Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 01:35

General

  • Target

    bd518227345c27dc2203145dd52d81d3.exe

  • Size

    512KB

  • MD5

    bd518227345c27dc2203145dd52d81d3

  • SHA1

    68cf99f91c7e06f4460f222a1a77727deb902949

  • SHA256

    385eb0e913f8cb912525b47bb3b3904b34983a982c404968e2e099cb8b136001

  • SHA512

    2d0688686cfb5f62e76442cbd0ff62e82579d6bde26db701bb19fe5825533f31692be2a66124988a17d052163e90de80666531dd0faefedb470ca0cf5561d484

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5a

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 18 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd518227345c27dc2203145dd52d81d3.exe
    "C:\Users\Admin\AppData\Local\Temp\bd518227345c27dc2203145dd52d81d3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\igsalitsfi.exe
      igsalitsfi.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\scrnchtf.exe
        C:\Windows\system32\scrnchtf.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2544
    • C:\Windows\SysWOW64\apcmexnxwcdhrir.exe
      apcmexnxwcdhrir.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2432
    • C:\Windows\SysWOW64\scrnchtf.exe
      scrnchtf.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2444
    • C:\Windows\SysWOW64\zuikqaaapakfn.exe
      zuikqaaapakfn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2848
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      8bf4b7d799c11461b942f43bec067ab1

      SHA1

      30ba95cae8a6331f4f4d6f86518da14953749c24

      SHA256

      df755c313a7e075e731c06bc7c3f051144071f527928e991325094d24979e2c6

      SHA512

      06ab80ab128c06093b5eabf9e025a1030405f63f88c0defcae918a48b4fafe5e26f49f4e322e18a03ed3a69eaa09471508841dbc751798dc9cb8251764f2075b

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      6deecde9644d59f414eabb1597a23e2f

      SHA1

      37a2af18b711cbb46c2b4fd1ffdc09d8dda98974

      SHA256

      31cdeeb313da40403e7d83ebb4cf3b625c740908a937685b15b572c21b1c7cc3

      SHA512

      7aefe5204015c7d1dc874c83220071dce93955825d6ffa075f1b6a8cfb2d3001a04226eefe8ca1555220b9b14172a35afc1baed58f58fff4c49815de88cc2ae9

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      689a0bb1de4eb5458da5dfa53f8ea9d5

      SHA1

      fa6b7658f81696b8ae5e52f50fde7dcc25d7d87c

      SHA256

      2bb3dd637b0726ea893fde4b9cf79d82e1e1dc9253c2ae38dd941e74c14bdaf0

      SHA512

      3100f9c48cb348e100f16236daaa882b006983cdc4a981cac56b446e8b90de56db58def9c694bcfed23ac9fee36c67f5091370703900d70d006cdcfbf57104d9

    • C:\Users\Admin\Downloads\ProtectJoin.doc.exe

      Filesize

      512KB

      MD5

      9154f99a8fd6133cbf865bdba7d49f6a

      SHA1

      97f417488f814566f6568ddb09e8039e31c96b7a

      SHA256

      523c512c60f29dd747b5df6c27aff6ece16de8a05203fdd455907ded13b7bfbb

      SHA512

      c6e471305ae6c96a196a0366d01f12476867a2e0f0c5c871a463dab75ee88afd9eddde6d2c122ee0491a71ed852a355ecae7dc9d5297b298bf0f5a56c9406582

    • C:\Windows\SysWOW64\apcmexnxwcdhrir.exe

      Filesize

      213KB

      MD5

      ea7acc46617ae6860e8766f57b7ab781

      SHA1

      2297f92f835aaa0b5d9674ca06000c97b2d827db

      SHA256

      2e57a25bfeac57c415ba88c539357cef9c5a4e4afba061860405ab6786dc39a6

      SHA512

      e23a169b18f0aacc3a0b1839d7f754305f6d59b61e8228bc757b1af6ef46ec0caf6f831d5081affaa9318d959dc94b8d336b2a089be438fea10fe20b12b2b589

