Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 20:00

General

  • Target

    c6bc872d7343ffeec96b71352192a5f4.exe

  • Size

    512KB

  • MD5

    c6bc872d7343ffeec96b71352192a5f4

  • SHA1

    593040758bec6126a76b78ad661dcadf3ade869f

  • SHA256

    a4c105ca89c85e54a7b0dfa1b30a7458801fe542a083a1956494eefcf107b9c2

  • SHA512

    af68c0b8f537daefe1500a6f9c15c605461e1912bb447d226251fd5612dcb197b4367a859e814243bb184de36f1a86b327e38142a1df31cfac515690cb8d8293

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5E

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 8 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6bc872d7343ffeec96b71352192a5f4.exe
    "C:\Users\Admin\AppData\Local\Temp\c6bc872d7343ffeec96b71352192a5f4.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\bfrodadhmp.exe
      bfrodadhmp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:516
      • C:\Windows\SysWOW64\jdzxaend.exe
        C:\Windows\system32\jdzxaend.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3460
    • C:\Windows\SysWOW64\hfegneztfltexdf.exe
      hfegneztfltexdf.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5092
    • C:\Windows\SysWOW64\jdzxaend.exe
      jdzxaend.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3884
    • C:\Windows\SysWOW64\kpcbngrukpeso.exe
      kpcbngrukpeso.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2636
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    b396f7dd35d9c45a4e3951401e9ea9f5

    SHA1

    9411746a198d2dcbf9674a46a9c325a4be829461

    SHA256

    c675828217649a0364817a1fc6933d873b20861c2ec8a6e2398d9b5e801274f8

    SHA512

    46db3905631a8eeb262ec1af5465db5f2b5a3932a23748c126387ec150827a7c8d5eeeadb057700a39211ecb013bd5e645e3628bd9f007e9cefc117ceae67c75

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    602dad6ee0e60cde6698692534ef100b

    SHA1

    c3e20be4cf62746964ff865964f4f354d412bfac

    SHA256

    596069f7c5d4c9cea8266af60fcc730fbaec42eb5dd0c6f4203e463b742fb598

    SHA512

    bc1fdcc479d9d46977847557985ca1744f1d4f135da27d82dd2f131419c16fbc70968eb27458a1769e59a9a166847be39aa81b82936e39e753d578ee13df8669

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    566ded98fd6dffcde521a4efa1932fde

    SHA1

    d19a741f44127974096ee37e43d1f2fe8de7541e

    SHA256

    2a2245de67e27cfb77d06e0d0f4ef14d6f618aa96f7afb180de2ef91bc12422f

    SHA512

    f5272717310df5bd24b9cd3197331ad77b4b07289f6bd056329e0c3ddad753d856330d9ff3148a70d7038daffbe28e25f27d37ac8e09f498c4718ed03f75db7d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    c1980ee080e2ecf51ef26f31cd29f65d

    SHA1

    9490f81c6a45852adbd69c2f8ee9a7634eeaed96

    SHA256

    7c815cba74c1022a22d3c594c0fc7c5ac44b204b7392fc8ef844f75266f89f80

    SHA512

    3227ffbda4232802560b543d9f24df3cb353c29f1b22d5061a9f3854e533375635104aae37cdf52a5be8310f6391b39662ce8bc6533f85007eff0baf6ba01465

  • C:\Windows\SysWOW64\bfrodadhmp.exe

    Filesize

    512KB

    MD5

    48fc862545c8598c50cca05b11b00e50

    SHA1

    7256ee8f58e44c7158188fc68ed0c2eaa5d23509

    SHA256

    d4462a0833537cfc8baa3f1597c011be4a01e51eb91537d75e9a53bbd1a5ce4c

    SHA512

    dd9edff26b577e1ed54227cd728e044f4739f755634085b449c1fed8e2b4da1aa402a10e799e97aaa9190adda4df6e3b2c5711534266b7308488cf390ca20649

  • C:\Windows\SysWOW64\hfegneztfltexdf.exe

    Filesize

    512KB

    MD5

    ca24dcf73c9b5e01b1f42d6c5853b544

    SHA1

    c46017ec3da6089f7011e01c9dc9b0e74a9b491f

    SHA256

    9e3d273b24bb609d8b44a363bb9cb44e356ff91cc121e862a9e42b9df5904ebe

    SHA512

    68736910336d0c1ced78f8a3b9dc6dc8d74575c86b7f39e30c1fb80583dd834cf40fa7e97913a219352053e0b19fd71c44e788b874705edef47d65029d54a142

  • C:\Windows\SysWOW64\jdzxaend.exe

    Filesize

    512KB

    MD5

    6091c4f25ec254010c451c79d6527a30

    SHA1

    6253934f9fd665c641ce7451e24dabf628ab4478

    SHA256

    e27a793f31903e2fc8f75ee8ae7b3c4e8b937097f8045804fa93fe90c5170524

    SHA512

    a2c1fb34e23b709abfd9516c6c9b91325e0689c880ded55180253e8fbf33b81058041e1154854dff58f62dc1a1afcb513d2c59c617e70ef8d3f89aebd9212f5c

  • C:\Windows\SysWOW64\kpcbngrukpeso.exe

    Filesize

    512KB

    MD5

    c2a5b05a8a467fe2afd672ba94e1d85a

    SHA1

    6f5d8f09bf77918db1d680a86406c6a1db52dfdb

    SHA256

    f949f930b760a762ef51a8481b2f60a8f52f4e3dc897e2c3168547b58e2ee306

    SHA512

    9d5240b76366788b1e31dda8a751543d2d57c0ef295c827ab0161420509f15d4cc708457b1cc8b15dfd23cfb8add72e8519da4a2fcbab2b4dc7c12f517db56d9

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    1058c477408fb5074faf404795263d0b

    SHA1

    16b7509dd2cfdb8d425c6fd19013b8f76fb7c316

    SHA256

    f379371e55a4acc9b4de45a930d70145cced07ceb2396359637f8ecbcb96bae9

    SHA512

    af1e11b7aeda9079feb3e5ccc18b8a59186584c163c2d49d429c6f9fade672ce655148ee3e73fe5fe72abe3bea131c53642eac079695900a53d2fcb6b2be6e61

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    020faac39d38f066fbd3051edaff2a17

    SHA1

    4a9ea89ae66138980776fdc5deae5cd0d896a8f8

    SHA256

    34b3fbfc2c0a7fc3f54d0aaadeb9dc27b0b00d9b0e3bffcb7f721098a8c0ae93

    SHA512

    8d411d8fecb18b948ece3dfd65bb93005247db66c8f8f8b59ca169c76a84a6ec3f387df0cfb22dab0850484297f7b07fa316d31b5a76279373af60f0f15f2ca7

  • memory/1476-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1644-50-0x00007FFD1F330000-0x00007FFD1F340000-memory.dmp

    Filesize

    64KB

  • memory/1644-40-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-46-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-47-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-48-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-49-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-43-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-51-0x00007FFD1F330000-0x00007FFD1F340000-memory.dmp

    Filesize

    64KB

  • memory/1644-44-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-42-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-41-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-45-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-38-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-95-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-39-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-99-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-37-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-105-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-127-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-128-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-129-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-130-0x00007FFD21B50000-0x00007FFD21B60000-memory.dmp

    Filesize

    64KB

  • memory/1644-132-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1644-131-0x00007FFD61AD0000-0x00007FFD61CC5000-memory.dmp

    Filesize

    2.0MB