Analysis

  • max time kernel
    149s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 19:42

General

  • Target

    aa004dee0751926cb4ba5a24246781b2.exe

  • Size

    512KB

  • MD5

    aa004dee0751926cb4ba5a24246781b2

  • SHA1

    ac48b443f46dd2af7722b772993ffd0207ab549c

  • SHA256

    ceb3b395283674b93d8ee33cca56b78d1b5cd2bc018ec78be506b193a340ac94

  • SHA512

    7f7f7f2fbf1f0d9bab8be50ba6449187495f11fcb1e7348946c6737be60e1e9c0dbab96f62eeba6bf8d6214d56181dbfdc934267241ccb2f57fad08388c41378

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6M:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5p

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa004dee0751926cb4ba5a24246781b2.exe
    "C:\Users\Admin\AppData\Local\Temp\aa004dee0751926cb4ba5a24246781b2.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\emrowkzpyb.exe
      emrowkzpyb.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\SysWOW64\wwcofryf.exe
        C:\Windows\system32\wwcofryf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2188
    • C:\Windows\SysWOW64\wwcofryf.exe
      wwcofryf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4052
    • C:\Windows\SysWOW64\ycbtsfttyxfroir.exe
      ycbtsfttyxfroir.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4556
    • C:\Windows\SysWOW64\nublwxcdmajkg.exe
      nublwxcdmajkg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2856
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    f6bafb76377641e0293eb7d9581ba7ff

    SHA1

    ee483109614ce4126c6250f8f7b5ef7bb37841ff

    SHA256

    231a91ada93e316d0bcff9be4668fbb03e98ac48cd29ff3a7ffced320c50c49c

    SHA512

    a8710b039e1ad1359d124e2680a7b022031dae4d43ec0b71a9755ee77612d2ab6e2db5e6299a2d493d8adfcbd5cf18f930b1ca8361e66d7154d22914628de424

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    74e618437f3617d942575c2d807dc491

    SHA1

    992fc4f72e341461211da5e2c04fdcf2a615476e

    SHA256

    5e807eae2b1d8b6e1ac76f45677b4fc6d56715f9a639a7e0c5e49a4d79de7d27

    SHA512

    b1f464d6fea0e29b0d32c7206aefb59284418c9d7300a0136eee2d7964ede512adc47e14d6c5df453234c4ea6e72268d797d153657f10ab147619bdf6f11ce17

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    2fae0fe44fb67ed515b21a2b6fba40e3

    SHA1

    d39c4cb134c596851c157406149129a69844613b

    SHA256

    bd528b67c4e7b5924426cb6edc6bd85896db3a43e596bc76d32632d33eccc2b1

    SHA512

    9902e514810847d11b83ceb64209c7a363f3b482f5444474673988fa0729295d8612ae6aa0d81a09d9adeb958f7e0251b414ef808f82f279df504bc04a347087

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    3ce0da6686ba034d5741b835f65593e9

    SHA1

    49a176c40e3c7c1fcd5464a22b9ccdf4b32345cc

    SHA256

    719a65f770da7639bfe94ea7dc549ca3deb80b8c5d7a5046be3e8d858a11c802

    SHA512

    93aba6b699da4ae9e0a08c047661dcca2f08fa5ec7752eff61633a0269dbeb13fc23b64b0a959ab442def5364056aba021e603d288775ccbdd059d7c979ffd49

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    8199f0138d19de7ffb4d2a2d9a0496a5

    SHA1

    7ada8395460399a92a5fe71c2ac0fa3c5a1f9ad5

    SHA256

    60389d668e97c86dedadf4e5ee89017874c0a48f58dd50249703529ac8ea3870

    SHA512

    861011d8fafd2583cf38f68e7387c04a98f1a14cd8e76b4e9d51009767c832e180cfaca36277acc978a2c06a3602b036e1fda3b4686770d9b6aa31ce271cdb11

