Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 23:09

General

  • Target

    7b880e537aac45cce5b55c5deb5e48b6.exe

  • Size

    512KB

  • MD5

    7b880e537aac45cce5b55c5deb5e48b6

  • SHA1

    bcd63a8498d850a32579e68ba83da89bf73c49e8

  • SHA256

    25002152bb73f31b491fb484fc08aa0b23349b4c2baa6934920b5ecab2255dbd

  • SHA512

    306e4546d03761664d64bb446daf4b585227b2de6ea00858e6e993198ba41c9529d54605c05a49aa0e2c07c9eb5e07bf06c3d29c66eac0d709fcd9983f699ed9

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6w:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5j

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b880e537aac45cce5b55c5deb5e48b6.exe
    "C:\Users\Admin\AppData\Local\Temp\7b880e537aac45cce5b55c5deb5e48b6.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Windows\SysWOW64\vhtsjhhuwl.exe
      vhtsjhhuwl.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Windows\SysWOW64\jbkkdsfw.exe
        C:\Windows\system32\jbkkdsfw.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:5104
    • C:\Windows\SysWOW64\xnnptlckojfpeyb.exe
      xnnptlckojfpeyb.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2088
    • C:\Windows\SysWOW64\jbkkdsfw.exe
      jbkkdsfw.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3624
    • C:\Windows\SysWOW64\ahfehrjijdbth.exe
      ahfehrjijdbth.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4944
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3444

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          53bfe44191fe16484d54f9fd5cdfceda

          SHA1

          250f927d6fe5a99ac19a79e39d4d36f92624b94c

          SHA256

          c74d8ea46d1cd6bd624ce6edd057078d9727033285cf8ccc23b29f90a69bce92

          SHA512

          5c9012393d6e1574db5962735dfb5f79358a2ce9813a2de1bb96d6928e902bceed001f8ac43fc6ef0524671d241f252d260c7f258b82b745dd9c1721827afd12

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          455KB

          MD5

          eebc97d14a03dc82f66fd188a34d7317

          SHA1

          fe6a7bd89f11c18f16a07539088dc0d07f094fe1

          SHA256

          fd4925123d3873897da63cf5bb025651bcd6dac9763b584899b740304af96fe1

          SHA512

          93e51d543938417f37851bcd3f25a19169c2269429cb8e0a457e2e795b144c3f5e95acc02727e6aa90b3d175f9147f0e54cc44a4993fca296e341198750bcd70

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          6c983f37793be02a0cde293b8c1f2630

          SHA1

          20414206151ab6c7d48e6aa7ccd372c258f75fcd

          SHA256

          ab397fde5137da372037e08eb8d3340fb09c31c660ad6e2ad9f414956fe432c3

          SHA512

          53389545c234985c219925cb136fa900881fe5f08af03138c1c750cecc0fd6a51854b0b38bb60cbc47eec8c64edae7e0f3219db658e9b254ec84e51e173940a0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          591debc9ec71ae12b3f22a33785dce65

          SHA1

          18dd5c5223253bac42d3385c9a73b260d96fefda

          SHA256

          11124156016f29d638b55789fe793794a4d7ed2694498dc6f89e57dad41bf780

          SHA512

          a0bcce2d3dda7da3f463f9e934120727cd43827711581d246378a8c1c35fee8a0015ff25c7d5b8e233e5a7afedf0c2883d3cc6c7375f9ecf08b7658fd8fbbbb5

        • C:\Windows\SysWOW64\ahfehrjijdbth.exe

          Filesize

          512KB

          MD5

          4dba43fa29f1e3f83c5b9e514695b50a

          SHA1

          c91e632a78e5ca7dfc14ee55b7619b3a3b39794d

          SHA256

          0a37491c20af339853944636ccb2089ea46eaa614b90dbb4044690c580ad3d1a

          SHA512

          cd20fb09fc728335c2223a88e135b395b9da66316fa35a7e9b7d8475ed21a4d253b78bf3e51aac732285eb0464fc0ecce09963e582d43aa6438acd4d36627d01

        • C:\Windows\SysWOW64\jbkkdsfw.exe

          Filesize

          512KB

          MD5

          ecb2b83e34e8e77c705c17f165b17bfa

          SHA1

          c01d347ca9c09f006f8e3782ed5bd33859e1d962

          SHA256

          545d66903e7a970e8f4caf8efb3e2bc5640d9e1570d17351dd9d222ac419365b

          SHA512

          9976b4420af2f36f1057a505129553fca73424d1eefc9c937f88f2f1450e7dcc4c8fe57943360ad6d960a5b571039bbb96ff3b4c6e11c9d05037da42ec7f2ccb

        • C:\Windows\SysWOW64\vhtsjhhuwl.exe

          Filesize

          512KB

          MD5

          46027869049c63a8f7099785e00fe93c

          SHA1

          def5d24edf2d75c0f59c29b79ad0a3abab6ae26c

          SHA256

          9fc91865b83529f5bf703a7a3e11b163610ab529ef358d2f536769cc0bbf2e13

          SHA512

          eff701eba63dde3d37c6943a4c5488a1c2d6a00b4f3e0f5dcc404f4eae47a5f10cbcb693e2498f4c0d38c11bfe78441023f9260a704152bd94a0ab931afa20a3

        • C:\Windows\SysWOW64\xnnptlckojfpeyb.exe

          Filesize

          512KB

          MD5

          76462207d97238c7e29a9cdc1107e7c3

          SHA1

          3c89b80213543aa125110a706a561c6af5d51472

          SHA256

          69587f85b2de11ecc5fdb0b0bdb9814098d96574a1710b5d2117b9595fbb50ba

          SHA512

          195934da6dc65e39744fac2ad2778e91d05450be1c7b30766c63d32049c30cf93a532bc5dd3a4f95d68c6818dfc0399a5701d1f6f55b5b8ca5054707351f81e9

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          de9d086b5453dd879ea672f171ef6f98

          SHA1

          5baead1017d20daf7d11035cc34a7eaacd578300

          SHA256

          aef19ed10f6b9b21fb35415d2cd380f7726699a286684e91f48d4dae3bedf07f

          SHA512

          28cf9d4db3990bd088fc2f0735babdcfe50cf9a339522ca44612df8afc7a73098a9fb7fbc9a0dd6a4e051b300e7537e01630766d8614868255eda0b2c393a0b7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          36e8aa8710072a6cae654f7e27de1e26

          SHA1

          e0f58e93c99d766da5e16a8bb993cb33f9f571ed

          SHA256

          7b8839c3ad963cafda138ae6d1c18052c9816eba0758ac9190dc9ab1a463bd5a

          SHA512

          e643233f9344294f43db4108dc29673d10659c1076ffd7178f75c3f48067b63f9553794406cf82e8936bdc8d35abec331553b2a99063d21ceabd8cf92f0d82f9

        • memory/3356-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/3444-42-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-43-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-47-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-48-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-49-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-50-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-51-0x00007FFE82610000-0x00007FFE82620000-memory.dmp

          Filesize

          64KB

        • memory/3444-52-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-53-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-55-0x00007FFE82610000-0x00007FFE82620000-memory.dmp

          Filesize

          64KB

        • memory/3444-54-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-45-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-44-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-46-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-41-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-40-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-39-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-38-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-37-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-108-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-130-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-131-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-134-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-135-0x00007FFEC4D90000-0x00007FFEC4F85000-memory.dmp

          Filesize

          2.0MB

        • memory/3444-133-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB

        • memory/3444-132-0x00007FFE84E10000-0x00007FFE84E20000-memory.dmp

          Filesize

          64KB