    • C:\Windows\SysWOW64\apcmexnxwcdhrir.exe

      Filesize

      188KB

      MD5

      66e9601f42ef3ae5e7da29dfdbfee5f3

      SHA1

      b18b8a699697ec4e8a75d349faea7be2aef2c12f

      SHA256

      586f9a1a1498ce3745bf16883a12babd138153e984cab731fce3a90bf0a7592c

      SHA512

      97b66d1fac56efa6ac98fdff85a7a19041aa207a00f840b0e037823025306f05888f29d5f4153273b1f1c84f5cd01b780781a8bccf93999f74b00ae4d07d6592

    • C:\Windows\SysWOW64\apcmexnxwcdhrir.exe

      Filesize

      512KB

      MD5

      4591de5cddeb741f426c539d1a6c7ff7

      SHA1

      95599a87e5c434be70de3538936e3ad5ee8d64f8

      SHA256

      d78102f7b8d603ca34c1b3df0fed626c47fd2239ea07ce21e3215633fb37f2d2

      SHA512

      eab091ae184954a6039a3648c74af6b88001c391a0d9d5cb72795aeaae21663db0975ff34ae666946f5496f3d20bc322f273a809cafb96eefe8f76c6899fcbf2

    • C:\Windows\SysWOW64\igsalitsfi.exe

      Filesize

      254KB

      MD5

      834697778719e5029e498c1a22e292a9

      SHA1

      d84c0935dd7747c4e5a22efcea2e4e318079d5ff

      SHA256

      0b188390257223962ad6591035f99b301cc6fdeb7d688f090bd9867ab3da7deb

      SHA512

      8d498082cdde9e3de8314d6c573ac2d71d3e95f2327cd047805789a2e81e40c2703e7603a9cb8c32ea5e72857bbf2b9107720209c622e1498944b229a79c7c1a

    • C:\Windows\SysWOW64\igsalitsfi.exe

      Filesize

      220KB

      MD5

      98a2e0de0f09663afeb4933f2788643c

      SHA1

      c15f49eab6e2db4cb3ca884fddb852e4df296eef

      SHA256

      cd7a0c38c7b3334841dcb17d86b3f84158e66914f4eceab3256795bcaf9cc7ee

      SHA512

      159d479c3e552888abff4f0459994bb81ecdf408be1a285fa89a256cfa451161de086cb91d9683ae3ed5de63203daf9a5a46ccfcc83269f052c4508048cd2592

    • C:\Windows\SysWOW64\scrnchtf.exe

      Filesize

      126KB

      MD5

      fad13cd6f4f306277db6fded387cf6fd

      SHA1

      5a74e5d1b9ed656b1593e76a261163dc93818f07

      SHA256

      845d1ab2cd57a802bde25e584cd145adb225ac5c23ccd9090712e45bd95bcd69

      SHA512

      4aa4683547e952f72cb70af9bcc169113c9463d7392263540e9be939a88cfc5799199dbca33fab7c73e4300214dd993c7f99ea620e8174bbdda074dada671ad8

    • C:\Windows\SysWOW64\scrnchtf.exe

      Filesize

      197KB

      MD5

      42988ff57bbf1f6e2ffc5d4db1347540

      SHA1

      5940e5f981552290ae83225985ddc38489462b5d

      SHA256

      5d7510cec8077f80d6f2b886666710ab51adcd74bdeff919e7173eb41123ee0c

      SHA512

      be4e1f97c06939d04afeacadceff43ada8ccd30569676a0f5ef0b22808ad152a498e58fec5fe026c473943bfb7540b615c57d625f36392d538555d815e925d0f

    • C:\Windows\SysWOW64\scrnchtf.exe

      Filesize

      512KB

      MD5

      2a9da882ba5565115bb0e9666b3842a7

      SHA1

      c1c1722869ebcf779b7b8814ec9f4f76b200fab1

      SHA256

      d2f7ab5aab538b4a049754e31f7077b47f168f6558951fcb03694850256017dd

      SHA512

      a6f15bb0a6dfae38225037c114e39130214a677d6afde494f464a523a25ec135d4d1a7fe1f6d27261d044546de18a8b3a92a82390a0d943a4823c8a7ed3b6c1b

    • C:\Windows\SysWOW64\zuikqaaapakfn.exe

      Filesize

      127KB

      MD5

      1bf2f26a5049c23fb81b128e3dc8b920

      SHA1

      53d5ca2008af66851d03f525f539d21d21bb9f10

      SHA256

      6133e54265db14d8241dd21b0f0e583059014742d0af60ab2e99938f8ba0b1ef

      SHA512

      26d006b2b2d37e83b1172e0c6da31d9dcad2d5b02ced4105d87f323a7627d7fe7ab2f5a224feb5770b18307e9c9698659e8b7ff7cd6b1892ddd4116dd94d78e8

    • C:\Windows\SysWOW64\zuikqaaapakfn.exe

      Filesize

      117KB

      MD5

      838c0d4718440b5534b3e71d6225c2e2

      SHA1

      f962e9a057da9267f5134f2d50964f1e36849f91

      SHA256

      f033b70e012b28c207a628d03a26d278582f52fa4a7dfbbe73989535fe453b79

      SHA512

      cabf4ef7fc261b321aee10d583cb6eb8deb2d435ed14710c3467b03732f6aaaaadead76a96e105dcc465b01d2dc1599f2c63c100ea7931b531ac63f0c7f5d2c9

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\apcmexnxwcdhrir.exe

      Filesize

      269KB

      MD5

      659250b988ffa321baaf354541d16dda

      SHA1

      87f7d2ff437af7f2e3413597ffaa493c4ca5a420

      SHA256

      18e1ba919155261334e703d42b5bbce1c108842bf800903a49d246728b93064a

      SHA512

      6e975e65c21a2280e8c8c3f7f845b4b66fbf7bdf5b72bb2243759af97d5f92680f8d9fcf647cbd3f3479407d909a7d59ad4a52ce39c337efd1edf82ae50d3fd2

    • \Windows\SysWOW64\igsalitsfi.exe

      Filesize

      391KB

      MD5

      cdf164b47e0add6166e98426ea6ca91e

      SHA1

      b510c17bfdb82586af7c56fa1dc1798465b616fe

      SHA256

      3ec33e89fc7c9032e0f93a83de7a4ffad3b0841590b946f5527f25b0923d3ae3

      SHA512

      6e9fcdfdd40d88b62b41ff295b7332b24d276358431d69df4a64979b4890fc4ef76020668cd06f7883a8b414ca23936adb10c2ba8147492246345f29fbd5be88

    • \Windows\SysWOW64\scrnchtf.exe

      Filesize

      217KB

      MD5

      62dce85388bfa6d202b93b5a15bd1c4b

      SHA1

      3a868014a43e985d5c0ddcdfeda7f7cfa38bc1da

      SHA256

      a560f2c1ee512ddec84f2fd175a7105987d6a9a66a7b3269c0cd5f3b1697353c

      SHA512

      ca787c9df5ae7fb66ea430534677f9dc6a2cd19ef636ec738e0d7830eac15091d615dbcc13aaa207b9d171cff313079101e7d48224527e75c57035d6868dce2d

    • \Windows\SysWOW64\zuikqaaapakfn.exe

      Filesize

      176KB

      MD5

      4805565f00240b653f627a416e507e71

      SHA1

      48350b02b6d7eaa6de25bdf54fd0ff64a090954c

      SHA256

      651c13617ec70bee0c4cb207d8180a23b373a40f0f77b4cfd55734d9ab042d7d

      SHA512

      6d2e7afb055a3e63d11c93063752e76b98d5b9e11e29b3bf00471cbb1381bf6cb10d36c3a4b3b652aefbe9ab18f505913d713310cfc2116a4d7b7392e1dec8b6

    • memory/2004-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2512-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2512-47-0x000000007138D000-0x0000000071398000-memory.dmp

      Filesize

      44KB

    • memory/2512-45-0x000000002FC41000-0x000000002FC42000-memory.dmp

      Filesize

      4KB

    • memory/2512-84-0x000000007138D000-0x0000000071398000-memory.dmp

      Filesize

      44KB

    • memory/2512-105-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB