Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 15:52

General

  • Target

    56e044d4c3201d7da77a8d820d7dc15b.exe

  • Size

    512KB

  • MD5

    56e044d4c3201d7da77a8d820d7dc15b

  • SHA1

    8d92a2560df036f0436c0a50aa5e1be43b5328c1

  • SHA256

    9334bdb6affde65f0b8a08c160bf9ddf130c80928d041efd6ce3c098ddae4eab

  • SHA512

    8387f1d0447c0190ba6202795b2315515083924f955dbde6bf5bad1af4013304d96a64b83bf864c703a574154e214ae4bf817111ec24cbc6c4a8579f9ab186b2

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6L:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5e

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56e044d4c3201d7da77a8d820d7dc15b.exe
    "C:\Users\Admin\AppData\Local\Temp\56e044d4c3201d7da77a8d820d7dc15b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\SysWOW64\mrkdwzeo.exe
      mrkdwzeo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:708
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1844
    • C:\Windows\SysWOW64\fjmacwjvtntmz.exe
      fjmacwjvtntmz.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4468
    • C:\Windows\SysWOW64\abwoibhhknpqdmz.exe
      abwoibhhknpqdmz.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1336
    • C:\Windows\SysWOW64\rfaeqjtykv.exe
      rfaeqjtykv.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1272
  • C:\Windows\SysWOW64\mrkdwzeo.exe
    C:\Windows\system32\mrkdwzeo.exe
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    4d5e789a8ce0ee3c8033e90e69c0be29

    SHA1

    6628d01709ad1ba9f440650d376318fccfdecd87

    SHA256

    0b19b4ae46bf4134aacad2013d62dbde8fb5cfd8191cb9da4d3b1bdd708a3a9b

    SHA512

    edeb697d03f39b6767b5bab45abf7c6df5d4e7b4adadb149692bf0a35d6c62d49ba21efd5beb3c835f34d5ef8d3033e0352afc21724320ffbbd458e7c8bcd919

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    86dbb253af166b20ee086edfd53b0358

    SHA1

    9f3146190e43993093b84bcc7754b5e1f1fc60b3

    SHA256

    a3562dbefde74bdfeb16fc84de36bd24514b3f285828608cff819a213f5c93df

    SHA512

    a9060c5b14880f7064a4bbf40b7384b616cfa30bf8d211e75054c3e0fb7c419a9112710c3512019668c5bfd7f84ef942e44a62a4b2d5cb30883b4d95bad1a60f

  • C:\Windows\SysWOW64\abwoibhhknpqdmz.exe

    Filesize

    512KB

    MD5

    029c2ba59f312fd4c89ff2ab61eed9df

    SHA1

    ebdfcbdde00f68ced140ac511f55906ae740f3d2

    SHA256

    ea32699898a28cda33a81f8f1864b50be2411b2938ca4766b0ef2c0e6cce3b7c

    SHA512

    c51d3e5c7eeb5b37c4f51446ca7096579d40ec0fe9efb14b14e9f9d05e48e6ea082caf16eab9142be0bfd33bf7b65f9d51ec2910b9286eb24356dd9629ddec83

  • C:\Windows\SysWOW64\fjmacwjvtntmz.exe

    Filesize

    512KB

    MD5

    39fbc9b1ee9dcb8aa3cfe4a300159f9e

    SHA1

    4bbd87b59d35e4ddba19e38a4c3e4264fdd84777

    SHA256

    4c653311f9ae9d557c9dc080333ff5545c5eb2b866870f6637386ea8d91cabfd

    SHA512

    dab1a3cefc85895eec379c44ac8dba8842c5007903c6a82a835140e0db9c06bc8e208ad08a419273e917a0b519872fb54dbbb6bb2311a49a5402ef0c5961a5a2

  • C:\Windows\SysWOW64\mrkdwzeo.exe

    Filesize

    512KB

    MD5

    f50287209c27e3c6911279e65acd653b

    SHA1

    f4803c042447f6db5c0bfb3b540866378b4cfb82

    SHA256

    29268533f77c8bc868819b4c252b81400c4ed92ca1fb01e3142577f8c186611c

    SHA512

    2eb09f3e7a01741edd0a5bd7a3afe69779786c430309dce6f45eba731019542daf3cc7b18699693f95922fd37a1dd7f937b70be205cb4a09a1bca38657399c91

  • C:\Windows\SysWOW64\rfaeqjtykv.exe

    Filesize

    512KB

    MD5

    f1e97ba21bbb3d3bc95868024158fff1

    SHA1

    20a0893f7b258eb13009e36ba561c9eff7382b90

    SHA256

    4b8cab00f5210d3b58c67eb12b8b0fa8270fdffd6e8df65ab2594118516600b9

    SHA512

    b1a35ad220fe3121db0fc77dc946bdef929315abcbba4b4c525079e2649e99a418ffdaedd115e1c4835d7c2f9960310eac001235cfd95aec96bf92e18a1ee453

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    2f540aa8da11a1dbd058c0855bfb6b18

    SHA1

    0b4a57b18277e4ffbc7c19a40b62adc8b25b36b7

    SHA256

    bf34255e48edc28d8f60902fa7f0f14f8ea094ec1916fae502b7a3c701b44086

    SHA512

    6083d61a7191b5b1121a79b8de5d1970dc9db819248e46df03bb2b9f41c33304f3e6a1d133118d8fc8fa9088ac36c9f9b0386f114cb797e2a8272db6daad1829

  • memory/1768-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1844-55-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-37-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-48-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-56-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-59-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-58-0x00007FF7D6E60000-0x00007FF7D6E70000-memory.dmp

    Filesize

    64KB

  • memory/1844-57-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-54-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-53-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-52-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-51-0x00007FF7D6E60000-0x00007FF7D6E70000-memory.dmp

    Filesize

    64KB

  • memory/1844-49-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-47-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-44-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-43-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-42-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-38-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-50-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-35-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-46-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-45-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-39-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-36-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-116-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-117-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-118-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-119-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-145-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-146-0x00007FF8193D0000-0x00007FF8195C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1844-144-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-143-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-142-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB

  • memory/1844-141-0x00007FF7D9450000-0x00007FF7D9460000-memory.dmp

    Filesize

    64KB