9216e718da587d602ddad1835132461fc2e98e984470

  • SHA512

    82ba7d3c613ddf675bce3bbd7738cc6ca228428cd0931cfe04ffbddf5b8270420d1193386b8801238a7a7e98ae1cb492ac26747fee6509eb9508745d0bdff2c3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5o

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5673e35832ec37db9ee71760ef26bf73.exe
    "C:\Users\Admin\AppData\Local\Temp\5673e35832ec37db9ee71760ef26bf73.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SysWOW64\azkuadurnn.exe
      azkuadurnn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4940
      • C:\Windows\SysWOW64\jolsyrpb.exe
        C:\Windows\system32\jolsyrpb.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1992
    • C:\Windows\SysWOW64\xayqoqfkyexyhhm.exe
      xayqoqfkyexyhhm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1688
    • C:\Windows\SysWOW64\vpcmferdwbhdv.exe
      vpcmferdwbhdv.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4116
    • C:\Windows\SysWOW64\jolsyrpb.exe
      jolsyrpb.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3664
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    7fd18fc57da6e0bc397c711101cb2577

    SHA1

    6e9b551813cfbab17a8e60b58b07c7043156743e

    SHA256

    67f43cb6e0064fb2141d9578ed5781b512e67eb17b27a606543e825a5e9a0642

    SHA512

    a8155af01f90e07beda53adb944ec9f7a4f489937282208e672a1bafdc3b75d5ef57899bfdd6abe9a71e84e6fd6a04822ff03a6c9b1cbcda4bc48cdbb82d74e9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a5ac7cb4fa725bf08ee14bb750486a36

    SHA1

    410a788c6f99e7fe4e7b95930f90f76e4eadb2f7

    SHA256

    c3f4e2f6b17dbd07a83e374249b172668f7ac237fee7216de6d7f922f6847894

    SHA512

    e3062636418cb946c73fe51c8c97b67e9f41398c3c0456870ef55127dee5efc8eec38a3bb83d6f593181c97822a2325e67ede4d99398c396926f915661c91395

  • C:\Windows\SysWOW64\azkuadurnn.exe

    Filesize

    321KB

    MD5

    6a96c8888754261f96df8e4a2cda7b7b

    SHA1

    3227d04cd2b4d6fd96b627df23dbbfc274a36648

    SHA256

    cd05f27a9dfa7f68c94d30e0d8db4fe5a01da1620e4909eeee131752d53f7623

    SHA512

    c79124e3726cae6620cb2b433d25c146ec20d066bc0c1c424d2e7cff10b8e1aa6c99bf583c8d0f4cc3039f0b042fcaa3fc9e9bdc0457e9a2408367e3aed404f0

  • C:\Windows\SysWOW64\azkuadurnn.exe

    Filesize

    512KB

    MD5

    44968529463e766e92d004125e4ab25d

    SHA1

    aaf21981a845d7defe05828087e0004f3110a656

    SHA256

    c7bfa460772e8a032c4353b3024f4e4181cdd5bb8dc40b5521cb264af36259e5

    SHA512

    c63141d4802a6220a362f93d59893e93af9037384987125ed27aefb1c33c726e1a26914fe71528291602619f5ca3465afb2b815d714ea1b7855a5a54cb4c2d80

  • C:\Windows\SysWOW64\vpcmferdwbhdv.exe

    Filesize

    512KB

    MD5

    54e8836579d3df28910874a47615622e

    SHA1

    dd2f5aa03a3888fb6be929c5e7a5259912807a76

    SHA256

    891baa3bf63202378e7e77b9257aea87be88fc43d7e466f93314625a1323f4fe

    SHA512

    e9dad5bbc38e0b081138cd6cfe831a55c1658b74a1e347ecb364d4efefded0f0df1ee983dd91422458aa6dcb2f057ed48ca79d6b86876827f276af65b48084be

  • C:\Windows\SysWOW64\vpcmferdwbhdv.exe

    Filesize

    93KB

    MD5

    257f28bd5bdc2b725434b7ab570814e7

    SHA1

    972446e0f8d210c5d6f42a57a921391a236d564d

    SHA256

    d80f45a5995ba038d69dbe87f7c12827ffa2b53e79beedb0bc6ee91c10a61688

    SHA512

    c27aa91c3c3605941a1a121021c840fc7886cf27d43e9d6b2c371888a276d9dfd39135600a4f933f62dfa3d46cb6e12de6e31b3f8b939676701ff37f8cc61575

  • C:\Windows\SysWOW64\xayqoqfkyexyhhm.exe

    Filesize

    512KB

    MD5

    7c586ce1023f15912316c8ae37269efa

    SHA1

    17c6fee4a7fbee8c250ecd9a25ba78f927c1508f

    SHA256

    face78c8a9a5eb9c5bc0052f7a8d7c8fa7555541dd4311346a7a10c5c7fca27f

    SHA512

    ec8c6998427d6fa574905188335014b61387b58a6c0f7352e92b4b1745bcf136be88892701215da1633bdde1987c26940fc93cd5ae0fda18aa23510842ca1192

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    7b3d1b1537d6af8a2a631f6fb3d9ebe0

    SHA1

    6c42820c2dfe773f3c496a6c8b4186d7a5c883ab

    SHA256

    1ec99d92fc005f36928fc7c539298c02c9c4a7166036203d2c6e13349d306e67

    SHA512

    07deb4e3b24509cbfd5c93827371e7318f32285e5682bf2a37d959a554378a710b80dcd236a4bbc54f35d405b1666d22a491d30506e1eca34ef35521ea756b9e

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    efcb42f18da6bda6db9b3e9acd6b36c4

    SHA1

    50ffbfd5697cc7468901ada0331f9375dcc2e645

    SHA256

    0287168753213fde78a0d3350dcfd92fef4deed347c701b71cb2068d445469e8

    SHA512

    ffdb3c2b19bf2dfaaad990d1f7e1f6b6bd7f345e60adf4e49c1a4ec597bb476d82b53d1d4c71271775d9cfe427bbc78eff1377a8fa7caca775391001fb941f30

  • memory/3952-52-0x00007FFC7D8A0000-0x00007FFC7D8B0000-memory.dmp

    Filesize

    64KB

  • memory/3952-40-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-47-0x00007FFC7D8A0000-0x00007FFC7D8B0000-memory.dmp

    Filesize

    64KB

  • memory/3952-50-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-53-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-54-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-56-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-59-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-58-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-138-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-51-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-46-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-44-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-43-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-41-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-49-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-39-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-38-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-36-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-35-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-48-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-45-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-42-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-37-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-116-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-142-0x00007FFCBFAD0000-0x00007FFCBFCC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3952-141-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-140-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/3952-139-0x00007FFC7FB50000-0x00007FFC7FB60000-memory.dmp

    Filesize

    64KB

  • memory/4968-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB