Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 16:39

General

  • Target

    6583fa1c4a931884ab20da67ff58c4a7.exe

  • Size

    512KB

  • MD5

    6583fa1c4a931884ab20da67ff58c4a7

  • SHA1

    60ce85ffddee5f77b3dcdbbeaa0a18c6b3382670

  • SHA256

    530c3e01f8ca478e81a5f867322d9d8b35369bb1fe0f9e6953a95cb09adfff4a

  • SHA512

    342c49ce337a0db2fca9b9c19b5d63d1ebd45ddfd74fa3f018771c9deeadb643351e40c80e3f29c18489aa85bcc36555ebd02013eb9624d914815762bba4663c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7.exe
    "C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\SysWOW64\bsdykyngxf.exe
      bsdykyngxf.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\vpotfezo.exe
        C:\Windows\system32\vpotfezo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1976
    • C:\Windows\SysWOW64\nesieliywrhkrqq.exe
      nesieliywrhkrqq.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2212
    • C:\Windows\SysWOW64\vpotfezo.exe
      vpotfezo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2456
    • C:\Windows\SysWOW64\kxhhpedxlcraf.exe
      kxhhpedxlcraf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2692
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1896

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      98679c58aa52ac4bee7d7ebbf95f3a3f

      SHA1

      ebfd47d87496f65068683ed0ad8441eba5b21ed3

      SHA256

      c9ec5793ef916546894d1aeaa2a51e430f69f57f5c1266618f3bb4c776eca406

      SHA512

      54cf430b243798c4f1e0d96147af2ce6f52eb714ea4990bf0b433fb2038768b57cd2ad77e22675b86c04371d0d491f9efc79459eb476f2d25c4aae1e274edef5

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      c1454e8ef43e806871ec31973bcc5645

      SHA1

      0fae1871becebf58c49517b9af72b97966bfe77b

      SHA256

      bca4dd03bf90204e1050cb0730ca29b45e408948e454d0df11f31d5665a4e67f

      SHA512

      2f1b511940c34d1ca4fa38f1d8c1a70614202e119e5f33f1486cd8dea68abf66e1720f3417e483c6924d1ea734730581bf3bd43ddbbbbfa6ad8465f2024f8b01

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      e99af0bfab5c3c61185904c7fbdd67c2

      SHA1

      4ed0fbfc4a4673e9e611eec9730844de557a21f2

      SHA256

      fb0c8dc79227af0233af1184109a6e4012c0fd4b963aae25c94d16f24d6c6d76

      SHA512

      5bb9a62307d79e352b8f3e083045446a7350f388854a5570739ca0523c3c60bc06b9f223065708b3c03bac41a2d7d8902aa4dda02911fe4f08dc44a2689277cd

    • C:\Windows\SysWOW64\kxhhpedxlcraf.exe

      Filesize

      512KB

      MD5

      0f5b46fc936b91ebffb215c30c5e977f

      SHA1

      3bf14855d876f3725149658802a9b3f20c4a5795

      SHA256

      253ebe5397500b3a9f29ec1db55750ba2be878e79380fbcc2c254a35a97dd248

      SHA512

      3dd76f93e9abc3553c13465796e80c9470595932a24366dfc1aa8c740678d8e3b5e4b6a13703ea620ef30353711ab4f3656b639e5eac2cb72cca2d8b81087404

    • C:\Windows\SysWOW64\nesieliywrhkrqq.exe

      Filesize

      512KB

      MD5

      55cca968e7ffc77b1fdeff07902c196e

      SHA1

      a93bcf11683349ed9746e1c8e211292ba4cdf84d

      SHA256

      ab96ef6ce65f755fde0401cf29bca7aacd66c5d462ab37fa26869bbbf2fac3f4

      SHA512

      79fc3d5a9588835d1edf5f29387f7778b6833518fb8cc29d69ead0e64f965e5d27faeabfd93246e845b2c4ad76c65f81f47d0c7072bb9c8fa4fd18f57608615f

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\bsdykyngxf.exe

      Filesize

      512KB

      MD5

      03bfb12387732e96aefd1c390368b482

      SHA1

      54bd4a14ff88256fdc2f546e33d406a90db2ae96

      SHA256

      b5fa4d382460dbcf0e8019b62a573a59bf3bd7c67c27e2846f239449241cd9ef

      SHA512

      3b54385b7b1fa8499b74c74d07e7b2754b64c47a72165f80d9d5004000692fa420182d1df7a1eb64667544f3b1b0829f035375ed1f3b25737138f382ee12b292

    • \Windows\SysWOW64\vpotfezo.exe

      Filesize

      512KB

      MD5

      503b4af3c2628a6f51ed34d9f3fd712b

      SHA1

      41bbdc1969a94c6781bdbcf246c48c66fbb10ba9

      SHA256

      d2119b0a0cf2586bc2ad504a6c23cdef54a410d750a064c790c14814113aa17b

      SHA512

      8b80fffd14acfb13b69f0648aa9d4147b0e870708ab76f8c7d60fad969b1da6467cbf4278333b0a1d5891e915f698fe6470740f33b710d5dff0ff32feef0502a

    • memory/1016-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2728-47-0x000000007175D000-0x0000000071768000-memory.dmp

      Filesize

      44KB

    • memory/2728-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2728-45-0x000000002F1F1000-0x000000002F1F2000-memory.dmp

      Filesize

      4KB

    • memory/2728-76-0x000000007175D000-0x0000000071768000-memory.dmp

      Filesize

      44KB

    • memory/2728-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB