Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 12:23

General

  • Target

    d61a8a72f30d02169466ee7505b2bede.exe

  • Size

    512KB

  • MD5

    d61a8a72f30d02169466ee7505b2bede

  • SHA1

    37e4b6fd74b9819d38fef09f32ee67f2699e26af

  • SHA256

    1e9ed6e72e351fc39cf9e3d16d5b5d1c288295d11bfec6909100343028a62bb0

  • SHA512

    f71e9349f8c42fc9bfb6b678bbe5baf0e1c6d402519689d35a3983e3f0310c7c8fbfd4afe2ff91f3616508b548bb172d4786f662be524410d955f3d58b56d277

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6g:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5H

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 11 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d61a8a72f30d02169466ee7505b2bede.exe
    "C:\Users\Admin\AppData\Local\Temp\d61a8a72f30d02169466ee7505b2bede.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4392
    • C:\Windows\SysWOW64\rycuwewghr.exe
      rycuwewghr.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\qjuabhtq.exe
        C:\Windows\system32\qjuabhtq.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2412
    • C:\Windows\SysWOW64\bzugvhmndiogcwv.exe
      bzugvhmndiogcwv.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3436
    • C:\Windows\SysWOW64\qjuabhtq.exe
      qjuabhtq.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4300
    • C:\Windows\SysWOW64\noytcjaoofwoq.exe
      noytcjaoofwoq.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2488
    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
      2⤵
      • Drops file in Windows directory
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1856
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:3772
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      f34301757204af9bbffa538fa9cb6ac8

      SHA1

      0cc332a07c5a536d22df73c1c5895f35b3f14a73

      SHA256

      c262b6d47146d0fdd66d07df63051abd685f496699f6d76733945d8b16b0a5e1

      SHA512

      e076c73a8d64356bc7baa5577af9e90423e2d6b3604e462dba071fcb0530447560222571548fb3ceb59beacd201a42425cd196182c44772588233600176657ea

    • C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      7f0ea9ccfb3a347345f80f7e077af49c

      SHA1

      6e3ac5aa25a3239866ca4c321a7d9a0672b756ee

      SHA256

      458d605e8c5821af842fa7393a9bd42a701f600e21629bfecc9bac9ddced2bf5

      SHA512

      5ae7db6b64375f8d4eb1d5ec6703f900f69a3616c4cecca133f8952744853db9a89565544f29e3231d4b99950a7a7c004ebf5d6cab1c05a0e109659de0e95e92

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      239B

      MD5

      49f74cc177ed54cfe3ef5b6f015ab77c

      SHA1

      69b1509d8bcc7dfe19224e0f66dcec720f458332

      SHA256

      675674eeb50c03efc58bd6165ef88f59408d56c7e7ddfa8d1a61bb264df26112

      SHA512

      40eba13830b310ab6345a0e5b713f5df8023b7c38058dda21f390b949134bfaecddef802ff0297d27f7f4da99cc872c6c5eaa15f7ed2d84bc54c653d888cc67f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      8c2955dac51621153bd57c8099930c6e

      SHA1

      e1bd6685cfa5f5df28b7d89214427ff3a9b7b468

      SHA256

      bac67f6d6b60bd287eb22ef30e376f05f0517e1d3abae9aca5b403e0872ecd3b

      SHA512

      777b8d5148286e19e0bb6d17140632203977e74dec54b9bcc1529ae8e60f4488653959d8f9b827f4f3602e7692a670f71ad2b457b802137a0b4c3fe8021a4928

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      40e04572c4ea70a25169ed4298025588

      SHA1

      554f4ae7074359bdd08b563a1141bc90d19da828

      SHA256

      b812a7ca92e96a802db5c5cc3f4ab6ac81667d1f07d7c2d679419809f3423f74

      SHA512

      b729c54f07d10b82720a706f96ecc6ac19b6807e961af4df995cfd9f4a807fab7b5ad3262c8c2583fc374ce396b38f5ebd1b6ca11dae0f71f0f9574a0c2805cc

    • C:\Windows\SysWOW64\bzugvhmndiogcwv.exe

      Filesize

      320KB

      MD5

      40eccbf82b7b8fc916befc4f91646a41

      SHA1

      9b26728b4c732bfeb504f70ab523d90def972d37

      SHA256

      1dc118e41bf637830be03d9bfe6d57960cf8dc9dbe9c8302a78e3406285bbaaa

      SHA512

      4714d4a188098bfac7feb042ef4c6f0236e826c335c740df7f47d60f0e70d50c5eeaf73e1b94afb0408bd8c6b5ef6fa9d49577a6ac214ce115f4b6db0b341cdf

    • C:\Windows\SysWOW64\bzugvhmndiogcwv.exe

      Filesize

      512KB

      MD5

      255d56e1b068c96677729048bf6f36ed

      SHA1

      92436bdff78a5227b8d88e4bd76ff5eb77a74c97

      SHA256

      395bfb1b5a05366c9159bce36f61c045c44148ce1f1e7847873b039c94a5c3d2

      SHA512

      895f026f007b59d6425fba7e6418cb61d04bd58ea981d9340372b02e28207a9785480d7226bdd900a868b34361cf9eabcc5905737681e2b91fbd1976143677dd

    • C:\Windows\SysWOW64\noytcjaoofwoq.exe

      Filesize

      448KB

      MD5

      9728739f509ce0f3b3b073c945c208bf

      SHA1

      31bf207a650a7f1bbb8e90552891f1a6f4e4783b

      SHA256

      f252517c755af447fe73347dd23cd133e28c7a203d01382306a195c8ddda3dba

      SHA512

      76e963f4d1b88528ebbdbc375372889efffba4768f6a99bccce4c1faa730e9515f93fa74bd10bb61c0034f2ceb9ef85ee8234f9d13df183ffc7e163ae3dd38e7

    • C:\Windows\SysWOW64\qjuabhtq.exe

      Filesize

      192KB

      MD5

      110f40dbeb901f612cee1dc242fdb309

      SHA1

      0d668d172ef81b3f17c1f870513988629c697600

      SHA256

      2776ac73ff5e792a5a804395643f25e611d6eb66037ffd261caacd95ae084b82

      SHA512

      076fda5dfa04f3c443f91657f607ef768185b7753767eb70d557635d398a76f85c8b3c19c7d864f9c342ced1af18c9c98f6f4da4b7bb86dca104230fa71b6df1

    • C:\Windows\SysWOW64\qjuabhtq.exe

      Filesize

      512KB

      MD5

      8a15187bfe9df52f1ddaed1f7f533db4

      SHA1

      9e74a280becfcc5552dff0652591e7903ca017b1

      SHA256

      8a09d8c9c061691f18e3df12b36518c820da3c45779eaae928fbdcbe93da22c2

      SHA512

      2c994f498fc0e726c4186f7379719e0eff1d5f522850a61c8fc9ce4036a393d5e7d37c67b74c443660fb966c4056206cfbbfb0fbc732042d4af51e4960e33afe

    • C:\Windows\SysWOW64\rycuwewghr.exe

      Filesize

      512KB

      MD5

      46c0c3330e04e06763fab8dc0630823d

      SHA1

      7bbf5ee7402311e48b94a66fecf7fad58ab5bd57

      SHA256

      e74893ff58e07eafc6cfa91f09e369a373a07e1bf13f611b7f55fde07cd59a8d

      SHA512

      a5203b798c966bfc6e582c8553ed1e1241a891b079da8bbf2cad435687ffa1e44ddbbb89addd2004b6141363b841614944777d61350ee1354752817ff316f9fb

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      4b61b24a75ae1422b62f72d8e5e0a56b

      SHA1

      aa953674b9d995736ede7f73c8c797ea1549d7c7

      SHA256

      365c7d6839be44420187813a7a8ac129f3b354c26b28f9a3c8d7d0e4c67b138a

      SHA512

      0cf99143bfa4f0e2e2453ccd072d734e064938758cdc2879d5f9fb7abeec7c76ecbf6cf5afe5267570084feb2c1b479b2640aa3bb6db3d531d2f5dc43869671c

    • \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe

      Filesize

      512KB

      MD5

      6b62ec49adf807a7a53a449c456da969

      SHA1

      870595540940928b779c9a625926f2ca8647c539

      SHA256

      5f1409b4ada0832d4d878b0aae7b6eba3d3e903ba583c94c33681028651307b9

      SHA512

      5996ad614d793098ea94efab9e4dd012f6b9e2f81afbd85c7020042f1174be8db9b30ad81236bc008c91a7760d089004dcefd8027eed92f1edaa94a653786b0c

    • memory/1856-39-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-38-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-45-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-46-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-47-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-49-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-48-0x00007FF9789C0000-0x00007FF9789D0000-memory.dmp

      Filesize

      64KB

    • memory/1856-50-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-43-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-53-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-54-0x00007FF9789C0000-0x00007FF9789D0000-memory.dmp

      Filesize

      64KB

    • memory/1856-42-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-41-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-135-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-40-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-44-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-37-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-36-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-35-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-109-0x00007FF9BAAD0000-0x00007FF9BACC5000-memory.dmp

      Filesize

      2.0MB

    • memory/1856-131-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-132-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-133-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/1856-134-0x00007FF97AB50000-0x00007FF97AB60000-memory.dmp

      Filesize

      64KB

    • memory/4392-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB

    • memory/4972-136-0x0000017B55F60000-0x0000017B55F70000-memory.dmp

      Filesize

      64KB

    • memory/4972-152-0x0000017B56060000-0x0000017B56070000-memory.dmp

      Filesize

      64KB

    • memory/4972-168-0x0000017B5E3D0000-0x0000017B5E3D1000-memory.dmp

      Filesize

      4KB

    • memory/4972-170-0x0000017B5E400000-0x0000017B5E401000-memory.dmp

      Filesize

      4KB

    • memory/4972-171-0x0000017B5E400000-0x0000017B5E401000-memory.dmp

      Filesize

      4KB

    • memory/4972-172-0x0000017B5E510000-0x0000017B5E511000-memory.dmp

      Filesize

      4KB