Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2024, 16:36

General

  • Target

    c919a4c0d3a168ef0b01943276876cdd.exe

  • Size

    512KB

  • MD5

    c919a4c0d3a168ef0b01943276876cdd

  • SHA1

    60b23055fbf6a1290e7b551617f29942cf347b33

  • SHA256

    cadf688bb8d1c057677db0ac62a335e30257c0eb87d756cc729dc3645fa0a740

  • SHA512

    b84cc2bda4f84ef7f199dcab206720321ff4c69bea253ca3b12f06059846e51c48dc5030e52ddae9cc1267982a12eeb838487155d6682102e50910971ac2af52

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6o:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm57

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c919a4c0d3a168ef0b01943276876cdd.exe
    "C:\Users\Admin\AppData\Local\Temp\c919a4c0d3a168ef0b01943276876cdd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\rtednxwjax.exe
      rtednxwjax.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Windows\SysWOW64\fhvmpobo.exe
        C:\Windows\system32\fhvmpobo.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4980
    • C:\Windows\SysWOW64\jlabmunmqywsjpg.exe
      jlabmunmqywsjpg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4508
    • C:\Windows\SysWOW64\fhvmpobo.exe
      fhvmpobo.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4032
    • C:\Windows\SysWOW64\iozuhxeildgcd.exe
      iozuhxeildgcd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4912
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3908

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

          Filesize

          512KB

          MD5

          9dc5ba30fa96bcde979019636e85dd40

          SHA1

          75f7c6826e71668c6a407bef6584ce8ba0faf604

          SHA256

          1f6a4926b0b3ba182608d7ce7446780738615c12c32f3c1d96d4371f852c331b

          SHA512

          e95bfd955db54bbaaa21ecf0434dc8473d69f7020ea737d5ba58f0dcb2151ea8078996dd6cd6c82f3d105c7b8e85d7947c7740ac6ebf8b5c2e56423d9935029e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

          Filesize

          239B

          MD5

          12b138a5a40ffb88d1850866bf2959cd

          SHA1

          57001ba2de61329118440de3e9f8a81074cb28a2

          SHA256

          9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

          SHA512

          9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          97ca4df033a29f9b21a65bd9fd2e2af7

          SHA1

          ae0fd23fabf009d3e54f9cd3f78f25b0cbf15163

          SHA256

          c7828bbc972617ce7f9bd534da1698d19c242a9bfc77fc0a0f41104abc3eb81e

          SHA512

          7abb228fa7b8792c646b3016230b42bb72573dd65cbb2b530396bb91b24ec3e73af37bc78b8b1ab642d5fe373da9585dd0e28eb2c5e63f23c7c228e67c11667e

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

          Filesize

          3KB

          MD5

          70e797a9274e78fa20403bf9874fd6dd

          SHA1

          eb61aa617cb9bcbc90829719307a845f2b1ff7d8

          SHA256

          5145e4445a4580beaa33fc7b3979499ca3b9dc402c0710ebd510a43e47eafc7a

          SHA512

          2a9e157ffcab614213360af93217ecfb1095e59479c3721ac5a80bc42084365ce9101c1123873a4fedbdb0ae679a13af34f872b21ca087048fa8ede57388ecc2

        • C:\Windows\SysWOW64\fhvmpobo.exe

          Filesize

          512KB

          MD5

          53d7063cb942b274db624d6eea7e2c34

          SHA1

          617f6174440c4d078fda1c36cbade38eabfe56f6

          SHA256

          4294ab2cb102bbf146666361f4ffaac19a1596c77fcecab4f94133375b26833a

          SHA512

          d0a4667ccf35e947ac93a9590c5c68bd708149287880097f8856df65446e45fa4cf25cdac48b9c0428956a6d56eb680970bddc910adb6d3104d79bf2808602c6

        • C:\Windows\SysWOW64\iozuhxeildgcd.exe

          Filesize

          512KB

          MD5

          64d738d9a647bae04f2a27507a942699

          SHA1

          25e2ef5598c5135265bc2939237a975e7e725660

          SHA256

          d5cf961d9a0d4b2be3a89e51bd985da6dcbee95cc7281715ea764db24c809606

          SHA512

          8b09ac58a58e6fd45cf13c647cf806d5d11acb232f57a5962bc1629a9e728e5c3ffbd6cba34c3761c936e539382c7fbb65e381a8f2b8d9a011acf7eff2457ca4

        • C:\Windows\SysWOW64\jlabmunmqywsjpg.exe

          Filesize

          512KB

          MD5

          9eca8c6a9965324aff8056e092103b0a

          SHA1

          b163c233390ae8652d0c88dc1a6b10ed7f11cf35

          SHA256

          bb4e646d2c4cb4a64c31eb7c11201e7337b97e47cf3cb216fc781fec0fbd3ca5

          SHA512

          8f0767f99b0e1c123a365f84a5eec021cda5e5bf3693f7bfe6fc6ee7b05ce7cfdf2be122ae14943b163f2c1557aab7ba7b0f87d1fbf36075161de8258eb8738f

        • C:\Windows\SysWOW64\rtednxwjax.exe

          Filesize

          512KB

          MD5

          6e2b0fa1e6f7d76e27c1a3dadef8b51e

          SHA1

          2432848a42a10e67b6bdb679f98fd78bd4671a52

          SHA256

          c9ac1b4b23e36c11d6005a413aa71f582d37a8fe219854180675200cdfb0675d

          SHA512

          1bc62d0af1c78fa63bd18dbc72a46d87bb3646b956af1e787ee89b7320929e822a5976edc513dc7207abfc2f0777193576adccb5acb4c5a626d11d9c62a4d4ca

        • C:\Windows\mydoc.rtf

          Filesize

          223B

          MD5

          06604e5941c126e2e7be02c5cd9f62ec

          SHA1

          4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

          SHA256

          85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

          SHA512

          803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

        • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

          Filesize

          512KB

          MD5

          fbb091ff0bd7e6f2cd5b4c9b040dc0d8

          SHA1

          4801895a6a2f2eb8e2038b9713fb97b83695afac

          SHA256

          669b17e61c94f146d6c72937ec226a04f183156573f86ef37c9b18f57a346429

          SHA512

          5ca44e8099562ed3f2aad5e0cefceb71360961f5c301077c0fd36940c243d9a0698a7c8fccc9f24b26edb8dd59aca2f771c7f4ec791457eef9c4691dfe9f27f2

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          2f67e51a861012abbaa5754fce1018e4

          SHA1

          d380a1e0fecfb7120f24e8d18080d8821ce784e5

          SHA256

          867cc9a197afe6c68422b7f03d72a90b4afd332378a974f66ce1e88823f99fd2

          SHA512

          e7b236396d603ff65980919d48533249a8d84a10b038a5f714684491fc8f4e4a403b54879af2881c5199ba64acba076cb1d3fd5c2bef05a9864ab107114cd354

        • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

          Filesize

          512KB

          MD5

          5a3144d83a633c113fc2bd24ba7c0675

          SHA1

          3529c1c5e159d00fc7fabdf1b57e849dcfb9a56d

          SHA256

          c0dbe8198f2af5ac425ce5cc7a212a559def984c0c8f28c46327816cf73db4b3

          SHA512

          8731b971c84f82b4ba55993f0daa8ed03db5c027f05a868cb2874b65eba4408d721e292b782c7f22a430a0bc84cd7edea8864691f4f0ff961a8b60d6b10dd7e6

        • memory/2692-0-0x0000000000400000-0x0000000000496000-memory.dmp

          Filesize

          600KB

        • memory/3908-51-0x00007FF9638F0000-0x00007FF963900000-memory.dmp

          Filesize

          64KB

        • memory/3908-39-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-47-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-48-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-49-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-50-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-52-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-46-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-53-0x00007FF9638F0000-0x00007FF963900000-memory.dmp

          Filesize

          64KB

        • memory/3908-45-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-44-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-41-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-42-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-43-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-40-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-38-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-37-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-105-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-106-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-107-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-129-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-130-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-131-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-133-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-132-0x00007FF965F50000-0x00007FF965F60000-memory.dmp

          Filesize

          64KB

        • memory/3908-134-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB

        • memory/3908-135-0x00007FF9A5ED0000-0x00007FF9A60C5000-memory.dmp

          Filesize

          2.0MB