Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 15:51

General

  • Target

    c902ff8027889f117546949b5102d22b.exe

  • Size

    512KB

  • MD5

    c902ff8027889f117546949b5102d22b

  • SHA1

    fd9d982a21e17c18da8031b2cd1be24a3b88dd76

  • SHA256

    9cea96e68569d6680bd98f0ca1b537063925b24088486931a496651340f2c0ff

  • SHA512

    b01290f8165257d2ef4f857870a2a41dc10fe09adcb11ec0273e290f3cda80d00f79f2aa27a834d84e7acb0bb5ee8bc032acb007f265e280653d0abf210bdf1a

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6B:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5O

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 9 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c902ff8027889f117546949b5102d22b.exe
    "C:\Users\Admin\AppData\Local\Temp\c902ff8027889f117546949b5102d22b.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Windows\SysWOW64\vrjiycuqgz.exe
      vrjiycuqgz.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Windows\SysWOW64\wwjwqqhr.exe
        C:\Windows\system32\wwjwqqhr.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3520
    • C:\Windows\SysWOW64\kcsnxmqmykmcrmg.exe
      kcsnxmqmykmcrmg.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5028
    • C:\Windows\SysWOW64\wwjwqqhr.exe
      wwjwqqhr.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4736
    • C:\Windows\SysWOW64\aekyvjtpivdkn.exe
      aekyvjtpivdkn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4856
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    239B

    MD5

    12b138a5a40ffb88d1850866bf2959cd

    SHA1

    57001ba2de61329118440de3e9f8a81074cb28a2

    SHA256

    9def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf

    SHA512

    9f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    417bd31fe8b539b5981ce739e5b9a494

    SHA1

    56e63957dc0250730f19a872488b612b30dcef29

    SHA256

    9dccd17d7f7074999a6d2dccc38b4d9ec705ab13910ee85fc699d4e0dd21c1ff

    SHA512

    3ab38b2d4c2c7b171acbf4573c2c709ad1f8a2ae15557688abfbffea7fc5546d6744d8fe1104a8c570224eda6acd58380a93b0d92f9dd3e5fadcd25cc8a480b8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    a67ab2eee409d14d7c0b6c63073f58f9

    SHA1

    ceede7dbfb50578426c3b62634799dc2f6457423

    SHA256

    c8b8d967f530fffde16823052c2887047923866dd40ac5d7851dc27417394fe3

    SHA512

    41e93a1209d590444f7b734de134b01028116fc9be17971346dccdefb6f4c7f94de6dea50e6481ccc97c23e4a88a6d23ff85fae988e970a5906dc64da9f4a521

  • C:\Windows\SysWOW64\aekyvjtpivdkn.exe

    Filesize

    512KB

    MD5

    f0b77463f07560caf48b9006f826f0ca

    SHA1

    c6235aa11ae731754e910a1fb18ad5216b30b3df

    SHA256

    db44596f32381c78f31edb727f4aa41b6e77678bf6979a9d4e24a97420bb0ecd

    SHA512

    9960e5d1b195288c3dfe16d59c5add47f2a439ce5c20bc9d484b490931d89e560831526c0f8ba9c47a4b565b050286e70e24bd8fe9e246096eb8e865c335f1d6

  • C:\Windows\SysWOW64\kcsnxmqmykmcrmg.exe

    Filesize

    512KB

    MD5

    0a983c3b66ec8bdc6e66bb6a8d9925e1

    SHA1

    5d1e70c5f934a55c6088bf106404fbba472d1f4a

    SHA256

    25560837543d08263a7acf9a2ea9957829561039c5d1fdea32e964f73ae10671

    SHA512

    46d91561c31a0a57f8e8fa7772fb4f1dae31f31591ed5eb37b1f6532a3fc026ea9a27f1efc14aaa2e3c07ad598c6b08d12e758c6a181da9a366cb1ea9a714a8e

