Analysis

  • max time kernel
    154s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2024, 02:40

General

  • Target

    d7adb1daba128797ab489ad0ae9e5736.exe

  • Size

    512KB

  • MD5

    d7adb1daba128797ab489ad0ae9e5736

  • SHA1

    957ead087a18656830defb1684829ef2978fe8e0

  • SHA256

    0f488de757bb0f01f23b5c0344730f30560064552a1bba6a307cebc1871df1ee

  • SHA512

    dbe7b4f8bdef7412c9e2c77f304de0d0f5e31fa0389c326def0c95774e89e8502e9be3cada258e858c948e5867bd406f6b28c0784983302312e58d37552df4df

  • SSDEEP

    6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6y:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5/

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 7 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7adb1daba128797ab489ad0ae9e5736.exe
    "C:\Users\Admin\AppData\Local\Temp\d7adb1daba128797ab489ad0ae9e5736.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\SysWOW64\jxnscbekgk.exe
      jxnscbekgk.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\mffhgmdh.exe
        C:\Windows\system32\mffhgmdh.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2988
    • C:\Windows\SysWOW64\qonppwyjyglnvbj.exe
      qonppwyjyglnvbj.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2564
    • C:\Windows\SysWOW64\mffhgmdh.exe
      mffhgmdh.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2732
    • C:\Windows\SysWOW64\mfnddqtokcbji.exe
      mfnddqtokcbji.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2752
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      512KB

      MD5

      020bce13699ab5e5bf91bab21ae89675

      SHA1

      5b8d2899fa290dd9af1a68c275d47f67e3b35f92

      SHA256

      f8ec356742ab0fdd4e242fb7b725cae34fccc8e256f80c26e6168338ae145baa

      SHA512

      5927773bf7fb5ec08c21505407494067fdd5c2bb3be1eac2a8f00125ce03715814ca192b832edadaf28ec34b39a7ba6f925fd02f39877db9abb7426148e089f9

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      512KB

      MD5

      37c003f3eaefcc722a80ebe2c651143d

      SHA1

      d8d9c4e673a62bb0d5a9d669773d0c9bb1c5fc8d

      SHA256

      3f7f21208189074a337b23ca74c3f905b087ddb0178fb9f1d68bb8d6e3811738

      SHA512

      4d71a95fc8f8f6da54bcfb133788bb1f0966a0a3602cf996082e3a96d7d0cabf0864122bead722df90c3cf630877169d6ffdb0aedd6c637080d2d04a44dbd810

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      648a392d5c0e131c288b2665192be73c

      SHA1

      4b09539efa65eb91ece31ea7a894abbe7cad61db

      SHA256

      97587ae27b2ad69d97a2f796b9cf96b5b22e8e8938ff1d6288f4b24af8324b67

      SHA512

      431bf4f1780030487439d4d127db970fe503849750d32d322354da2ef90da9272be4689a9036e8d1bcb46761a1bd9ba988ff930cac10cdb4af0db3a7af353957

    • C:\Windows\SysWOW64\mffhgmdh.exe

      Filesize

      512KB

      MD5

      dfe823b9caa8ae47d1814deec597e1e9

      SHA1

      26ada80a379cc0ff611f435834c7c81749b838be

      SHA256

      07f9b0fab1ccad13e28b389a9b1a14873ebcf34581019beb08577f33a893d21e

      SHA512

      de9900c938dc830f5c10a1a9bccb7b82fcffaedb8dd0185bd5639b72ee21ab2edc64edbc5f9b65a4c4fe52aa4ac8fc408a155d619610b97638f7126edd76fd61

    • C:\Windows\SysWOW64\mfnddqtokcbji.exe

      Filesize

      512KB

      MD5

      1ab0071dfcdf3c17e8839f6f3057bc86

      SHA1

      f293934f0e39fe59ac695468a7568b3a27680a42

      SHA256

      784d4c34cc6e5be38e327bff871989c345d61f6da35b4cc77cab6f8830d087f2

      SHA512

      aecab01954328e076bc2f63a340d023e7b1a7441cc7074a534149ce6e8756dc38f91a8a80633fd807cdab1b7b8e8e5b74931110abcf16e32e627e172309e80d2

    • C:\Windows\SysWOW64\qonppwyjyglnvbj.exe

      Filesize

      512KB

      MD5

      604d556f065ad5a8b3b85e62d16dd6d8

      SHA1

      e78dd9bd728fc62992417ad2353a86f57dd85d23

      SHA256

      68d2ffe02ab35872a26cfd4c02164bbac56f71353b5aed0121938b55f26740b6

      SHA512

      afefeb773c0470b835e622284cffb018a2edd04a2ff4f578b8a02da4b0aff670f392d592c03c94e2eee85dcffe5b3e2dc5e5560046bb6ae03290b59ae253ba17

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\jxnscbekgk.exe

      Filesize

      512KB

      MD5

      ff70baee35ff83bf5b996e79f2d0e8ef

      SHA1

      8e32005cb218259432d85baefabe27c32c8733a6

      SHA256

      7c0496600df9660b359f671ce5dd6d8e98700bb37c1a64927dff4bbb656f8ea3

      SHA512

      86c3b385d4a7a4b630b400d83b8bbc388f3615c2d9a7849900c1a9a3ca2fbce7eb72fe7ef74745f6d6d024632dd87a534c4bd4c24cd58213f1b48f431ea4294b

    • memory/2472-45-0x000000002FBD1000-0x000000002FBD2000-memory.dmp

      Filesize

      4KB

    • memory/2472-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2472-47-0x0000000070FAD000-0x0000000070FB8000-memory.dmp

      Filesize

      44KB

    • memory/2472-79-0x0000000070FAD000-0x0000000070FB8000-memory.dmp

      Filesize

      44KB

    • memory/2472-100-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2612-0-0x0000000000400000-0x0000000000496000-memory.dmp

      Filesize

      600KB