  • C:\Windows\SysWOW64\emrowkzpyb.exe

    Filesize

    512KB

    MD5

    c5d95ddae27522f8ea3b779f819e77ad

    SHA1

    d821876ca6028df48a6a4db7ada353f2131d7bf5

    SHA256

    831b459c97d669623ed5494bcd57c216560f5a42e6897e63e6ae47deab664d4d

    SHA512

    39ea3a4aba4deaba2cb852fc3d6da8d9fc2a7a86bb4362a494c386a04615d1b92c0ea9b87993f26b14fb5cdf0f38d1b888682380668410331c8227fa247e64e0

  • C:\Windows\SysWOW64\nublwxcdmajkg.exe

    Filesize

    512KB

    MD5

    f1e42f3bea0b8b3c74cb8d6254a4cfd9

    SHA1

    a2ae439e95194c5fb1edecd581e2f636aaa2f0f0

    SHA256

    ce3de855e5aa097b824637ccb380011aca619b909d8f61cdac620c8f2c1dcf19

    SHA512

    af9a0461ae0a992810a2d5a402ee565e9b3d516b6c3bc66d570a526c2bb795510748439826fd48264e16dce44e9a3631f0403d6ec65fea6684f4272577f49cfe

  • C:\Windows\SysWOW64\wwcofryf.exe

    Filesize

    512KB

    MD5

    7e4db07479b4ed3f3d255e87dca0e513

    SHA1

    21e83bc6e097b40a6681d4884c525734c8407439

    SHA256

    50eb1b64998d1a8b41c89b4f368512368a9385751af1caa01a487eb8ba6cca0a

    SHA512

    3f442de7075568f2710c6c2c7c511925b54c95ebee5ceae85674b58778fedfcca5048b71483736a6ccc9936b6b81c7eaedd4bc0a33566e99583b7324af9426cb

  • C:\Windows\SysWOW64\ycbtsfttyxfroir.exe

    Filesize

    512KB

    MD5

    591c81ffbd8ea20197f851e224b37ee0

    SHA1

    58506dcb96650afaf137bbd1346a01ad693b6a80

    SHA256

    77e4920c700f4741477975737692b92d7c455cfa49b59d82beccf78d68a8df90

    SHA512

    ddf32c84d6c724785fb10ceedc46ffc8d54b3c935774ba67049994e5f50af40aec9468702f032ddb097636e61a12c466d1077f844ee449fd6d681524f5a764de

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    702d3bfe201d1ee22acc1bea28c73d57

    SHA1

    3d513a92810cbf358d624e484d9e1f2a2fbb89a2

    SHA256

    14f047d9c926978e4365e81906adab822e4cf467a1ffdb433b14f7c835d42411

    SHA512

    4e738c47d97d16c66269c8e78c89146f6e15339ae16ea7d5254b0b9c65665534fab755ca93f58e82f2d5f7ddaeca62ca1d77a279d0cfa3d01c37dc9500a32182

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    dad8399e6f156be180e203c3116b68c2

    SHA1

    3bb3a18e2804cfc0eac43c8620a05c1f8f89c9c5

    SHA256

    e041db545dfa6ed0fea3cd01bf8291353bcc701df0073f36584f2a02d4461324

    SHA512

    ddb4d56e8ea4ac3da8e31116aabd915d4bbc6e845bdda600fc6061c886c20dad5a0efaffc25f4a629f985f60235092d3cae3facdb4f042069c607a9e7a032821

  • memory/1856-41-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-126-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-46-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-47-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-48-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-49-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-50-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-51-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-52-0x00007FF9789C0000-0x00007FF9789D0000-memory.dmp

    Filesize

    64KB

  • memory/1856-53-0x00007FF9789C0000-0x00007FF9789D0000-memory.dmp

    Filesize

    64KB

  • memory/1856-44-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-42-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-43-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-129-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-40-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-39-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-38-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-37-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-106-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-45-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-127-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-128-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-130-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

    Filesize

    64KB

  • memory/1856-131-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-132-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1856-133-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2320-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB