Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 09:06

General

  • Target

    cda8c2c485a7dd6b2198a59af42031a4.exe

  • Size

    512KB

  • MD5

    cda8c2c485a7dd6b2198a59af42031a4

  • SHA1

    e20fea3405b1918b95ab22191b716679b72ba3a5

  • SHA256

    42eb62bf385aa18c462f8c06d946e720fac141bbf95bfd34c3ef56a95aef24a0

  • SHA512

    1ba5c622091d86ec076518874495e3cc33f7df348f0ff0c6527883c645fa16eb09efe918bd0c48872647350148e861b8d93996fb1d849c844285992c56d3d959

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6p:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5u

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cda8c2c485a7dd6b2198a59af42031a4.exe
    "C:\Users\Admin\AppData\Local\Temp\cda8c2c485a7dd6b2198a59af42031a4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\qvuhkfmshp.exe
      qvuhkfmshp.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\ogiwiavy.exe
        C:\Windows\system32\ogiwiavy.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2972
    • C:\Windows\SysWOW64\yhmsdktknbooxvd.exe
      yhmsdktknbooxvd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Windows\SysWOW64\ogiwiavy.exe
      ogiwiavy.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2892
    • C:\Windows\SysWOW64\rigrdhlvyowqh.exe
      rigrdhlvyowqh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2276
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:632
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3016

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      af31b9aaf9f7d81840d8c523a26092c9

      SHA1

      f5f85bebbdc8ede2ee02378731081f2e2ac22d2d

      SHA256

      77f8ab97d8095991f4783c0b88e676b0d9d8d3ce67462264bfba35b49e91eeb0

      SHA512

      f29d78d78062cfd5b24333b6ce2ab076176f3695dbca913582535fc78b9bd9a13ce71bed5651c9cdc0611af68bb2ac1e5e05812698acf38831bc5842d90adddd

    • C:\Users\Admin\Desktop\SyncWrite.doc.exe

      Filesize

      512KB

      MD5

      5964b1af8703d3462e1fceb82b78156b

      SHA1

      a0d4d7cb5cf496e5f7a04fd641862cc98e67c6b1

      SHA256

      9244f0fdc950cd4bcb0d2dcf582a416d35a95dbe36b004d88b9de77424722028

      SHA512

      3a48e60e92f02232f5067a02b17ad1b5dc2c585c2a32c7ddb026bba988302d0531e1d4077614624072599b173b7f508c0cf6581ad308f506637dc724b0696776

    • C:\Windows\SysWOW64\ogiwiavy.exe

      Filesize

      512KB

      MD5

      99ff0682c8f255a26805dcfd52ce9dec

      SHA1

      0b9274efd693b0217f948b637b732fa612f3d1a7

      SHA256

      7e78784a489c064db7d9bb0f3ebe01a87f2629ad0f6b0ef13a44d3b37048c2c2

      SHA512

      4fc2f8797eff6a6c201f07dc81e08ab0c90d7448742c9b90df9c46d70cd863ca276056061057d46a3553eb92d2e24ba4358a657fc875d982bd21f7448b401df5

    • C:\Windows\SysWOW64\yhmsdktknbooxvd.exe

      Filesize

      512KB

      MD5

      e2c1f3f67b4a278e32a916242b28ff6c

      SHA1

      b1800e18dd79b0dbd2b1ae262d040d9a33515d6c

      SHA256

      33f9f57945384ee20f25a81ce5ee1364bae05dde6ab50a41240342bef7d3848b

      SHA512

      6337995eca204de19e6a2cc7b9c7aaa06ebb6eb15404d7cbb671614d280a3724e341cf8352ea7da99002d6154ca47eb5577eb3a48e93ef1bf77b87fe2b0538ca

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\qvuhkfmshp.exe

      Filesize

      512KB

      MD5

      a4c651f477059c5d6322abc1bf8f418e

      SHA1

      542a69bb777b8b57f7581d9c5b52023d3d7147a2

      SHA256

      b7211e4c3c72fc1f228494e1bf022dce06a18b7e7cbebbbda659615798e012c3

      SHA512

      d8c410d35ee536ea410ff9993257ee11820b4d36642fc83caf7e88eff89796404c7659a18032c9b6a65e214ce4376f22962a0b5422638fc546f6e4ee6b518933

    • \Windows\SysWOW64\rigrdhlvyowqh.exe

      Filesize

      512KB

      MD5

      f49ea9a65f1bd342af2e25b884739e06

      SHA1

      ad8bcddfbc7eeb0ccc1a41fbe676e3d3bcad829d

      SHA256

      5db8ef300498b3e5cfed7412f2901ff8648390abbe67868ee8a23cb1eefc520e

      SHA512

      6292108b173af1a1cca62bf46dbb6c5399d07f623d5a53e2f63b17f9422cb3a8cb9f8a7e1e449dc44f400a70f62ff6c7c86d55dfd16608ef69740ca387b6c34b

    • memory/2008-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/2596-45-0x000000002F0D1000-0x000000002F0D2000-memory.dmp

      Filesize

      4KB

    • memory/2596-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2596-47-0x00000000718FD000-0x0000000071908000-memory.dmp

      Filesize

      44KB

    • memory/2596-83-0x00000000718FD000-0x0000000071908000-memory.dmp

      Filesize

      44KB

    • memory/3016-81-0x00000000040E0000-0x00000000040E1000-memory.dmp

      Filesize

      4KB

    • memory/3016-84-0x00000000040E0000-0x00000000040E1000-memory.dmp

      Filesize

      4KB

    • memory/3016-90-0x00000000027C0000-0x00000000027D0000-memory.dmp

      Filesize

      64KB