Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 06:44

General

  • Target

    66f4ada6211466ba531559f800947aed.exe

  • Size

    512KB

  • MD5

    66f4ada6211466ba531559f800947aed

  • SHA1

    5c56be827ec9a7183ba3ee581a63c23e8a55441c

  • SHA256

    86b99fa5ed242d31dd6253954980dba497709b58ae5202c4f7da53d66c140e3e

  • SHA512

    5446beca76cf4e8491b0214a702e44625521b282c4c8f9979dc0d3e78ae94f515a98416bf52fc441fc83b7b09f4f8faf5ef8553eb6d45db96a538c87ff277d9e

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 14 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f4ada6211466ba531559f800947aed.exe
    "C:\Users\Admin\AppData\Local\Temp\66f4ada6211466ba531559f800947aed.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Windows\SysWOW64\pejiapdtyg.exe
      pejiapdtyg.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Windows\SysWOW64\wuofgpwr.exe
        C:\Windows\system32\wuofgpwr.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4444
    • C:\Windows\SysWOW64\wqtzurnwhibrrtj.exe
      wqtzurnwhibrrtj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:692
    • C:\Windows\SysWOW64\nccbhyzqshipx.exe
      nccbhyzqshipx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3448
    • C:\Windows\SysWOW64\wuofgpwr.exe
      wuofgpwr.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:720
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    418KB

    MD5

    0d0ab02e37cb109125748a04f7385251

    SHA1

    52b4cbd6daa8db70ac9a8c6240345a1a1b69189c

    SHA256

    9257aa2c073aed4ebda3c07b8489b269549d11dd38063743e596bdae6ebdc95c

    SHA512

    d624ed66b8d795d51d41a982edfd3382f64524f6a8962eb95d6ff0820e02ff803b76279e5ec2cfb180806045595ab78db6d6a30ceead0ee0a0a65853cd045e59

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    393KB

    MD5

    abc9403ac943318bd54c2614e1421491

    SHA1

    135da7cc0b2757699da5b5d3d072443197d4a22b

    SHA256

    5a7818d8fb7438ca77cbf33425c7aeb93bde026990ce8543ca70a9ac4e09b37d

    SHA512

    1517a9d6a85deb4e698e771452b83dd2d35d93759abe6a95479c1945025c4af2dd812bb4a924cedbbce87ec87d18792b3efec527e19c08d71404850924a3b431

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    860968886b45c3bd7a9f35c8eb7c1426

    SHA1

    5e3867896d45743d0f568aacdf0bdf6e3ed074c4

    SHA256

    2649e03b0dfe80ddf983ad2a05c99390cf2e656aa8a0b819cdeb3509cd6a7cbb

    SHA512

    c98459f1f6ebf673b8e0eb8decf4ff8d0f86995f64c22c185a60395d179ee64129eea28798ca43fbe9c9d6958ef3895587eb4f83e22e45a670238cfc1511cd44

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    1871860c8558d0c3c3de322ade4d27c2

    SHA1

    c27f8c0c1cf23808eb52ce71c2a89886226ce208

    SHA256

    72cfa083cecc35a665a0bd31e835be45eef47451d1e0bf551a97aa6baf945e46

    SHA512

    4085b52ed5f6904983a55c1e459b3b637e02e8a908bd6670c6444902ca49eeea178f44ae23cda4348c934a6a98c93c7dbe33b74dfb8d87ee13abd66b122d31c7

  • C:\Windows\SysWOW64\nccbhyzqshipx.exe

    Filesize

    57KB

    MD5

    3a81bb7f89fff51fd80d1e9e1e60471f

    SHA1

    7c04e73b47855108f7cb0f1f8e76b71078d74158

    SHA256

    7afee2b09ec479879bca80da134ceff2df40ad8eff99ed5b1461e6b64e3c474e

    SHA512

    d8500626b99b14b8e441c88b9a8431db9188b5dea17610b1d5ff35a199195026f6c9961281e7c3a4babe8c88b1a949a03a42c6872e2eb0ec1761f65095f777cc

  • C:\Windows\SysWOW64\nccbhyzqshipx.exe

    Filesize

    12KB

    MD5

    c5069d67dbc788cc6221ae2642ce4944

    SHA1

    3ce79f390a31e97c4e3797732949844a1748f450

    SHA256

    88585bdeb224abf279d13e22cfd6341a441e16049f83bb6e6dca11bed70e1730

    SHA512

    2399d9e6cb3a9cb759fb4000ffb5a43759e58a1108e510692cf9aede2a3bb622df8cd605e336a03293618b7b2c0be87f562a5cc22043afe36b6d42904a66757a

  • C:\Windows\SysWOW64\pejiapdtyg.exe

    Filesize

    283KB

    MD5

    b2661ef7054b1218c969e400be697566

    SHA1

    a28ae64b5e2f1355b7f6ebace76cbf581d5a026e

    SHA256

    e5a4f02ec36fb412b27806d6404eb5b14a10c58e87bee93cc072fa81013d4032

    SHA512

    bce59af2df2472153bd13ea88639a8408723576bf5510643c79d27e6fe9ee9cb1f1809c2ed3423113e053a3074b7db9522b6c1fbfd2d64aea63d15d607578588

