Analysis

  • max time kernel
    3s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 18:39

General

  • Target

    7afabb44010283947b9c8b8f690e3344.exe

  • Size

    512KB

  • MD5

    7afabb44010283947b9c8b8f690e3344

  • SHA1

    21802d13b61b3e210776f5464a97af2acbdbc4f6

  • SHA256

    2b68f6a4fb6411293ddedd8ee49680afcb20649f57035814fd3e0e7b348adbfa

  • SHA512

    3f3d380751bea3deebcff00085e18ae454a0c6b6c2df30a15b212349758856066e088ef6d25e3a6da505903d431601384bbd2cd750da570f5d9d447bc7747de3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5s

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • AutoIT Executable 5 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7afabb44010283947b9c8b8f690e3344.exe
    "C:\Users\Admin\AppData\Local\Temp\7afabb44010283947b9c8b8f690e3344.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\SysWOW64\iftrgpnohn.exe
      iftrgpnohn.exe
      2⤵
      • Executes dropped EXE
      PID:848
    • C:\Windows\SysWOW64\oqjvfmgmhdhpa.exe
      oqjvfmgmhdhpa.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2796
    • C:\Windows\SysWOW64\joixgtyx.exe
      joixgtyx.exe
      2⤵
      • Executes dropped EXE
      PID:840
    • C:\Windows\SysWOW64\vylwpckerelpjlv.exe
      vylwpckerelpjlv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2272
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
        PID:2596
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:1672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        cba844fd67ef4d3ddab5a1fd81a63127

        SHA1

        c71ae5cbff698d508090581abc73bfd4b99598f1

        SHA256

        7b1199b5b51a7706713316c106be45c59222d3e80a0b6d6cbb85f183058bfcb6

        SHA512

        d749cb0564ef6b36a4d0dd0d25556e4f77005eacb4a10a0cba143e3eaccbed4b0b077d2afc22b06bf8496e5e05f8ee26b59a113bd1d6c6e7ed1aaa693c4e0827

      • C:\Windows\SysWOW64\oqjvfmgmhdhpa.exe

        Filesize

        512KB

        MD5

        bddf83268738cc11013813eadf9e7b31

        SHA1

        59b618cb4ace59f26d01365c6374491f085f6c95

        SHA256

        7ad5933e45d5a33f415d2e64b228d6a1188f20cc8c39d68c79fbd8d5c444643a

        SHA512

        7324f71fa922e7e34704a5c0362a2fac3a4d94519643baddc9b6d4bac66f2f48a541ddd1504fbdae5134b48012cfec94006237af3306adfa5ac90a22cb01de93

      • C:\Windows\SysWOW64\vylwpckerelpjlv.exe

        Filesize

        512KB

        MD5

        a22a40608ed778e1af4242e9b5fc494c

        SHA1

        7836ef51519d8ff09681ccde98f7b92cd2d54deb

        SHA256

        ca03bf74750fdee2518262118ff3e7b984fd589bd8d378b21fd91e269e1ffe70

        SHA512

        b752b28ad56a3d852ee1ff6998330c1da799c4723a0a7ad35446ff1677966db9510b1acdb24bbd00941b935fadaedb76d8b101cebe07277a705afc5fb34a18aa

      • C:\Windows\mydoc.rtf

        Filesize

        223B

        MD5

        06604e5941c126e2e7be02c5cd9f62ec

        SHA1

        4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

        SHA256

        85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

        SHA512

        803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

      • \Windows\SysWOW64\iftrgpnohn.exe

        Filesize

        512KB

        MD5

        412126f9358354d22301884bc4adc1c2

        SHA1

        a4d986d29f0f7faf1131d14153eacf490591a723

        SHA256

        48dc43accffc330cae5d546b8b407364632628c9bbbb4ac9eef1360f9e77858d

        SHA512

        68880a6a3bd7ae5eb15116c0fd824ca9fcb34433371069609e84c364fdb7e3af5524aa435e084c1c93a0395365b7c56b96115b7af7dd355165a132fa319cf41f

      • \Windows\SysWOW64\joixgtyx.exe

        Filesize

        512KB

        MD5

        f496431049efdc00898276c60f422acb

        SHA1

        98125284623bfe352837b2c6c57e9c11512f6081

        SHA256

        6e147c0206b4e7100ed535036a2008adf709b786d4c3826eeb8d5beedabf3a0b

        SHA512

        a7ab649502ca4d10c1653bc715cf21494267f0baa7fee2a0aba0fc2037c4496d2bc2a42cb4f719e173503a41f9fde028f36924848ab24b265c7b81f0a3f0cc75

      • memory/2596-40-0x000000002F631000-0x000000002F632000-memory.dmp

        Filesize

        4KB

      • memory/2596-41-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2596-42-0x000000007152D000-0x0000000071538000-memory.dmp

        Filesize

        44KB

      • memory/2596-62-0x000000007152D000-0x0000000071538000-memory.dmp

        Filesize

        44KB

      • memory/2596-81-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2932-0-0x0000000000400000-0x0000000000496000-memory.dmp

        Filesize

        600KB