  • C:\Windows\SysWOW64\vrjiycuqgz.exe

    Filesize

    512KB

    MD5

    04a75fbb8ab107021bdd0abe445152dd

    SHA1

    51b01d9c9120736ffc10f47c7f59e43401f57ee8

    SHA256

    f114c1e84df736f0ab35e47ea92acd635cb116b997e08a1d2bfeb54d179a8d5d

    SHA512

    0e1505b9107bfbedd11b006b4e03dcd140496168f8509d64d0e1108c195092202ad4fab5b3db7ab40d5b4546a1b2dc7ea5262ac48da5cd48eff4a4528d44df72

  • C:\Windows\SysWOW64\wwjwqqhr.exe

    Filesize

    512KB

    MD5

    3f21cc52941a928b82618d41bf92940d

    SHA1

    d9f45096eb8eb3a03d5423a5105e59747e7d50d2

    SHA256

    8d69e7ae466eea0196af525ae1d356c1f7c5d199dfe9f9bef6d5f2f685836251

    SHA512

    8a8b3aca30f8fae1b5f692f2da9ce2777ddf00cdcd6e32ab578fef73112e09701b892ceab0c9e39c51d5d8197822f8ffd5a95db190c40d500411dd7b52f7894a

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    f63101ee3f06acf36b54731095feb380

    SHA1

    5cf2685d2c839e2aec9352e0a9d4d2b8a0211c3e

    SHA256

    3bd26591a716db754dc9bec529e5f0ce2e106167c3f434063b90bb7a4219d0e7

    SHA512

    b553dd6b3d387a73d8c88514bb4999ea17dbff27cdf7e8f93c452988d8170468f225b3dc152c543fd7553ec061ed269fe7336ab4360e4924b096d97fb46c45dc

  • \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

    Filesize

    512KB

    MD5

    d7a7975e7a658297421ad38c0ffbe84c

    SHA1

    f0b0d094cf9e08ec9f9dd4a402f6ba62006b21ac

    SHA256

    e67d51625d864376faf7eadd213ba95e4918b2c2e901e2ed1e8f0e24809bc055

    SHA512

    7b860b33483f7ee35ed31ab9b1a9ba3db05fffd71fe7b599ed0bab83c72b7c98a3d8b483e8d048c416fe1b057f92e797d2b924c465d1a240aacc2198f3920237

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    a841aa1acfeb6b01a156b879c15d8325

    SHA1

    f903e0e1de8087a34fdd94f08a6a87ba82da787b

    SHA256

    3738ea8c37eb7d01ef3ccd0cf3ef050684da76c909db84e8336cfaaefa12c9ea

    SHA512

    50acb836e3a9d81b27d66ddca36033136a090d5b737ee5c7cffdb3ba18f253cb9d0c2de9dc6c60419799852e5f8d173d1f3962f619ee9c02304e8477b65525ab

  • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

    Filesize

    512KB

    MD5

    620dd2e8b8408d86a15c1030326aa3f0

    SHA1

    3859720beadc580a1fc304431242dedfb626de50

    SHA256

    2f39ba1e9c0d1cce9a3641e747680c572ebb47578dbb0f365f299b0a0b353639

    SHA512

    f8bd99e15b665414f727326fd7f0189ea76c9b52b25d04ee4b650c9d2e02fe89e406cdbf6e83cf0057316773b9ae845185026d878dff6fd1a405bf4953dc5cf7

  • memory/1324-42-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-59-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-47-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-46-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-49-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-50-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-48-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-51-0x00007FFC934B0000-0x00007FFC934C0000-memory.dmp

    Filesize

    64KB

  • memory/1324-52-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-53-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-54-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-56-0x00007FFC934B0000-0x00007FFC934C0000-memory.dmp

    Filesize

    64KB

  • memory/1324-55-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-58-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-57-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-44-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-45-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-37-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-141-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-43-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-41-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-38-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-36-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-35-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-114-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/1324-136-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-137-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-138-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-139-0x00007FFC95AD0000-0x00007FFC95AE0000-memory.dmp

    Filesize

    64KB

  • memory/1324-140-0x00007FFCD5A50000-0x00007FFCD5C45000-memory.dmp

    Filesize

    2.0MB

  • memory/2444-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB