Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 12:55

General

  • Target

    9979990796f726c6b774050e751de9cf.exe

  • Size

    512KB

  • MD5

    9979990796f726c6b774050e751de9cf

  • SHA1

    e966489ecbf81a37ec929d03808cb4626ab30ca3

  • SHA256

    903f8b9955f71d8ddd20873a85fef3e7e9433c32ba6acea02e4035d33c6c2caf

  • SHA512

    b0a0fc6c06fac4901eb130cbca91dc8b679b92f32a6368447710ec983f494613c2c9becb932c90500bdf1fbc4549d8502218e62680a005abdaf2c652562d9949

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj63:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 10 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9979990796f726c6b774050e751de9cf.exe
    "C:\Users\Admin\AppData\Local\Temp\9979990796f726c6b774050e751de9cf.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Windows\SysWOW64\zsotccjoet.exe
      zsotccjoet.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\lxfkuxxl.exe
        C:\Windows\system32\lxfkuxxl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4156
    • C:\Windows\SysWOW64\alhzzkgkqpenvua.exe
      alhzzkgkqpenvua.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:992
    • C:\Windows\SysWOW64\jljlymjdwqdgt.exe
      jljlymjdwqdgt.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2500
    • C:\Windows\SysWOW64\lxfkuxxl.exe
      lxfkuxxl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5108
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          22d2035f8018fb496acd374fc541b265

          SHA1

          40482801a2ca8ae320fcdae6a3b8de2e9b87f83f

          SHA256

          45338a8656bf7daf4a4260a30da52e0250dc645ff931050b0a61b17d6c7931de

          SHA512

          b264ecb341e0b36806e5a775c924b8e24c46d5c1fa6e71223909a8babe46f3a26bdc5dd4830185d9d014a5a9acc65ef0ec8324db885aa88ec72447e3f7a2a5c5

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          13473f23c7d86327132708ff4be48d3d

          SHA1

          c127612e822922d4c8d73e0672beabf0d0f14fd2

          SHA256

          65e83aa11bee4ed2d286da2c953cab306e9ec8d1b588ace7103f267c38e5d578

          SHA512

          c52781bdcd4523bbe103fbdf9ff5ada3963c54eefa675228677b512a1c2c9d2770de8754ad697dffdd1bf010c322189c68e9574d64157b93c9f39ee9425d670c

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          f69d0d02a864263feeafdc656107607d

          SHA1

          1a20b07f9a1e5959ecbb45501dca8ed0e0ee78d2

          SHA256

          ad5b5d92892d6cf4055cfdd6d97aebee0c87c6f7c7fed80aa2048e36e87b4ca2

          SHA512

          daef725dc0b9f06ebedbb59dcdcaf26b35d6eef6425dd0e67b59712a9da9952583f9e368571bf161951e2ef67262b7b2124d50d68495203ec49ea8aaaa41bff7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          c73630972e17acfd35f11acf96cc48e1

          SHA1

          2b03e5adeb77ba01de6af23a3934d64436ff0625

          SHA256

          60ebe97cf3649089e324c3ff70e43ea44470e938a54c2d0c560dc2be3428c6ef

          SHA512

          bf36c0f1307d2269be44d1668c3447f8edf0aa9ec0b3def45a8994ee05374b883a2e5d118393e00be728274c3cf5e94a49ff582cb4592f3f58725ac6cc523aa9

        • C:\Users\Admin\Documents\SelectRemove.doc.exe

          Filesize

          512KB

          MD5

          4bccee9b7840bde168e626c18c5cc3a9

          SHA1

          dcf0f50ce2233b45dd246a2557038afe31543a85

          SHA256

          f46898337816b6e8befe8bb0d69afc0f0baee7bf35f6faccb5c36e435a300457

          SHA512

          d74b5330624f23cd1987391dc8a13ad7ea4309d01d7bf3cee0672ba72fb891a0f1a0f8fff9f876e49b47d3750687d31f27dcbcac5c0f2a727356ec6891615a3f

        • C:\Windows\SysWOW64\alhzzkgkqpenvua.exe

          Filesize

          512KB

          MD5

          4108cc67824d2df04c899dcf957b5d3e

          SHA1

          b4f802b4747f0b13e05dc82afa0b9d8375a6b9a0

          SHA256

          5a57a08586eb8588cb4693450cc318b4efbe9384a257e33b47026b202720bfbd

          SHA512

          fb70052e22aaab982c522267ee6de4ab8c05667c1745007644b1dedbac173af7c6c729541c342eac1ada0ecf316902f6b0f1698af4437ca1ae82e1e8e3c27a39

        • C:\Windows\SysWOW64\jljlymjdwqdgt.exe

          Filesize

          512KB

          MD5

          e01326837eb20a41bad8ad88b6a1136c

          SHA1

          25abf6696ce85038ebf70a135be5249a943edf20

          SHA256

          96d274886bef6b74087b707a90dda44b46b6cadabeaa43f7ba28dea794f058c2

          SHA512

          6d200eebe73d0d10f3529be898de8bccf632dc680d8fbd7bb0cd521ed238b8e3969beea6ff0e1765569b5c175d5a7034d2578099198043cf2e9c1b88c0e68baa

        • C:\Windows\SysWOW64\lxfkuxxl.exe

          Filesize

          512KB

          MD5

          5162e6a9633295a9481a043bb0100fa2

          SHA1

          a2cf181f9622566d06e3fea50b1a0a66650c2178

          SHA256

          568030b147e1882531e5d79dd4add9faf8b163abd2a0a2bd87bf8e7261aa17cd

          SHA512

          93d081db6ce3fa268edfb6ab014201deebdd90289e2a67af1a18daa64c5586bcd19c7bd5dcd65d15365ccee1fed3aee64d8ef5f8ffac39a501ee9a1843cca904

        • C:\Windows\SysWOW64\zsotccjoet.exe

          Filesize

          512KB

          MD5

          4d6ab623cc7ac7b2f8999646729a99bd

          SHA1

          49a604545e82dcacf7101577c270aed2bd17a487

          SHA256

          396ac380ae79ab417fa7d7fb4c6b29f50fd4ca60c22026f98f60117b9087c20e

          SHA512

          ff6346c332856813dabe5df8a0b726d2b7b1947b5dd55a4d9e8ab973b8d67a73f56c50a60e668560ced2af3385a73834574709686e58abe5c85efe430d15243d

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          b19d21f65e9c7be987fbf24e06b32831

          SHA1

          7947ac75a2c9df18024cce848f50836001d693a3

          SHA256

          51b9ab33d1d69ba66d50a00d8b1ed8009933d5760f5662dd94d1b986501874b4

          SHA512

          94c6fb6598a449820afcc943aca1ec672399bb51e67bf1c0fdd38da3a2dcf9e1fd30e20b5ee80835346d8566508638b65e1a0c189698ce9228ee708ed4e098c8

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          f0c4d8731984b0334d342293cafcd353

          SHA1

          343ed3f6ac88936b1053c539c6508921e7dbf0c3

          SHA256

          0ac3c19caaa5b26457a7ee45f15c2632d2de96a226f4fc0ade99a30356054824

          SHA512

          67041d42083692afb0863eec0d4a67c57e8f80be018df31b1218dd3fd75aa2696fb6a850786e4202b7260fb9a6b384666336cae35992c3acbb2773abf8c7e586

        • memory/1540-38-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-40-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-44-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-48-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-49-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-50-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-51-0x00007FF9354B0000-0x00007FF9354C0000-memory.dmp

          Filesize

          64KB

        • memory/1540-52-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-53-0x00007FF9354B0000-0x00007FF9354C0000-memory.dmp

          Filesize

          64KB

        • memory/1540-43-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-42-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-41-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-150-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-45-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-39-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-37-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-35-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-36-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-120-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-121-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-122-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-144-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-145-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-146-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-148-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/1540-147-0x00007FF937510000-0x00007FF937520000-memory.dmp

          Filesize

          64KB

        • memory/1540-149-0x00007FF977490000-0x00007FF977685000-memory.dmp

          Filesize

          2.0MB

        • memory/4256-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB