Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 21:27

General

  • Target

    97a50fa5b38ce05acef9a1c9b76d192c.exe

  • Size

    512KB

  • MD5

    97a50fa5b38ce05acef9a1c9b76d192c

  • SHA1

    fe842e3591b412cf4bc21feb180ec507eb9f9c74

  • SHA256

    ef59ce22252d36c9da7b529a93a33edd78dab24a75c2cfc56b62d5b4e8b96bc3

  • SHA512

    ed13d86573b9649c37ed798f5c6793d0d9bcde5e4f739e15d58d4917a840aed61fde8c961ae92522fd4130bdb1779722c5c08c7ea5e9e1ccd4ea53c81172e908

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6P:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm50

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97a50fa5b38ce05acef9a1c9b76d192c.exe
    "C:\Users\Admin\AppData\Local\Temp\97a50fa5b38ce05acef9a1c9b76d192c.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\SysWOW64\wjlftghtyk.exe
      wjlftghtyk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Windows\SysWOW64\gauwfwdi.exe
        C:\Windows\system32\gauwfwdi.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3004
    • C:\Windows\SysWOW64\ztezmshoadpxhxm.exe
      ztezmshoadpxhxm.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1648
    • C:\Windows\SysWOW64\gauwfwdi.exe
      gauwfwdi.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1676
    • C:\Windows\SysWOW64\ddfcythdzstjf.exe
      ddfcythdzstjf.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4768
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W5V32SSFZGXPF26NV1R5.temp

    Filesize

    3KB

    MD5

    a0c3fa3346a516d7d63839c64f9efe0c

    SHA1

    a67607f422b88c67f89e300ba06b4b8fbd409ff9

    SHA256

    9c091295b62f1ce29f87f3be12fa4f2a781461feb6d88305dfff4ca23314ae1c

    SHA512

    46591a4602d259cc6030cae7d2ad0bcdb11464aff3c048b707c7c2f635c3e1abcb5f107c0c5bf3dde3a0ca68fbb1ce332a4095bc18064c4f41ec39c3b4d128b2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c97f434897db5e69670386326787e7a9

    SHA1

    66709d6c42eaafb5c81851e7f0591db981961674

    SHA256

    547754113892da76e527294f6144b6160097892da463ec4bb65fa69aac193344

    SHA512

    23bfc7e2d55311bb6cd235644adc526c2afd098ec290a0b64e493a49215148978c38ea48453d1258730490c3326a634caa4b8b34ccbf26a92a9d7e43159ff403

  • C:\Windows\SysWOW64\ddfcythdzstjf.exe

    Filesize

    512KB

    MD5

    837ae9ca4b3e674db707c3444d329691

    SHA1

    9c0af6c3177a1f551095dca87c84e455e57f9c5a

    SHA256

    0ffffbeaa67606d4bd4c6d22ecea84512bb359c0913cd3657a663a80e957bf48

    SHA512

    793891a4029cfa3a6dfda47ebc097a20393d598d892816999af5770903978d65307735f77deed6d0d69136cb6f2e2aac71b8f8ee6a55b66dc762669f6b3b0eb9

  • C:\Windows\SysWOW64\gauwfwdi.exe

    Filesize

    512KB

    MD5

    9ed453a6da01694f453d21b46033ad14

    SHA1

    799091fd6e1d8ad0a92c8dc0ea8bfeb7d4bd059c

    SHA256

    044fb945a3039d527c7f5dd5c4a9ebd71b2de5abe920decf87060689e1d77627

    SHA512

    845367d40ba863c764c943e8138804410a922546140b54309419b7076460d70396f191a60814a152281ac4e76a65f89e11e5961bcea0d16ed02585aa0457e934

  • C:\Windows\SysWOW64\wjlftghtyk.exe

    Filesize

    512KB

    MD5

    87fa0eb9c64d95e73e52a0c52591b47b

    SHA1

    1606659184e7c28d14505a0363f53afb37c78987

    SHA256

    5aeea1d7fb080acd13962c4006619e13d33a393e7a657cdf37d0bc39175f39c6

    SHA512

    490c7032b2617982cfff9de9ec76c30731cb2e3ad47573a8ccf80bdd85aed13de54bccd07879978c66988c49c14447f29316ebeb9425f5c14daacf7fc9dcae07

  • C:\Windows\SysWOW64\ztezmshoadpxhxm.exe

    Filesize

    512KB

    MD5

    a2b3629058bc328c9cb88016e7f82b00

    SHA1

    f5fc8524e2725eed2d3e344bfea1fb85f5844a0e

    SHA256

    5c3a826c09a606fbae14fbb8106d3b2fd911ccf55c2a81a5b5d57bf40d52cac2

    SHA512

    19e106438719ada852ca8bb3acc588d47522911f086bd1368a4eec382a4563de400ed9359e133baf0ac14c5576c086e7f195a5946339aca926d295eb20671e7c

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    78b0b0d2ab4a51a6d71d51ccb7709646

    SHA1

    c9281e33d60e565e2403bbe3741cb4cec4f61b94

    SHA256

    a71f3647f975bd53229d207c4784640c06b310c1360ef404a9b78ebb133897a2

    SHA512

    9b66fcd2b38c87b49115db551ae5e645bd912e14c6b2961ab3e457f814b8505687c6c5b989c202f987420c7d965819d64ee2bd0aec7edd36dd6b30552cd5a1ba

  • memory/984-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2872-40-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-57-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-43-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-42-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-44-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-45-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-46-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-48-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-47-0x00007FFF58D50000-0x00007FFF58D60000-memory.dmp

    Filesize

    64KB

  • memory/2872-49-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-50-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-52-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-53-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-51-0x00007FFF58D50000-0x00007FFF58D60000-memory.dmp

    Filesize

    64KB

  • memory/2872-56-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-41-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-58-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-59-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-60-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-39-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-38-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-37-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-35-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-36-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-108-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB

  • memory/2872-130-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-131-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-132-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-133-0x00007FFF5B0D0000-0x00007FFF5B0E0000-memory.dmp

    Filesize

    64KB

  • memory/2872-134-0x00007FFF9B050000-0x00007FFF9B245000-memory.dmp

    Filesize

    2.0MB