  • C:\Windows\SysWOW64\pejiapdtyg.exe

    Filesize

    222KB

    MD5

    6adf09ad9b4bd10eba63f7b6e613f929

    SHA1

    b5986838db5a89972a99931184b9f25260c09b6a

    SHA256

    6a50900e6f8240b9d342601a23d447c8a57693ba54611427ba2276d0a9d39522

    SHA512

    9f5ea753bdb2d6512b082064cdb440a7d539594943a9f009d3861a04bef3a6b06d25d39a539c7dfdb42eebf2da19326aeeb1ba3e098c0a1ea73b1b9772eca15a

  • C:\Windows\SysWOW64\wqtzurnwhibrrtj.exe

    Filesize

    46KB

    MD5

    78b26a21ffc5e8dd9cbfab320d10d0a8

    SHA1

    90dae6cb79f75118918685d5c0a02a65a48de820

    SHA256

    cc936b7028a506fa760ceaa4369e1178ade0e79114b09f766592027021ca1607

    SHA512

    bf8bc14028bdcd3b09e71321de198d05cbabf27e850976260a8452083df45730aed98de8c43406d4bfcdcae07e7133f940d679008054e8c773ed8f69eccd757a

  • C:\Windows\SysWOW64\wqtzurnwhibrrtj.exe

    Filesize

    131KB

    MD5

    cd0ef21e3cea98f9806b9a4087aea48c

    SHA1

    f869016dba463d8e30c10ee0c65615b30249898d

    SHA256

    c0a118af8ae2e46cb15517398d30997bde23d28aaab6cbf7f602f6858584e34d

    SHA512

    c262654d69d8cc2d29fa1ac88b071ebc773c19b4436a37fdf6904a7525dfe7f5f92d4a287adbad154e5b51ef17587906a35231678368f4dac2fe7922633ff3b2

  • C:\Windows\SysWOW64\wqtzurnwhibrrtj.exe

    Filesize

    199KB

    MD5

    e7501b78874eafa9eb7c7d9694602d71

    SHA1

    43bf8790f238872a03518ab49f5b29a35d95f91a

    SHA256

    3b5835774ca744f60de5729ca1d23c2f4377f5d72ef5bbfabd5a14fd8fdd752e

    SHA512

    bfa2acd2bd804c47a890ae2a1f7367d7bd9876a71dcc6120d9b2fbba292a63e5af8913d25022935a8b61e925fb90f14e16fe679882ccc2562857a9e2d2e9bb59

  • C:\Windows\SysWOW64\wuofgpwr.exe

    Filesize

    97KB

    MD5

    8f5f07fc16166a74bd5f7d8aa330026c

    SHA1

    1dee45ab58b5c96207eb41fae663af0ec3e61be0

    SHA256

    8ba80c8ed67ea9990ea4c82b5d9ef8a74350fbfe0675f903388bf17c56d30450

    SHA512

    7a11e546304a00543143759101e4211c2b73ef395678bd9dfb03fa80a4fb259ce4bfd087651be11c0c9bac2e71cd3f8f79133b51fb4006a7ec5902a9b10aa8a7

  • C:\Windows\SysWOW64\wuofgpwr.exe

    Filesize

    37KB

    MD5

    a7c2eb2f173500a117961030503493ab

    SHA1

    c6d3cb35921890e7d98c975a2622174e6f845722

    SHA256

    84cc286464b2bfbeaa0cf1182ceef85cdeb504715b9af8f2fc579d579eb787cc

    SHA512

    70ce72d6140c77060514692b5a14543219749835bf124e5fa556e9559ac8ed44679fee114052064e272b27bb66ff85e69630e8f70f75433d9444ca3b998cb45f

  • C:\Windows\SysWOW64\wuofgpwr.exe

    Filesize

    329KB

    MD5

    21761281b0e41efa5938fb34bb2a15d5

    SHA1

    1f4cbdbcae61d80593de6ff91f70fbeba87d9b16

    SHA256

    738c6f9f7d408f564fd2218347317eefa9e1c69e4a83d4503cb6c82dadd66104

    SHA512

    c6c89e6a18cbfad5f372d3f13f90d2953ef9e25de1f86ea8a07de9383040280f9ab2483f0941c394b2a240c83338865bae11c8372f19903fedeaade963b4dc07

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6eec5c61aa9b7676b335769d8c5664b8

    SHA1

    d1fa0c6f4b55347011004ae837f528f5b36a35ab

    SHA256

    fd994d3f575da504c69bb930df05f54f61e16e634f6a3c76d70dd52324f7fdef

    SHA512

    f23327e5bec42f86886ff95707a0bfceac96b8b7d3e93958fb9031c9e090a5e39b45ad84957f8cf335432b7886abb0f74c59c74bc4ea562f1ee73c283508351c

  • memory/4424-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/5092-39-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-41-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-35-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-46-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-47-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-48-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-49-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-50-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-51-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-53-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-52-0x00007FF989A90000-0x00007FF989AA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-54-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-56-0x00007FF989A90000-0x00007FF989AA0000-memory.dmp

    Filesize

    64KB

  • memory/5092-55-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-40-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-37-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-43-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-45-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-44-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-42-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-38-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-36-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-112-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-113-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-114-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-136-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-137-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-138-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-140-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-139-0x00007FF98BE10000-0x00007FF98BE20000-memory.dmp

    Filesize

    64KB

  • memory/5092-142-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB

  • memory/5092-141-0x00007FF9CBD90000-0x00007FF9CBF85000-memory.dmp

    Filesize

    2.0MB