Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 20:48

General

  • Target

    8d4fbe1a25eadf50288ba93dc252a158.exe

  • Size

    512KB

  • MD5

    8d4fbe1a25eadf50288ba93dc252a158

  • SHA1

    42b78dfbb389e1c5f4eea7b0882eb52de0ad3d98

  • SHA256

    1a6797bccedb621919fb625812d82c95c972371c03abbff3c5d8a9ebbfa231fa

  • SHA512

    ee8db62bdd41715f81175ad208eac4c02f05ae6721e97a9321d740660f75ef68cc2b3f5dd7c93e6c19ce5fe74d0b6ea0dd14c694a6eaade1b8eda9eca1f47624

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj68:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5B

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d4fbe1a25eadf50288ba93dc252a158.exe
    "C:\Users\Admin\AppData\Local\Temp\8d4fbe1a25eadf50288ba93dc252a158.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\SysWOW64\gizayibjro.exe
      gizayibjro.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Windows\SysWOW64\rgplbcsv.exe
        C:\Windows\system32\rgplbcsv.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3320
    • C:\Windows\SysWOW64\lopalrjeyflarfk.exe
      lopalrjeyflarfk.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1520
    • C:\Windows\SysWOW64\rgplbcsv.exe
      rgplbcsv.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3632
    • C:\Windows\SysWOW64\qgrnlohrhiitp.exe
      qgrnlohrhiitp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3704
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    31cdf00c497357946de841bc968cbd70

    SHA1

    9b6b4e3cf138a13b42243ddd6f384f489077060b

    SHA256

    4dd65df5281f5ec557b0a5abce30f004a79eb69f83960c9edb35e4a3b06398bf

    SHA512

    8a14d2c9528782930c07ec28ed905d911fdd9795905291d079e8d609f3b0b81ab045f1f1f07e55fab864f31c93337f605e74b924b2784bfefad727c01fb25c67

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    558a665cb45507cba74c1b29710c566d

    SHA1

    84b089124283cbf4897cb39254f506de1cdd3bea

    SHA256

    375c96558cfbb49402093364286293ea9b18085cefeca209866fc17904230c91

    SHA512

    e8859bf8b6b74e229edcfc1ba66c85a41b60b737b7817ec9f73c07dc79b1b2b03bc0a2875fc343079b5cc378b95c1fdf53ae312e701002eed72bb45f640d58ec

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    49dfb7e5233d9655bad600e7878590f7

    SHA1

    8bf1a02cf77e0cebc29e91f0ab7669a3b866c2e7

    SHA256

    f7f864a00122f7f25117c863b8b42dc39f4a7ea16763ba2813d55fe3ad51c8f2

    SHA512

    a2d172f5a4a279d08de9bbba00997f621b8c47deb66495d14a30c9de6e36d201da7e146121061b4c91f92422ddf4bc829034a3aa196a2f3375285ee80a395fc6

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ecbe2c54c296d76adcec38f5570273e3

    SHA1

    93cbc9883af703fa5921844449d784931531f807

    SHA256

    283395c2d31e55fe46b10eb01d1ee5c9755f4506f3bdeb5be5b7e457eacdb140

    SHA512

    7f48597d37736a65eae29e3895070cc81cdfad8411584b58fd2e6aa32ce877bae24ac8de7749fd7eee124fbeb861b73b05865e6b7ad60eb4608c413375d22543

  • C:\Users\Admin\Documents\GetRestore.doc.exe

    Filesize

    512KB

    MD5

    3ac640227447ed99c158d24c91d4ee9e

    SHA1

    bee346d46d5e80887fcab59d193f4296f69168c6

    SHA256

    8ca4710ead9df3f01b253567e19d82e0efe1b615d9fd5be1420f2363f8d2a3a9

    SHA512

    18040a6056e2b588879f60eb52eb2c9dc30c00bac0ce265c2588c6f84604bb45c70bc5d47b088c81c15fd9d68c0c6156ffb53704ae56be45fb2285d3029f6a1b

  • C:\Users\Admin\Music\UnprotectUndo.doc.exe

    Filesize

    512KB

    MD5

    a31d05f2447b79e3462bae6e8de6006c

    SHA1

    98672dd1d18ff3b2c9eb376403f313a465e7d069

    SHA256

    751d9115c71694d84bb6356d4f060dc43d9ea17ad884b33c142e65fcdf5b3a3d

    SHA512

    e0f2948da8b6fd439df94e234acf6d95abc1442ddbb6e21e05e078418bf0238c32feadd56d2e5817442b55c480fb07234ddd103a9e8238b98aa1bdfe69060b8b

  • C:\Windows\SysWOW64\gizayibjro.exe

    Filesize

    512KB

    MD5

    06d9f56d7cc8bf4abf2aec4153e6a39b

    SHA1

    160bdc296441573d5075ee1bcc79268365a50e38

    SHA256

    af63b6890487747eeab517ff18c976bd5fc681e97c497269ca02c7ab6c0513a0

    SHA512

    c325e81a5dfcd11d00d8bab092e4e9db25646df3dddca167f09b09cb9f6d58c7b3c566b83eb6d24c4820c96cfa201df58da1d9ffd5cca6382e363aea29759cd6

