Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 01:23

General

  • Target

    95e1df98c1adb6008490cbcc60e619e1.exe

  • Size

    512KB

  • MD5

    95e1df98c1adb6008490cbcc60e619e1

  • SHA1

    f920789eca228acaabe99a63e390377161c3bc1d

  • SHA256

    53dcdd2a996674fff20c80fa082621e04778f16b9ada224f2122465e3d777236

  • SHA512

    401ee7ebb51cf34f73307d39c381c3a3a04ce0a4f8c8beac5068764ad2a9b994d7613c807349c0285675fc73deb180c7d5a61a3d0e5d69fda31a7402f500ed9d

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5H

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95e1df98c1adb6008490cbcc60e619e1.exe
    "C:\Users\Admin\AppData\Local\Temp\95e1df98c1adb6008490cbcc60e619e1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\alxddkudqy.exe
      alxddkudqy.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\bisijuve.exe
        C:\Windows\system32\bisijuve.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2900
    • C:\Windows\SysWOW64\qstqjxsbljacrwu.exe
      qstqjxsbljacrwu.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2752
    • C:\Windows\SysWOW64\bisijuve.exe
      bisijuve.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2672
    • C:\Windows\SysWOW64\qyhapxohdudsg.exe
      qyhapxohdudsg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2092
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      66KB

      MD5

      746969d09d6af48baa373d8b0acf9cac

      SHA1

      0d61d9b08c176ca16af3951edb89957290bf4995

      SHA256

      5174633384ad1493c89e048565f4ea56519297c26b50c0918d41d5f5d99cf839

      SHA512

      0e3d6663b3047ebec9c9225e61af7706f16d947b53e6641398f35bb3740b31591ded2a692dfcedd894705399ed4a66412efa741c7070e3d6d9fa1e0b7bd089c4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      e9c2c4805e30a845986e7c05add54156

      SHA1

      a99d442462b9e268da4363550272914f5095e12b

      SHA256

      6d9b08655b7c3ca46cc7f8ea96eb7730c304203e420a266c18e9e0245a1a536f

      SHA512

      a88565318d838c37da7e764a49839fcfa3b6d9ff33790a81a5f442837f52079f3cb1b9d85d3c7b383780cc4aeb9fb4531db262ac5808f8e12dc83546cade049e

    • C:\Windows\SysWOW64\qstqjxsbljacrwu.exe

      Filesize

      512KB

      MD5

      29170b3b0b29c7957e25a5dd69410911

      SHA1

      6931d217392322ebb799ee19a29048e178a8174e

      SHA256

      553ffaac561b46f1db1bc0a1819ca190a06d7936b61f45c29936b806e34c935f

      SHA512

      f8fbc10938631951819422d5128433af42e22a46db3c2244fb9c4aba13cdfbbfd380a83598bce30fa6961fa288cb67e70528e15e674856745048f645019a3589

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\alxddkudqy.exe

      Filesize

      512KB

      MD5

      63abad99ffe6dfff8cb02737a59b1284

      SHA1

      479279e1edf63b5c15c214f1a93bc853568cdca4

      SHA256

      cc646a6a92c44928a05a45310a956f615ec854e366264960ba536cc2064daf52

      SHA512

      d37fae43a5fc06d1269475749a7846168ed85d75fedbc0d652095d1bff0133ed1e2ed69d647d55c93498d9c1e67d35f7fb63162dc794ef6ddd2c9f3771627777

    • \Windows\SysWOW64\bisijuve.exe

      Filesize

      512KB

      MD5

      233aa0450bac80e5209267281dbf1d89

      SHA1

      07b87d9aee0dc52a0d94419ed0a4923616338edc

      SHA256

      a23a03ebc7b711cb75452774656f593b6ee5304e6ca6ef40c1e465d9ae3addf2

      SHA512

      35d5929af1fda3e610eda8d977882f27c2e93e79d665d431ab0613dfac728ff4d153ec8036daeae5eb09bc469d47a6c8d88ff479aec0d9a0b80e8e965e3d21e9

    • \Windows\SysWOW64\qyhapxohdudsg.exe

      Filesize

      512KB

      MD5

      1f7bfae4d4c24dad21206a893943dd0c

      SHA1

      534ab6500ba24717cf60fb5b928351f89d5a7cd2

      SHA256

      3f591b211a8c894cf57cc56e3b478019601868554795bc9bd1984722947909f8

      SHA512

      c97cfc17e24182df6325cbc1c5603f2658362a3b1d9fc9f8d2176bf500044db42a818072f95cfe66871850711c4d568c07b434a2ff20f4dbca6828f238373370

    • memory/2000-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2808-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2808-47-0x000000007187D000-0x0000000071888000-memory.dmp

      Filesize

      44KB

    • memory/2808-45-0x000000002FBD1000-0x000000002FBD2000-memory.dmp

      Filesize

      4KB

    • memory/2808-76-0x000000007187D000-0x0000000071888000-memory.dmp

      Filesize

      44KB

    • memory/2808-97-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB