Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 18:39

General

  • Target

    7afabb44010283947b9c8b8f690e3344.exe

  • Size

    512KB

  • MD5

    7afabb44010283947b9c8b8f690e3344

  • SHA1

    21802d13b61b3e210776f5464a97af2acbdbc4f6

  • SHA256

    2b68f6a4fb6411293ddedd8ee49680afcb20649f57035814fd3e0e7b348adbfa

  • SHA512

    3f3d380751bea3deebcff00085e18ae454a0c6b6c2df30a15b212349758856066e088ef6d25e3a6da505903d431601384bbd2cd750da570f5d9d447bc7747de3

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5s

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7afabb44010283947b9c8b8f690e3344.exe
    "C:\Users\Admin\AppData\Local\Temp\7afabb44010283947b9c8b8f690e3344.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\dltgxlkdaq.exe
      dltgxlkdaq.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\ubrcryeo.exe
        C:\Windows\system32\ubrcryeo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2340
    • C:\Windows\SysWOW64\lslzqcfqrvakbak.exe
      lslzqcfqrvakbak.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2228
    • C:\Windows\SysWOW64\ubrcryeo.exe
      ubrcryeo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:224
    • C:\Windows\SysWOW64\xcbhhahfurlwk.exe
      xcbhhahfurlwk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:100
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          d36f2c6d96d6265e3e742314c47e2617

          SHA1

          c75f625f2496389decddf0c1893ce7fcb5452c80

          SHA256

          1f80487e1232e84ee2e0ab3e22b9f557326bf801dc26cd5b17141a004cf234a6

          SHA512

          6bec56b97e2cf60d86d7826adf225be33552f5608f16108d8e1737457d7a8d108d3cad55cde478e1a599603aa4fd283c6f48f3d3ffe0a6a52a75e25e614ef240

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          2f59d65b8cc62950e2eca12f97e7aea5

          SHA1

          70425546b3d2727662186375a6530e21d530fe98

          SHA256

          6e54136b68b1e75504c72dc2071d2abb45d736bcceafebdf85366a828c2773bb

          SHA512

          da752bc91e61706f9687cebc246de04145faab9864ed99f17a9210831527e85e2abf03796d669d41b61b84b8d1110952cdf459fb10a8329f693874bd23424bd8

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          b15ecd3d0ef1516eed2d17af50060903

          SHA1

          735806023f6c2329f8bbcd156ad28fde592cfd3b

          SHA256

          3f09008f007ab79fd07f6bfaa0e93e374a2f325924e61ba8102b4e80afdc7661

          SHA512

          bfbf102dc6214135de217b1651aab45aacbf400b5335b79e9a0d1835878b78d25b4e880295860b053023cf5782f843401f07f380fbf9e183a4435f636ba571e6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          c3e091582c2285b57c52bfe239239096

          SHA1

          4a02d633ec9eb568ca55282c4c1a1f1c6d50ecbf

          SHA256

          0978aa2305a0f3ffa05f08f5826b04759dd0ece17534d60f49b07e5b55be0364

          SHA512

          e19959413ebe5af1a8d2563834c8dc4d5bcc38d7d8914410d81618e4dbc3028bf9e8cc2132f41e6d1f8385d6d2c7880c68e33442c59378578e4fa7c98ac570d9

        • C:\Windows\SysWOW64\dltgxlkdaq.exe

          Filesize

          512KB

          MD5

          475441fbacffce27251428ced91d0270

          SHA1

          a423e6dff9178cd8cef781bb8cb7b0702a3fcb7f

          SHA256

          e1b6c7c5dde2c580a0244f5c28bf908f6b399fea98f3b58689a0b8314c77dd39

          SHA512

          1a83cefba0aaa070410b5590565aced6fa7b363d5745b46ba99f4010d0cb34da6ab851eb8ea862e0ec39f2f4f934f85e82b28dfd3af7d78864254d56fe7fa30a

        • C:\Windows\SysWOW64\lslzqcfqrvakbak.exe

          Filesize

          512KB

          MD5

          5da24f952c0416af68c7e0aa204ac1e8

          SHA1

          3d1849e54a890683772280e75da0c0c77327fe24

          SHA256

          9b66394ddafd475e1da0b59f5fa06c6fe83ada2a352b942d74ea59144ce3b9b6

          SHA512

          6fed35949a3c84ecd9dcbcbede932c1b065b7a56c680a7921d007b58355ce91d1656ff88294c6fead2fbae8620381ca1bd2ed7b3d263db7fb71102399a8475df

        • C:\Windows\SysWOW64\ubrcryeo.exe

          Filesize

          512KB

          MD5

          33cf227a9e4131a1214ac21a5ef7c2b8

          SHA1

          b21bf49f8e3e9e1bbbd72d70ff629ef1677f9108

          SHA256

          2dee1a6442d38a7a3d451834295c5ba3ae631e6e523286b48775bcabc7608511

          SHA512

          8de9c8158f827d36a51c13c0419c8b5cb3ba69ba15fa14698b7dccbbb0028dc5dd576c8e6aa343a81a699d748a60cd7e763c12e0fb86599820a6bb4b19c54b2f

        • C:\Windows\SysWOW64\xcbhhahfurlwk.exe

          Filesize

          512KB

          MD5

          38990487607a6a73e0308f6f3ce3e745

          SHA1

          12478632b7b936c3a43ae188bc291cfc525be976

          SHA256

          32d942b4b6fe7af40ec5aa8adcdd03b2ce5bb40632ecc0e288ac286fdb407689

          SHA512

          88cff8922d126e6d11cd0f3ecd444b579ec9650a3739c9b9e01883b849cc6dbfc1a2e526ca8f3f551849b9d406e12da419b298eeba40fa96fcacb439a15f4ae1

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Users\Admin\Music\UnlockJoin.doc.exe

          Filesize

          512KB

          MD5

          9347e074f0e27913b088d2121388dc61

          SHA1

          db7e102b6b5a6f9b992085161eaf53d25acf10cc

          SHA256

          380fd17beb0ab20f3f0447ed3404188cd48a0aea7e9296be42357fbc62f2b54e

          SHA512

          1ff534efa2b744f87019306f191a022e42493bc204dc8695518aaaf043e29e3e01f69d5f51f03c87871bfa3446fd1ee5cb7b29304b2e17e98706479618d3f394

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          4cf6beb7406b7aa2c1f722ec24f0c611

          SHA1

          d00c80d17c979164a0b45e38b18819cb13e2d85d

          SHA256

          f8705d8859979a8b6bdfc6d78741641afe2e9b171aba545b2e8bd88cffd30568

          SHA512

          91d2c8a80bad8d500d439da44b660629d728da1c3bea24880d89839f71ab3d5b1ee21eddff4d30d28c9b5506574d5b939e0f10d84615ad48b77ca0afe66d8dc2

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          4f0aca6a1ec6f96ed742f1522ccf5dca

          SHA1

          f0cc34300ea1d481cf7b21e0b4714805581fb686

          SHA256

          8db7ce159a4d341b9ddbbe5957888923b601f2e2087b5f3b028a6993128f06e0

          SHA512

          32fbbae5fff12fbf61e0437ab5eb1d37fffaec592f7298b648d9da41fd3e5e1df4837aee0227763191899275ee1a2d5664548d9a254390382e243e81e0b89f0d

        • memory/1732-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/2868-42-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-35-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-44-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-49-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-50-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-51-0x00007FF8EF450000-0x00007FF8EF460000-memory.dmp

          Filesize

          64KB

        • memory/2868-52-0x00007FF8EF450000-0x00007FF8EF460000-memory.dmp

          Filesize

          64KB

        • memory/2868-48-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-47-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-46-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-41-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-43-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-40-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-45-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-39-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-38-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-111-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-112-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-113-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-135-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-136-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-137-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-138-0x00007FF8F1BF0000-0x00007FF8F1C00000-memory.dmp

          Filesize

          64KB

        • memory/2868-139-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB

        • memory/2868-140-0x00007FF931B70000-0x00007FF931D65000-memory.dmp

          Filesize

          2.0MB