Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 18:27

General

  • Target

    c6931c7e8b35b15b7f4745f96494051e.exe

  • Size

    512KB

  • MD5

    c6931c7e8b35b15b7f4745f96494051e

  • SHA1

    749e428d898dc4c43728ac1a1d9c7573e028e4ed

  • SHA256

    aacbdfd9dc2795c02ae6f49f1c140886a91b45af90fabe26c80a65622f103a89

  • SHA512

    d2d7c50da7840f19f9f907ac30ea15fcb633b3ad94359e72fdcaa35f7a69071d3447f889a18a64e47efc379374037601ceedce0cdb62ea8c88f2d26fea47d6aa

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6931c7e8b35b15b7f4745f96494051e.exe
    "C:\Users\Admin\AppData\Local\Temp\c6931c7e8b35b15b7f4745f96494051e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\SysWOW64\jjmcoyxdcc.exe
      jjmcoyxdcc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\vivbbjnl.exe
        C:\Windows\system32\vivbbjnl.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4384
    • C:\Windows\SysWOW64\xgpczthlblykbsi.exe
      xgpczthlblykbsi.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4284
    • C:\Windows\SysWOW64\vivbbjnl.exe
      vivbbjnl.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2692
    • C:\Windows\SysWOW64\qcjzwtahiauhd.exe
      qcjzwtahiauhd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4336
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1564
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=940 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4860

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

            Filesize

            512KB

            MD5

            2202ef81704fe9b71eed97e9192d6201

            SHA1

            2ce921e12002ed6974d2b6ea1474796ef5bcf8e5

            SHA256

            329162786626589eae3ede33a41ce4b96bbdcebc7c33976203a8cf750ae11c56

            SHA512

            e91bac3e85c091ed62800cfbc2bb793d850c43e4b9d390d7289416c63b8969c049930637f281ace6d1ab9f3b2c167a57fd7060e73ec59f498a7327bac3033ca0

          • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

            Filesize

            512KB

            MD5

            d5a96e36692de5e286a073cc88019798

            SHA1

            1f431e8e97b7d370899e676f42dda6c496c88e6d

            SHA256

            be93bb87baaaf6a9072a8cacc681246ccdd67bee02ee3ad17b2a387a9f51f76e

            SHA512

            b0b7a7fdeadbafd767ec2e9b40fc37bfa0efb996134d293a90620146f4e33a588d8fb83c537c60432ea9067ca7e317917bfd1122e6dc92b7a5d6b061ad6837b3

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

            Filesize

            239B

            MD5

            12b138a5a40ffb88d1850866bf2959cd

            SHA1

            57001ba2de61329118440de3e9f8a81074cb28a2

            SHA256

            9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

            SHA512

            9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            99cda853b8c88978fe5d3b457cf52d1f

            SHA1

            0f0a64d61129047b3606f9c436b12f1cdeebabe0

            SHA256

            800dffd6a3c22d394e82a1e4d4b914617d8ccddc8289ed09f127326393b04023

            SHA512

            9802174de5e4f33603ed21f2f3228ee304fc2362d0a7053356bcec967a4cb0b17ec4cba36cc690ea655ea3ee71169b378fedd29843134ce4641f5a5babc8bc57

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

            Filesize

            3KB

            MD5

            461bbb97d3ab841905b5410995e6566b

            SHA1

            ba6d86fcc88b5805e71387ec0f0025a172b36a63

            SHA256

            2ba693efb9be6b3133ec9d6207ebcf61938884ac0f15c87cfe7f85a6b58168f4

            SHA512

            62cdd2b9e1e976bf8901554eb64be954c6f4a67d7e789c94f67ce6ab32a2e91ebb3aa65859e7942b2bd8c91c4e6a3064db78d5789b98b1f6d6b7b6fd2f64eb30

          • C:\Windows\SysWOW64\jjmcoyxdcc.exe

            Filesize

            512KB

            MD5

            f83339315ab85faad6404a9ffcae9c28

            SHA1

            3d1872c0a7ecdbcf3d5fffc4c93913cf3f0701f5

            SHA256

            aa2bdafe85de758a5e8a53510d0cd641acf4fa677fea0ac0a68e55868fbb17f4

            SHA512

            99fbd577e9b05847ff66e747dff4d21ae7d187df8201c08785feb3e3912694537d89ccf387a241a8690277026072d00b305318be54708c2de9b484af4513aded

          • C:\Windows\SysWOW64\qcjzwtahiauhd.exe

            Filesize

            512KB

            MD5

            93fe6d9a7a542b8d584d6757b2591bd4

            SHA1

            d8af6ec2ee5a178992ca946f18aab1aa391a8c10

            SHA256

            e447a9c031f44a7b6f6fd5b6d4c33d7cc145688a686adf530911c010dd5c6701

            SHA512

            2fcd71990ec37e6e48fcde4fafca467a3f200da4dc44535b91fce54c982c3a3a6819374386dc497aa7fe6a369a88315125ecb6ca634a59425a845748db8ccf86

          • C:\Windows\SysWOW64\vivbbjnl.exe

            Filesize

            512KB

            MD5

            3dad1c0a09f97eff0e5faa3a5e28fd47

            SHA1

            112d87a5007c9804cd87a7a9cf81c7f60dd7793a

            SHA256

            1021dbde39f7ddaed266102e59bf7f386f371a576218980c1123378708e511fa

            SHA512

            497da0cd4d88b3fdf6464de18c4ad736e489e180d84e4023d4edf7a21ef357db87981bc04b367c3137151cc18efdbe2f399ee95e2e17c2f12f5afb5b0e58657b

          • C:\Windows\SysWOW64\xgpczthlblykbsi.exe

            Filesize

            512KB

            MD5

            b8e9c5ead7197aca6a826d063fa65f39

            SHA1

            fae3b33b4714b5dce7fb14f486c5df19f95e7ff3

            SHA256

            7bf38f6ae6dbdbb5206c99f03f1f3b0d68079f5ef0c78bd3913964b75de87610

            SHA512

            d0a116cdd44188b2e59af55ad7869b9ba98433bf31d30e52b1876fd2b87b7fe00347b9e6b65bf6fc1f6edf1d621343ba10601dd680b1aa2a75ebe2c92eaa518c

          • C:\Windows\mydoc.rtf

            Filesize

            223B

            MD5

            06604e5941c126e2e7be02c5cd9f62ec

            SHA1

            4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

            SHA256

            85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

            SHA512

            803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

          • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

            Filesize

            512KB

            MD5

            806748ba524a7799b7a25eb26683e5fb

            SHA1

            02ce5c56da369a89467cf127d92f7d92fcf2ab84

            SHA256

            f7fe5ef12bd162c782fc4e2ae60db7baec9c89005b929dc03ddc179e1b373c1b

            SHA512

            b944f27f876cdecf914295eed322915e58e87103aa3cedf53af68271670ecff478c6276ea8822ee81aaefb711e5fca35ff7fcb6e82f8ea47bb057b667093a936

          • memory/432-0-0x0000000000400000-0x0000000000496000-memory.dmp

            Filesize

            600KB

          • memory/1564-52-0x00007FFC2B8E0000-0x00007FFC2B8F0000-memory.dmp

            Filesize

            64KB

          • memory/1564-80-0x0000018838690000-0x00000188386D2000-memory.dmp

            Filesize

            264KB

          • memory/1564-46-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-47-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-48-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-49-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-50-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-51-0x00007FFC2B8E0000-0x00007FFC2B8F0000-memory.dmp

            Filesize

            64KB

          • memory/1564-44-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-39-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-40-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-41-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-43-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-45-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-81-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-82-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-42-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-38-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-96-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-125-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-126-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-127-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-128-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB

          • memory/1564-129-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-130-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-131-0x0000018838690000-0x00000188386D2000-memory.dmp

            Filesize

            264KB

          • memory/1564-132-0x00007FFC6DD70000-0x00007FFC6DF65000-memory.dmp

            Filesize

            2.0MB

          • memory/1564-37-0x00007FFC2DDF0000-0x00007FFC2DE00000-memory.dmp

            Filesize

            64KB