  • C:\Windows\SysWOW64\lopalrjeyflarfk.exe

    Filesize

    512KB

    MD5

    5421cb1cbba708b4ea0c07a64e19ffed

    SHA1

    9667419b526c83905b2456a5cc3b17cb320ba48c

    SHA256

    d3ff18b4c4808393aaed293e30733cb03eab694e34439d82e77b5cc9e9c16cad

    SHA512

    f89a18405de14bb7d0da267798935e952f29d6161e007c7f298976e9099ab72217eeca283032818d8cf764efe4bc1c9e86c722b1c192e5050fff5e1f8e1d075d

  • C:\Windows\SysWOW64\lopalrjeyflarfk.exe

    Filesize

    512KB

    MD5

    8bc1179a6b08ad16b7dfda74de1438eb

    SHA1

    ba9c7dac33bf04c999f1d09a5cd0ab30d0bc881d

    SHA256

    5f9a0318dc560f3faa16ef43199c060eeafce494cbe364d89a28a1d54161ecb1

    SHA512

    827e3ba86463dfdcc4940e356ea1608a297e319d0da6701e3f65df797a74dc6c8e8aa25d3fe0bf04a00225af231123d3405481bd2a602c739fbcddb75f8fc20c

  • C:\Windows\SysWOW64\qgrnlohrhiitp.exe

    Filesize

    512KB

    MD5

    d9fb2cb0106e9ece13fe0333e0f1f851

    SHA1

    8bfb8f0df8edbb89279a2dac8909feae75efed04

    SHA256

    1180d4c0dd41133b917c2f0a74f06524fe3dc581831a52b6ddff9b60791e4023

    SHA512

    5e24bd8e85a5550c17c4feebf28e54755ef0a70b5112693d225e53957128e51227a14534c1a5a315f5390b8f854703c976dfe9a03b7477ef39c654f43abcd9fd

  • C:\Windows\SysWOW64\rgplbcsv.exe

    Filesize

    448KB

    MD5

    9728739f509ce0f3b3b073c945c208bf

    SHA1

    31bf207a650a7f1bbb8e90552891f1a6f4e4783b

    SHA256

    f252517c755af447fe73347dd23cd133e28c7a203d01382306a195c8ddda3dba

    SHA512

    76e963f4d1b88528ebbdbc375372889efffba4768f6a99bccce4c1faa730e9515f93fa74bd10bb61c0034f2ceb9ef85ee8234f9d13df183ffc7e163ae3dd38e7

  • C:\Windows\SysWOW64\rgplbcsv.exe

    Filesize

    512KB

    MD5

    586c26624750ab86ab4a2e892da333d3

    SHA1

    61de3ed95b2bcc1d78029e2c3266ec8243353003

    SHA256

    6ba55897f2d4104cdb91b8c65236ecba5e5bf38ddeb78a5248b99486e8b4668a

    SHA512

    43439bfbcd8e3311946e66cf6eefd87941cf5b74841981dd3e90192c9db94a2630a094bf2052b5a166d873ee6c6a488c70d67733a643162837a378cc505e5f8f

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    6288bbac3c0179596e8e88e4c0b8e64c

    SHA1

    fec92929cd61eb8ee355c27d1d5adc9acedcad2a

    SHA256

    1aeec12a89b2359e221fd3b11be239fb22edfad444bceca613d52e15e3277fd6

    SHA512

    3b0e19919a8c687f775fbcb458428d11c22070e0894cfb7d31c10f59b9b845b29722b63ca567db33e2c94f39bb86b165e9494e1a98a9d77ef8081b18e455e6fc

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    ecae45bb5255001ae98fb0e41d51509c

    SHA1

    15b88fe6f73ba83d53b48a9f95a6a4cdca1815f9

    SHA256

    2c16b858ff456ccbc1109c2bcd78be6eb81d3ebc21ae9c3e41a39bd613e38f04

    SHA512

    67bff8d617dec94e6b9f974b84f7cd24f0c9f99f6948306fdc965f2e743017768615f51e14c0cb7b70dff82e9edd7b83e1b329edebb8b345066878afc97c546d

  • memory/216-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/3752-42-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-95-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-48-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-49-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-50-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-51-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-52-0x00007FFE99110000-0x00007FFE99120000-memory.dmp

    Filesize

    64KB

  • memory/3752-54-0x00007FFE99110000-0x00007FFE99120000-memory.dmp

    Filesize

    64KB

  • memory/3752-46-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-45-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-44-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-43-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-41-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-93-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-94-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-47-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-96-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-40-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-39-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-37-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-131-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-132-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-134-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-133-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-135-0x00007FFE9B970000-0x00007FFE9B980000-memory.dmp

    Filesize

    64KB

  • memory/3752-136-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-137-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-138-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB

  • memory/3752-38-0x00007FFEDB8F0000-0x00007FFEDBAE5000-memory.dmp

    Filesize

    2.0MB