Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 10:44

General

  • Target

    99384b91caeb3db7b013c5f13f292424.exe

  • Size

    512KB

  • MD5

    99384b91caeb3db7b013c5f13f292424

  • SHA1

    466c3070c871854cf8283bccdef2bc93bd7fa6e4

  • SHA256

    21f1a55e503601078df14945d4acd57d816d8abc55d7c17d10f48d06c410e53c

  • SHA512

    1702a41d75a54bcde75b45b8790ad44fa51e2e924a046898fc8d545b5add792c2f1db1e5002c07a37f683b95211b123d7bad29ce407f50d5483a4044796f816c

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6k:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5L

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99384b91caeb3db7b013c5f13f292424.exe
    "C:\Users\Admin\AppData\Local\Temp\99384b91caeb3db7b013c5f13f292424.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\qjwalckmcd.exe
      qjwalckmcd.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\tzjdxyny.exe
        C:\Windows\system32\tzjdxyny.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4740
    • C:\Windows\SysWOW64\zhgeueqoyuudvmp.exe
      zhgeueqoyuudvmp.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4140
    • C:\Windows\SysWOW64\tzjdxyny.exe
      tzjdxyny.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1776
    • C:\Windows\SysWOW64\jvbusbcudxwfq.exe
      jvbusbcudxwfq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1472
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    dd59bf58083f1057b451c0b63c64e4b3

    SHA1

    987b390b42f476aaa866c0aa9c24653a123ec4ed

    SHA256

    18e55639c63a74903cdef6eca1533a8a988a78a03a40cac391aa5f0d1b796eed

    SHA512

    030bbee8926a1c853ebfe9a32b641c508bf6d3286939ca3d629a2b9ea339bca27dece03f87d3053652872db5a54c7943f80d47bfc6395202237aeeec5cec904b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    ceaf3d2cafc024dcb23df4cbbfd96148

    SHA1

    43e79bf3f623bf329cd7713db00d7f4b7f7d71ab

    SHA256

    bc759d04049543a46706fc107953e52aa2da21d0180bb09f4949e46205ee1e86

    SHA512

    385729f308e4769681f90be3401ce85aeca0a6ba23088d08f70a62c3aea3e0fce920d690de749d4ff4359bf3804ea9d589943342f5fe3437affb78656f542310

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    82b20ba35713730ffad5d31418b11139

    SHA1

    5b45760bf816e8270e1ff64187c95868119445ea

    SHA256

    d84e13d7c63101c8e68038bd7d45a04a0f549141c5224b3ef6bdef6cd88821bc

    SHA512

    7afb3ea057a9db529e8f4fb442bb8b20099964068dc8cfca75c1734f97df0fba930bbeb4014518d7be227336e2d44e3b5c322ca6d3dd5fdd7aa9f7ae7cb1dc91

  • C:\Users\Admin\Documents\OutAssert.doc.exe

    Filesize

    512KB

    MD5

    0f04a993912358352323cf94a3bbcc7e

    SHA1

    42ed909fad64abeee66401453ccfade439996af5

    SHA256

    b225dadeb85e5940b94081b36d0337b093b7c1fd2e7c6f12b1a0a1b4bfd58c76

    SHA512

    ecbb6e6b4f59b0fad3bb848512d32a331bcbfb351e1cb9cb099c39f3bdec8722b2feede7ba9f5de40f357068fba3f9b63fe30ac06f212359f4f2f55abff65419

  • C:\Windows\SysWOW64\jvbusbcudxwfq.exe

    Filesize

    512KB

    MD5

    8d7e598aa9ddfe9b9fe05e55d5e18357

    SHA1

    b66d1b27fd8779941ed0d0bcc724dcd9e4e29f22

    SHA256

    5ed8c15a29c206ac894454b6317698f8e0c2c17a9a3b686736659759b3ec30e7

    SHA512

    26183ccea5bd898aade8fa87bd6b3d49a623e9343e8c336cf3a9b66bcfcc90f44f2bdedceeef632876af333441dab645ecac69e499b9d42973c685c5d22b2dab

  • C:\Windows\SysWOW64\qjwalckmcd.exe

    Filesize

    512KB

    MD5

    74a7988956cccbcf2669ac39d6c284f1

    SHA1

    1e5b4be87859f76ba80909351fc3f5ce2cf47afd

    SHA256

    12d5d6a91cd48c5b25218e98192194955d89e8c4062a0a7fc9383fea09866e21

    SHA512

    559847b69fb3e41ad6667b4ae1664f9dc1a4581364f7e2ef1fb97faad07676b0947becc4f86ab0e468d621437d03bea4040d76c5d409ac8c7209f430e9ef7c4b

  • C:\Windows\SysWOW64\tzjdxyny.exe

    Filesize

    512KB

    MD5

    5fc4c50e163d612158bd571693547182

    SHA1

    ba06cdbb7b13151c6dc0540d0914eb558298e8ad

    SHA256

    4590920f0e48d8b51c7614382c6b9920ce93945a82562ed3cc81a931f0dde150

    SHA512

    0cd43df3457712b91dd33b0021344b8a77bd58128d479a9d03631cf03e00874af42cfd57bbad751c5aa2b4d1a2616d1cbaa41cacff3ab969efaa1b8c102acf0e

  • C:\Windows\SysWOW64\zhgeueqoyuudvmp.exe

    Filesize

    512KB

    MD5

    b697e423d77e784a86ca865e4619b7fd

    SHA1

    f925b507aa253b7fab04beb088bac428aadd26f2

    SHA256

    bafbeb629e21c735371d5f28f83f833823e000434e6687fa59e17a1e62f855c0

    SHA512

    cb75eeefa0335edd2901700d811f0efeae54ccda763e07f7fe5ce0088426612c4193df70e1dba5088ba2a4ee544a4bb5a45242aa1166e020414c8daea1f4fe1e

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    9db885e8dd2d3c5d73c48b9470c20ccb

    SHA1

    97c09249cd53cb3ae76ac676b1e9e356cde036fe

    SHA256

    1c439917fd164af31c5e0a69a1414d0f815b77d2904f3c908dbf63ce3c20471b

    SHA512

    e441f10f9ac984fd1660c4c43d92aa2b7c7c571f69a9aece8418a72dc50cc22619800a02213044748b3c3c3d46e762393c16886a0b7ff55b8ba2c60941379fc0

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    feaf8526a86d1690f97c50bf7ca33a4a

    SHA1

    0023291ab45947cdccb93761141fe5f65350952e

    SHA256

    1f8ee1672b6062234f0298f1319e3003eada5bbe50d5e940fa7d465751883d8e

    SHA512

    ec281fb90af3b6bc561b6a38a6c39c29741681e598797c3da6e7ddd6dee114a5e4cc88e524d8b18283ffcd1e3c5496642f02f488104dc6c8baf015cbbae73cf2

  • memory/1936-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2276-55-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-42-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-47-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-48-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-49-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-50-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-51-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-53-0x00007FFC146C0000-0x00007FFC146D0000-memory.dmp

    Filesize

    64KB

  • memory/2276-54-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-45-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-56-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-52-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-57-0x00007FFC146C0000-0x00007FFC146D0000-memory.dmp

    Filesize

    64KB

  • memory/2276-41-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-44-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-46-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-43-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-40-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-38-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-110-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-111-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-112-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-39-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-37-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-148-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-147-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-146-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-150-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-149-0x00007FFC16810000-0x00007FFC16820000-memory.dmp

    Filesize

    64KB

  • memory/2276-151-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-152-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB

  • memory/2276-153-0x00007FFC56790000-0x00007FFC56985000-memory.dmp

    Filesize

    2.0MB