Analysis

  • max time kernel
    151s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 20:47

General

  • Target

    689a9e38678a592dad3f4318de18098d.exe

  • Size

    512KB

  • MD5

    689a9e38678a592dad3f4318de18098d

  • SHA1

    752fe166e7a6932e3ba625de77136e79db6bff10

  • SHA256

    79af9b9d51f1ec9f2cb4899d7f2a601136e64c4f4af54bd80b1157c9e2c639e7

  • SHA512

    850bd82581833b20f1ac972cc42d6b9f66964e5d1cb33cfcdd99fb2f5d2de62a379934eba31b1dfe47f7116bd3f315841a456aeae97c671d65e1626ba8288012

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj69:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\689a9e38678a592dad3f4318de18098d.exe
    "C:\Users\Admin\AppData\Local\Temp\689a9e38678a592dad3f4318de18098d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\uuzgorcxxw.exe
      uuzgorcxxw.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Windows\SysWOW64\kxdpttxx.exe
        C:\Windows\system32\kxdpttxx.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3388
    • C:\Windows\SysWOW64\dhuwhkrilffsooy.exe
      dhuwhkrilffsooy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3936
    • C:\Windows\SysWOW64\kxdpttxx.exe
      kxdpttxx.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3368
    • C:\Windows\SysWOW64\slpwvkrubrdly.exe
      slpwvkrubrdly.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1212
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    7ffe0abd5a972fe48450a56c70ad022a

    SHA1

    26fc025ecbff1cee740c6830c0a9b2e6f750969e

    SHA256

    c8833a267afa9459c0b157dd3eb7fa9195532541a53a8f78d0b9d9bf629d9971

    SHA512

    7876e7e6d98f6fce8b9e0a49a0f99593c724e599e82a1a576e1fdc2b25f479a8b832f805696363d45a45fcb594aa46b5dbf3855919e84de08240a6c00192aa91

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    9d5a21b2569ae1f938a78c79774babeb

    SHA1

    7e585ab88024511c48f039325a2c42f65092298f

    SHA256

    239749b1a9dcd29ad6ca876afe0c800e5799ec396c5f446ecc9b35a0c8425299

    SHA512

    552857757fe1cd642345147815b1940ee186d7fe1ee877d4334c64ffbfde452384de6cf6e47124a467f1b166ff2f88156f276a690d174974836a82023b18051a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    74597344a587f27bd097c87432e0f18e

    SHA1

    bf4bde60c5e06f5004e329d9e69492a6f3b04b84

    SHA256

    86f2b03b81281c4c065c3f825fd1596b2c4e329181916946c855f54a61289db7

    SHA512

    3948fc38db6f683a11bbdd3492023e7af3f74b5bd24166a057278857f65e4b83811d6559e956ce14eae36180136209c323d7465215879d09c50c13490efc84b6

  • C:\Users\Admin\AppData\Roaming\PingUnblock.doc.exe

    Filesize

    512KB

    MD5

    d9228ea31fea86d442c650b764294b14

    SHA1

    31723015b984a93d240fa3da8b2f5f0f5103dd56

    SHA256

    39100844587b77ce84443106d4af63469d7d2c0b4baf2fb27826c8439210b215

    SHA512

    594e734cbdae70fae25a8184b65009a082a2ba3ae02327590b7313d523a256c893efa42e20cc8af71cedc3fe4cf19f408d16ca334d366288eb777268153806f3

  • C:\Windows\SysWOW64\dhuwhkrilffsooy.exe

    Filesize

    512KB

    MD5

    e351877150c33fae6f751d39580c6d3c

    SHA1

    5da89f3e9e5250acc5955c6bee1fd0062f8ad4a6

    SHA256

    022ddb5e440a7fb11932e7e8c07116d1c9a673c7b4668a668d4eb338fa30d804

    SHA512

    0ef41c9569e7425437ffaf0c57053d0fd0eada2076d172b522f302f4013244714d3f0dc26922504ea109797fd52b5f756f7fbd9e50eb8206f2db45c68107f6c0

  • C:\Windows\SysWOW64\kxdpttxx.exe

    Filesize

    512KB

    MD5

    2fa81fcc44d8b1258e97922a652654db

    SHA1

    4a801b8e7914fd3762402d7bde0879a1491206dd

    SHA256

    b3a21acc12128626cc3e11bf973488a119d8a4593e50e614263b1fd5fd4cd566

    SHA512

    9300cafc861e2c5779be7c334355a97dd46aa57a8eb632d2210aad135031655c78bac988d0fc746e303537e69c42983635f56ffa7287a927c88df9670122b447

  • C:\Windows\SysWOW64\slpwvkrubrdly.exe

    Filesize

    512KB

    MD5

    f54295a48de254fdba4ab53a25e39283

    SHA1

    a2953b00228d60d8906a46ab0d429750fe558da5

    SHA256

    8ec28070fa5a527ad2bbf1b67baf035b3323a9379ec2b8cc563e2056d41c394e

    SHA512

    22cc4ed366eee010aa7338eaad3970192dc52858d49c4dc49da4bf1e6de204d547c089620d0d1a8d6d3dc531ff623f91cb0adcafd7a0862f0e911fac511e9e6f

  • C:\Windows\SysWOW64\uuzgorcxxw.exe

    Filesize

    512KB

    MD5

    3955fbb2105900e7a28fded2b1872392

    SHA1

    ddd34ccf70d9ecdd838de1e0f6beee39cc6b6559

    SHA256

    8e2f804261cc788dc039711fac492759182532692f3f2b11380c39a10bd9076d

    SHA512

    729ed149db70d5fe17aa5dd29e61c8f20b2330c1032acfc1a6c7ec72fda88fb773fb783aa73e94fa136eefc2d32467cf4371c62b0a8f5b0e71770b39559bb4f6

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    0ac6584b8f122815b7f8596fbb48e401

    SHA1

    2fa87ff16f585b59bd13b79f97513351c8c6c6ad

    SHA256

    0061d6894906bb51c83d772b5f0948b4b329e7e5d49463c24735f2d59927e712

    SHA512

    d64236d0f673df7c5cdbf1baf1977d191ebde8bc14496ea45a951a0c11cbabe668a9b1bdd5ebac0c18d3f29103a34cd99cbb08881490bca37975827ae681a18e

  • memory/2244-51-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-38-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-45-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-46-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-47-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-48-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-49-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-50-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-52-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-37-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-53-0x00007FFC22430000-0x00007FFC22440000-memory.dmp

    Filesize

    64KB

  • memory/2244-54-0x00007FFC22430000-0x00007FFC22440000-memory.dmp

    Filesize

    64KB

  • memory/2244-44-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-43-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-41-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-42-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-40-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-98-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-99-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-100-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-39-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-128-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-129-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-130-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-132-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-131-0x00007FFC24D90000-0x00007FFC24DA0000-memory.dmp

    Filesize

    64KB

  • memory/2244-133-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2244-134-0x00007FFC64D10000-0x00007FFC64F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2404-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB