Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    24-02-2024 04:29

General

  • Target

    a0f2b4a2bfb0a5bd3280e599cd144cfa.exe

  • Size

    512KB

  • MD5

    a0f2b4a2bfb0a5bd3280e599cd144cfa

  • SHA1

    30fbf03869df269db13fc6729ccc429384427b11

  • SHA256

    ddb31b24a277a00206e60773c5eeb75c647cf5567993ebca161464e4178761d7

  • SHA512

    518c1ef922fe68a8b866dfde87fa4125d603fe780a434711a3d8d97b7f7ca327e9390e1eacb057c3a46b999d39f8c84d2880c8b54b16e5c743c1c49ed273bdd7

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5c

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0f2b4a2bfb0a5bd3280e599cd144cfa.exe
    "C:\Users\Admin\AppData\Local\Temp\a0f2b4a2bfb0a5bd3280e599cd144cfa.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\SysWOW64\yfvwacsqaj.exe
      yfvwacsqaj.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\SysWOW64\sotukimp.exe
        C:\Windows\system32\sotukimp.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2792
    • C:\Windows\SysWOW64\fsaqeizjgxtdtho.exe
      fsaqeizjgxtdtho.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2544
    • C:\Windows\SysWOW64\sotukimp.exe
      sotukimp.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2656
    • C:\Windows\SysWOW64\mgxjkayunodfp.exe
      mgxjkayunodfp.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2444
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      cd3d044bf76fd11858aa50892ff79c92

      SHA1

      9fb972ce8d1a30f105a8a79f95c78462f1eafc6a

      SHA256

      329b25bacf57044427cf5fd60cced2b781dbbe3593b117a088a7969e6a2766de

      SHA512

      7077acb501552e3bd9a8b152e213fc9f1a2729371b05163433cbd3f337bb62d84e61023ee7ccb5d1609a3b9ff6c1d3adff3d65acc3d6d0a83093dcfc62f8354a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      56B

      MD5

      cefe7da42581fd4143e3294a15436007

      SHA1

      4b41a125a5525d9b1ed587364b58e95370334306

      SHA256

      b511a6446916546be58762db622d1ad6ab680b9795f078a4ebec0575f1d8abf8

      SHA512

      b38a27d75c48c0073f403fce8bbcc18cc02facdd23246c4c8f97e9611dc350d1e60894c43a10e0b0ed3f495cdf00fac088bba6fbbaffbc72c26cb85a603f90e5

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      52d360b4a060f7d99011df914416a14c

      SHA1

      51957de7f5ad877e83f3b20f41d81d3c03140deb

      SHA256

      b6a03548d1c4a7c133013c43445d09207191b51c5ae799700b99f2443c4e7151

      SHA512

      bbd16ee2b18f3a57e4132b3914ba168f802e2aaf65bbdc188aa0ba41082ecff9d25211d1b77b8eba2d80a6a122e43bb4236aa294fecc7c2273687cab1ebbb222

    • C:\Users\Admin\Documents\ConvertToInvoke.doc.exe

      Filesize

      512KB

      MD5

      b93ced3f8f18e881356bdc42404c4f86

      SHA1

      4918363f2aa3e3d916d6f539177365cf84086c87

      SHA256

      5cdeb1a7b7d47ee5b05b9eed2273086cee36f599b56d58384c6ce59db31a432e

      SHA512

      cd0acb6be1db5e9f3b7bbbf3b43fb4504cedcf847047e83c80c17814927068add1efe4ba2ce886447378ddfb21836ca0b8b0586fefba945cb9c49f31c8321065

    • C:\Windows\SysWOW64\fsaqeizjgxtdtho.exe

      Filesize

      512KB

      MD5

      f041fc6a3ba31096c49a9146a6591b24

      SHA1

      1a2151c5fc60825d38814745749d4c932e1a8559

      SHA256

      7ea9549fe037599760ca09db92ac93570779409c6b563f5253690a1b71b4031a

      SHA512

      ef6e7dcb410cbc7cba14de1ed6eeb5e1441fc4ef1707c242c3b888a506c42122606401bc6f9561776f294424a67d47f4109a09628778a5b8824fdae5e39ee683

    • C:\Windows\SysWOW64\sotukimp.exe

      Filesize

      512KB

      MD5

      d8d967da0d2f72921155e8b9bf0b8ea0

      SHA1

      e5337009b4ceefc49144ebdd77fc698d66e0de65

      SHA256

      563c2ebf15d9b920a77b50fbb27b151711b33c9b85e1116ab4639edd086e12df

      SHA512

      e84c5144a71291ceb00b01a5a25116663c1b51a449892179c166ce9db4db67cc1661affd3cb1848efc51253618cea98302ada5fb26ed635a8e59f29588846555

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\mgxjkayunodfp.exe

      Filesize

      512KB

      MD5

      8745c250d88ef4712465e590796ba186

      SHA1

      387326e88df7024cbbbb8dbf1672f17d5efdca0a

      SHA256

      266c6b0a8f8aedb3a25abd8f4f1bfdd27dfdf29ee3c803c907c17b80547e959d

      SHA512

      5f7ac742ce2a59acabb011fbe8cb6f83e21a8b288170a2422103aef223e2c7df12b577f7ae8395202775bebe855fac9411174d080f9440a3274bfacdbc940bad

    • \Windows\SysWOW64\yfvwacsqaj.exe

      Filesize

      512KB

      MD5

      201d28b4465c1fd80a829f3e996dffee

      SHA1

      27f20dd1f7f446784808bf45322fc19574f73d77

      SHA256

      ff357c3b65e982bc6d181094d3563f926764544b7a213edf04a3f0127379991d

      SHA512

      1c2a5fe9f0bd69b56789b0a7c9ddcdfae0fec865dd1486e6a1d3bfba2db16050344bd70493b70bcc9b0782161eb93e6a1c1e3f5dfbfe16604b4243040e4aa011

    • memory/2436-50-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2436-51-0x00000000714DD000-0x00000000714E8000-memory.dmp

      Filesize

      44KB

    • memory/2436-49-0x000000002F3D1000-0x000000002F3D2000-memory.dmp

      Filesize

      4KB

    • memory/2436-84-0x00000000714DD000-0x00000000714E8000-memory.dmp

      Filesize

      44KB

    • memory/2436-105-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2944-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB