Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-03-2024 15:35

General

  • Target

    d67add1de2a10c7e5f9eb64ed143005e.exe

  • Size

    512KB

  • MD5

    d67add1de2a10c7e5f9eb64ed143005e

  • SHA1

    c13cba438d4c6def213d16b348f8066a9568f44d

  • SHA256

    a96605e0b5c535b2aa7fe9c530a7b75c2b9f2ff5fcac7cbe1a3f5337631f68a2

  • SHA512

    a109a3dc77727269ba8c8c6c9036a8c835ce0f2896886b9efa3c18e86e28174678cdeb8ef3739131175167f306f0300e6575b7972837aabe647dc73e01173223

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6v:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5+

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 6 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d67add1de2a10c7e5f9eb64ed143005e.exe
    "C:\Users\Admin\AppData\Local\Temp\d67add1de2a10c7e5f9eb64ed143005e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\clylvbxlvn.exe
      clylvbxlvn.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\vyqhoofe.exe
        C:\Windows\system32\vyqhoofe.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:2464
    • C:\Windows\SysWOW64\baquhikosceyooy.exe
      baquhikosceyooy.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c fgsxeedrzlfje.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\fgsxeedrzlfje.exe
          fgsxeedrzlfje.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2400
    • C:\Windows\SysWOW64\vyqhoofe.exe
      vyqhoofe.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2396
    • C:\Windows\SysWOW64\fgsxeedrzlfje.exe
      fgsxeedrzlfje.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2680
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1700
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

    Filesize

    512KB

    MD5

    8fe937418fc7daf74a1252c45a049b9a

    SHA1

    2e1e596afe26a1c3c7fed9d18bf701900ffa94a9

    SHA256

    6c0212c7e857d24e3affae2f1fa914126a553b3c3f91589b30177e4508a38319

    SHA512

    71573c6468fa3315523790a92b3ece606503c0a3f5938ab3a1843d8153a9e4e529480f8cbd66f52a49d4bcb6728f99dc00de956b277ba4c75ad6dcdd41c151bd

  • C:\Windows\SysWOW64\baquhikosceyooy.exe

    Filesize

    512KB

    MD5

    e845ffecd33b37040645936667a14f95

    SHA1

    74ed7152b234255e2030d8e3226952cb13bc7b08

    SHA256

    d58e4cacdc072b4ca0407a1ee5d1b121e51aea6a2a58c715f5ff7a666a9a4c87

    SHA512

    ddd3275fd16e05ea69c75cb2a8f8251dfc33eb7e48f621a254c1dd26a1c00a0ca7cafb791127fbb5f6180c0b739a85f609be03d789001e600c7a69f979e03b66

  • C:\Windows\SysWOW64\fgsxeedrzlfje.exe

    Filesize

    512KB

    MD5

    4287d1a82f6ecc084b75d9440c27f2b2

    SHA1

    bafd309977c7c96f263e50db510ef13038acdfbc

    SHA256

    e4b7b9a992e4564cf6944ce569ffc2f8e0bffdc05859d639884eb5c10101df51

    SHA512

    86276371e3d1bee83b94eb5627cdb9f56f73e141867be415651adf2cc7c539fd65a712317c3ad9b0da57e54287102a7518253d4be9e96674c24bb13ee9da42e0

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \Windows\SysWOW64\clylvbxlvn.exe

    Filesize

    512KB

    MD5

    bd733d66ae6866ca2e8281be0c692fcb

    SHA1

    a5490eec7db5526e442783ab94bda0ac493c36ea

    SHA256

    7a3ca85affcb98cd29b7afcabe4907fe7ffddcf9c1cbaf339c1857758ba8e59f

    SHA512

    02a16f8fbc8a7d3083459cc0f65eb71458bae9a422000b13f5d9bfb7a4508dbc3058a2278a448cd4655a3f8be3354654c22e045afc9738618b02b1de4c96e1f1

  • \Windows\SysWOW64\vyqhoofe.exe

    Filesize

    512KB

    MD5

    9ad19dd281c82eb03ac92c621fa47cdf

    SHA1

    4285c7d1c0128f754604fc7c2d6799d2aafe807a

    SHA256

    4bb232b9f9b8f55ab282342e5f0f8921c726aab9782e62ef5a1caeb300af7506

    SHA512

    8fdc0958bfe3b09893a157f1a857c34c6998a34238558914110e5c77145041049fd63cf71d97b83d5be0b9b8c2ef812da1220d4cee92c393d1c30f1add9ff939

  • memory/1700-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1700-50-0x00000000714DD000-0x00000000714E8000-memory.dmp

    Filesize

    44KB

  • memory/1700-48-0x000000002F4E1000-0x000000002F4E2000-memory.dmp

    Filesize

    4KB

  • memory/1700-79-0x00000000714DD000-0x00000000714E8000-memory.dmp

    Filesize

    44KB

  • memory/2248-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2304-78-0x00000000044E0000-0x00000000044E1000-memory.dmp

    Filesize

    4KB

  • memory/2304-81-0x00000000044E0000-0x00000000044E1000-memory.dmp

    Filesize

    4KB