Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 01:26

General

  • Target

    98209bce05ba828059a9aee00ad0ae25.exe

  • Size

    512KB

  • MD5

    98209bce05ba828059a9aee00ad0ae25

  • SHA1

    3cdeaf6bca893ef08d8d7ed987fb673b5a084986

  • SHA256

    2089eeee067c1767de1606f85bf54a15091cef15e2cea4b0e08f113ec03e4027

  • SHA512

    bdd7b578d30798dbe5cb8a09258297169fef0139553a19b3204273972dc0140e72bafae2b758803a3ce9633d9dbdf7e920984442464d4f525cde0c49d71ef377

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6z:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5c

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98209bce05ba828059a9aee00ad0ae25.exe
    "C:\Users\Admin\AppData\Local\Temp\98209bce05ba828059a9aee00ad0ae25.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\crmrzxmoxn.exe
      crmrzxmoxn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\SysWOW64\fynagbtp.exe
        C:\Windows\system32\fynagbtp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2620
    • C:\Windows\SysWOW64\currxrrxdxtvwgi.exe
      currxrrxdxtvwgi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2716
    • C:\Windows\SysWOW64\fynagbtp.exe
      fynagbtp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2784
    • C:\Windows\SysWOW64\xrognncwsxngm.exe
      xrognncwsxngm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3004
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      5bc75591f75e5ae193408733fc229a07

      SHA1

      e966025154eb23add00b5d2da2e54ae80a551c2a

      SHA256

      b99baf8c6d54c5e2187b1c30e08b2fb34f7fb257bd0c73a69b9fbcc9415bda57

      SHA512

      6f21657eab9445efcc325b6976b1bf7e71a5d135ee78f1129aca2c8e2674f687d8eb16a9412f42b04d64159a0566b08ec36295cf03e07c0d68ea83df2e17b7bb

    • C:\Program Files\PopResume.doc.exe

      Filesize

      512KB

      MD5

      47c245957dc48c74023f2bd2cbb90a14

      SHA1

      8ed4add37fd40b06731b5621fb1acc7d8ffd1468

      SHA256

      4bdae04a2cc064d390b9c764bc356cdb080a691ea1d5b65d263d628171610d44

      SHA512

      ba96e35893ec3f119f398281522323314597af9901947430f4e7e90365c620e161935a1e201ac06514575fbeb008a24c230032f5b0c93931675992c69582b504

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      7e6e7c201c5e5f273a239ddfcb79a744

      SHA1

      ee156dea80ca70ad661f93d17aeadffc6bf602f9

      SHA256

      5c0618c99eff8a7dcaf26cd5bd4f62a5868ee26e73db0708b2526ebf31024a54

      SHA512

      6570a1ee9fb0291ae6115ce10ee61c5b4a6653d6d3f9a10d707fe5823b92f9d8ede950d4fb275640c87a23f926babb6e2290b22409dfc31a163f7b95d5933a36

    • C:\Users\Admin\Music\ConvertToOut.doc.exe

      Filesize

      512KB

      MD5

      9749a7b101996e26fdec7013bfb8edcd

      SHA1

      290ed63de0865aa11a819ff3d6855f3b25d7af7f

      SHA256

      a176e3397151d20308179ed9f0105ea00cf5c9bf1aa75fe94d1fd50823c8f1fa

      SHA512

      c30ed33095ebac4967dfe354215e8a9621988bd6805d2253cbae632ab0a9ddf115de80a4b532d0a3e2e79fe4de7a6867389f3478cef152c0b2d1fd4a68626f34

    • C:\Windows\SysWOW64\currxrrxdxtvwgi.exe

      Filesize

      512KB

      MD5

      b26e5cbbd5055c21d10ec20090dac960

      SHA1

      c8bc52b18c28f057edff72f673a9fe07d159ceec

      SHA256

      74212368e5954460c091a202843560b17e2b2fda9a149a930d8ca5591293f258

      SHA512

      3ab4d55cc6871f6435934a030be408658a02789d8fdd7ae654e24d052457b92e60d9c9a40b99ee23940a3d7a2a2ec0e9cd8d237874f0ad6b06c08bf0cc1db59b

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\crmrzxmoxn.exe

      Filesize

      512KB

      MD5

      e4b5bae96e60c2bc94ef9f8ad78e341e

      SHA1

      9fa113e8389539c3c4a8855c29c7bd4145085039

      SHA256

      0e4e5c06af7a51c7b7270ba4336a44366053aa84d1a618e30c8649996f778468

      SHA512

      87c97c36376f6991bb32b3f2206b9cfccdb67130d8a50f9a9ea7d33b6ef6d37f43847ba955d9bae4364e43a4f4e33095f12e733c244fd5a50be58cf3ed58fb30

    • \Windows\SysWOW64\fynagbtp.exe

      Filesize

      512KB

      MD5

      60abe06368c65b5f7ec393cda9715ab9

      SHA1

      bb1c728ac68cc324aca5629dcb2c5cbaec95592f

      SHA256

      7890f547c15fec67efe8272be7948265808fafa06df75e64825c4e88fad36f2c

      SHA512

      87c195703d5e287d9b04876c0179bb251b613609d38d9e1601c117e284ec86775107006ed0472ca198d4364d683270d175c382ffd1fd732f68a2fdd12b178149

    • \Windows\SysWOW64\xrognncwsxngm.exe

      Filesize

      512KB

      MD5

      5f8e1e6a679ac1d40b463d5478c36510

      SHA1

      69cd6be676fb2eff6efdb55b9a5dae91b3dc2ec9

      SHA256

      3818d043b771f1144aa2161e8464c70fa4ca22a126534c6c41e12c344f9cbefe

      SHA512

      c015e8b35283b4cc0a06bd9faf3892405a9fa245a9c3cd06f8604a3da50ec3e65666569a3763a81509a6b7b53d5c5b372fc303daf371962513bee43abfacd20a

    • memory/2136-47-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2136-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2136-45-0x000000002F421000-0x000000002F422000-memory.dmp

      Filesize

      4KB

    • memory/2136-97-0x000000007174D000-0x0000000071758000-memory.dmp

      Filesize

      44KB

    • memory/2136-118-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3036-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB