Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 07:29

General

  • Target

    71ff96f83116cb2c1beb9b6046851e4fa122fb87c4aa220829a17a42a8785fcdN.exe

  • Size

    255KB

  • MD5

    ebc30a0cd36ed471c60a5cebe33da7a0

  • SHA1

    48c0ab1776ae3aa329aca33d53a56804a7e316f0

  • SHA256

    71ff96f83116cb2c1beb9b6046851e4fa122fb87c4aa220829a17a42a8785fcd

  • SHA512

    013450901304be5c9944c5f5c89045b9a7077f335d6383e61a46c514ab88e51df26f5641819eb2abc423ff2f0862d8210e0253970259c2c1afba3d46f188cbc9

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJn:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIA

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 49 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • UPX packed file 57 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71ff96f83116cb2c1beb9b6046851e4fa122fb87c4aa220829a17a42a8785fcdN.exe
    "C:\Users\Admin\AppData\Local\Temp\71ff96f83116cb2c1beb9b6046851e4fa122fb87c4aa220829a17a42a8785fcdN.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\tctfqanxoc.exe
      tctfqanxoc.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\cscgnwrd.exe
        C:\Windows\system32\cscgnwrd.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2836
    • C:\Windows\SysWOW64\nmjpxfqdprymuqh.exe
      nmjpxfqdprymuqh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2624
    • C:\Windows\SysWOW64\cscgnwrd.exe
      cscgnwrd.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2676
    • C:\Windows\SysWOW64\awirpidlvoznp.exe
      awirpidlvoznp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2824
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:596
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

      Filesize

      255KB

      MD5

      7fb65e1522705282cb5cdd24b850831c

      SHA1

      5ffbabd4d713d1a969ce339e468d07c55d036afe

      SHA256

      14290b9859a93630f9bd84a5e3aaf54943a0e7175b47bd036d1cc8e4a219c7c1

      SHA512

      990b9242dbc510f87208656c1020f046da4f29f7861fb72a36c936a48fe7d7e94320f1e9946b6e89f70719f56abca1006aceb290403e9d1dce0e7d4965fdd474

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

      Filesize

      255KB

      MD5

      a1b67072846a8e6f9af6780130e792f5

      SHA1

      a626706c114ebc43b5f7ac88cec2f0d8ec96cae7

      SHA256

      6ed1f2abaf7f571f130ba49085a422b86678e04afa7820b3ed2a25f72f767c4c

      SHA512

      28326308b6728dee26de89bd17a95d19d48f1f3be059be7839bce5c13fab1583897a9c9f588d3bca1b8aa8a2707c8cae9361daf79a1bb5af16a10f7d738f7a16

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      05edde6fec38f02de09decaee7469beb

      SHA1

      b83fdead6522b71112f0962fb48a056eaa80cee2

      SHA256

      c981557b37fdb457980f68d42f7a928a98f3f2f84978784f079b1c9c08e8dafd

      SHA512

      01bd3cc06fba29b938af824b5a136cef5b53d5e4560070165f2308839ca636c90a59065d215ffcca21738cb09b1a341636ed961c754954f6aac7906f9004fb6b

    • C:\Windows\SysWOW64\awirpidlvoznp.exe

      Filesize

      255KB

      MD5

      e310f97d4588eb32708b5b70c7a328ca

      SHA1

      d6633c5bb4110f6310d8f87c6961a50c40e29f67

      SHA256

      7a48ef275587811d7de17ce5258b0c6125b80ad52a96d707377ee083fd588882

      SHA512

      890cd2e7813c3b37ae52c1631848cf145013b3abcb0a36c2a89cc9ba9e9b1f2b0ed6300a945268c8b7a078f957425e037010fd1670e665eb4440a853c459fd29

    • C:\Windows\SysWOW64\cscgnwrd.exe

      Filesize

      255KB

      MD5

      697685aabba6fd6f9193f18d67f0c3ef

      SHA1

      974fa13c22258e72f4d68bee44304621efb3a12f

      SHA256

      e1f33b266940ac9299a9108dbc2a073506030d321e71f9bcfc3685c5b54f83b7

      SHA512

      059b795011094453a047be428950c80bc8fe52ec1fd8f6e199b4a45a9bb7cec11dcaf2d325bf5771e0708a89ab99d1bd296e7b6763d283e9dd44d0816bc97113

    • C:\Windows\mydoc.rtf

      Filesize

      223B

      MD5

      06604e5941c126e2e7be02c5cd9f62ec

      SHA1

      4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

      SHA256

      85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

      SHA512

      803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

    • \Windows\SysWOW64\nmjpxfqdprymuqh.exe

      Filesize

      255KB

      MD5

      5273cf071146938b95812d4bd482d2eb

      SHA1

      8b0070ded992eb4407f17f8b754603476246bdc8

      SHA256

      07bec1a2c15441da5bf6a34511a139e74aa9142681f79558a276acb4fdccc99a

      SHA512

      9e925e3a220b8a2a1203e404227729139058460ea3964ad7b6434d6008aed5cfbd3dc218667d135c98cdee4844631ac4a51226629ac4ccf636a2d1a42e69f89d

    • \Windows\SysWOW64\tctfqanxoc.exe

      Filesize

      255KB

      MD5

      5b3b6a54fef2b6289a3a139fd3e2e96a

      SHA1

      8a95265cbec79fa66017ca6f827d1935cb0c0852

      SHA256

      a78189ee73d77ee13bb1af90716d5b507b4b21840274cb0848066da07a3404d2

      SHA512

      f2cfea3544c41469f18942342fa1f1d8ff76d56f93c14bf43807a0887f94ac655352de12c53a396bfced4f19efb02bbd06cd0effd5d1de3977c3e25af12b2fa7

    • memory/596-141-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/596-49-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2028-22-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-142-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-102-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-145-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-92-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-62-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-105-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-87-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-121-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-118-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-115-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-111-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2028-108-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2616-21-0x00000000032E0000-0x0000000003380000-memory.dmp

      Filesize

      640KB

    • memory/2616-48-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2616-0-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2616-25-0x00000000032E0000-0x0000000003380000-memory.dmp

      Filesize

      640KB

    • memory/2624-93-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-109-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-146-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-143-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-88-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-32-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-83-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-122-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-103-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-119-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-116-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-106-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2624-112-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2676-89-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2676-84-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2676-40-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2676-94-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2676-100-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-120-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-90-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-117-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-85-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-144-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-147-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-113-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-104-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-123-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-41-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-107-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-110-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2824-95-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2836-91-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2836-99-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2836-46-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2836-96-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB

    • memory/2836-86-0x0000000000400000-0x00000000004A0000-memory.dmp

      Filesize

      640KB