Analysis
-
max time kernel
152s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 20:59
Behavioral task
behavioral1
Sample
7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe
Resource
win7-20220812-en
General
-
Target
7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe
-
Size
255KB
-
MD5
a1981732e7f8dd511707e7b3f5ab7711
-
SHA1
1ef34d7b1561aba00fb338e61e02046ad073a29e
-
SHA256
7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481
-
SHA512
f4a4201ea00cae54acaa45641821431ebf1992a3d61ef3194eb8b36ea8ceec1ffe2da4540a94417106128cf938b3953f57be41d280fb42b808e28f52f4838310
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJA:1xlZam+akqx6YQJXcNlEHUIQeE3mmBID
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" qbmaucvsra.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" qbmaucvsra.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qbmaucvsra.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" qbmaucvsra.exe -
Executes dropped EXE 5 IoCs
pid Process 1484 qbmaucvsra.exe 4628 plvqdwrcyuvdbeh.exe 2668 wcyohppj.exe 5056 qyyczhoavjqww.exe 1108 wcyohppj.exe -
resource yara_rule behavioral2/memory/4340-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e4a-134.dat upx behavioral2/files/0x0006000000022e4a-135.dat upx behavioral2/files/0x0006000000022e4b-137.dat upx behavioral2/files/0x0006000000022e4b-138.dat upx behavioral2/files/0x0006000000022e4c-140.dat upx behavioral2/files/0x0006000000022e4c-141.dat upx behavioral2/files/0x0006000000022e4d-143.dat upx behavioral2/files/0x0006000000022e4d-144.dat upx behavioral2/memory/1484-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4628-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2668-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5056-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e4c-150.dat upx behavioral2/memory/4340-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1108-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e4f-154.dat upx behavioral2/files/0x0006000000022e50-156.dat upx behavioral2/files/0x0006000000022e4f-155.dat upx behavioral2/memory/1484-157-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4628-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2668-159-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5056-160-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1108-161-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x000b00000000071f-170.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" qbmaucvsra.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qyyczhoavjqww.exe" plvqdwrcyuvdbeh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run plvqdwrcyuvdbeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hvphuloj = "qbmaucvsra.exe" plvqdwrcyuvdbeh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xqfaoqch = "plvqdwrcyuvdbeh.exe" plvqdwrcyuvdbeh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: wcyohppj.exe File opened (read-only) \??\j: wcyohppj.exe File opened (read-only) \??\n: wcyohppj.exe File opened (read-only) \??\j: wcyohppj.exe File opened (read-only) \??\r: wcyohppj.exe File opened (read-only) \??\u: wcyohppj.exe File opened (read-only) \??\x: wcyohppj.exe File opened (read-only) \??\e: qbmaucvsra.exe File opened (read-only) \??\i: qbmaucvsra.exe File opened (read-only) \??\t: qbmaucvsra.exe File opened (read-only) \??\l: wcyohppj.exe File opened (read-only) \??\h: wcyohppj.exe File opened (read-only) \??\p: wcyohppj.exe File opened (read-only) \??\u: wcyohppj.exe File opened (read-only) \??\v: wcyohppj.exe File opened (read-only) \??\g: qbmaucvsra.exe File opened (read-only) \??\k: wcyohppj.exe File opened (read-only) \??\b: qbmaucvsra.exe File opened (read-only) \??\w: qbmaucvsra.exe File opened (read-only) \??\p: qbmaucvsra.exe File opened (read-only) \??\v: qbmaucvsra.exe File opened (read-only) \??\e: wcyohppj.exe File opened (read-only) \??\o: wcyohppj.exe File opened (read-only) \??\b: wcyohppj.exe File opened (read-only) \??\w: wcyohppj.exe File opened (read-only) \??\y: wcyohppj.exe File opened (read-only) \??\r: qbmaucvsra.exe File opened (read-only) \??\i: wcyohppj.exe File opened (read-only) \??\q: qbmaucvsra.exe File opened (read-only) \??\s: qbmaucvsra.exe File opened (read-only) \??\g: wcyohppj.exe File opened (read-only) \??\p: wcyohppj.exe File opened (read-only) \??\x: wcyohppj.exe File opened (read-only) \??\a: wcyohppj.exe File opened (read-only) \??\e: wcyohppj.exe File opened (read-only) \??\q: wcyohppj.exe File opened (read-only) \??\l: qbmaucvsra.exe File opened (read-only) \??\a: wcyohppj.exe File opened (read-only) \??\x: qbmaucvsra.exe File opened (read-only) \??\i: wcyohppj.exe File opened (read-only) \??\y: wcyohppj.exe File opened (read-only) \??\v: wcyohppj.exe File opened (read-only) \??\u: qbmaucvsra.exe File opened (read-only) \??\b: wcyohppj.exe File opened (read-only) \??\m: wcyohppj.exe File opened (read-only) \??\f: wcyohppj.exe File opened (read-only) \??\z: qbmaucvsra.exe File opened (read-only) \??\m: qbmaucvsra.exe File opened (read-only) \??\r: wcyohppj.exe File opened (read-only) \??\s: wcyohppj.exe File opened (read-only) \??\z: wcyohppj.exe File opened (read-only) \??\n: wcyohppj.exe File opened (read-only) \??\k: wcyohppj.exe File opened (read-only) \??\h: wcyohppj.exe File opened (read-only) \??\t: wcyohppj.exe File opened (read-only) \??\o: wcyohppj.exe File opened (read-only) \??\t: wcyohppj.exe File opened (read-only) \??\q: wcyohppj.exe File opened (read-only) \??\z: wcyohppj.exe File opened (read-only) \??\l: wcyohppj.exe File opened (read-only) \??\m: wcyohppj.exe File opened (read-only) \??\f: qbmaucvsra.exe File opened (read-only) \??\h: qbmaucvsra.exe File opened (read-only) \??\n: qbmaucvsra.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" qbmaucvsra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" qbmaucvsra.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4340-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1484-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4628-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2668-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5056-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4340-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1108-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1484-157-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4628-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2668-159-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5056-160-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1108-161-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll qbmaucvsra.exe File opened for modification C:\Windows\SysWOW64\plvqdwrcyuvdbeh.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File created C:\Windows\SysWOW64\wcyohppj.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File opened for modification C:\Windows\SysWOW64\wcyohppj.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File created C:\Windows\SysWOW64\qyyczhoavjqww.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File opened for modification C:\Windows\SysWOW64\qyyczhoavjqww.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File created C:\Windows\SysWOW64\qbmaucvsra.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File opened for modification C:\Windows\SysWOW64\qbmaucvsra.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File created C:\Windows\SysWOW64\plvqdwrcyuvdbeh.exe 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal wcyohppj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal wcyohppj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe wcyohppj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe wcyohppj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe wcyohppj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe wcyohppj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal wcyohppj.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78668B3FF1F21D0D10CD0A28A0F9160" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qbmaucvsra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc qbmaucvsra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg qbmaucvsra.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB5FAB8FE6BF29883743A4681993992B3FD03F14215033DE1CC429E08A2" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qbmaucvsra.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB5B12944E739ED53BDB9D233EED7CC" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" qbmaucvsra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" qbmaucvsra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs qbmaucvsra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qbmaucvsra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf qbmaucvsra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" qbmaucvsra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32422C7A9C2483276D4276D377202DDD7CF564D8" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FC8E4F2985129032D72F7DE1BD97E634593666466242D6EA" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1948C70915E4DAC5B8CB7FE5EDE434BA" 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat qbmaucvsra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh qbmaucvsra.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5008 WINWORD.EXE 5008 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 1108 wcyohppj.exe 1108 wcyohppj.exe 1108 wcyohppj.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 1484 qbmaucvsra.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 4628 plvqdwrcyuvdbeh.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 2668 wcyohppj.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 5056 qyyczhoavjqww.exe 1108 wcyohppj.exe 1108 wcyohppj.exe 1108 wcyohppj.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5008 WINWORD.EXE 5008 WINWORD.EXE 5008 WINWORD.EXE 5008 WINWORD.EXE 5008 WINWORD.EXE 5008 WINWORD.EXE 5008 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4340 wrote to memory of 1484 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 80 PID 4340 wrote to memory of 1484 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 80 PID 4340 wrote to memory of 1484 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 80 PID 4340 wrote to memory of 4628 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 81 PID 4340 wrote to memory of 4628 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 81 PID 4340 wrote to memory of 4628 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 81 PID 4340 wrote to memory of 2668 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 82 PID 4340 wrote to memory of 2668 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 82 PID 4340 wrote to memory of 2668 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 82 PID 4340 wrote to memory of 5056 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 83 PID 4340 wrote to memory of 5056 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 83 PID 4340 wrote to memory of 5056 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 83 PID 1484 wrote to memory of 1108 1484 qbmaucvsra.exe 84 PID 1484 wrote to memory of 1108 1484 qbmaucvsra.exe 84 PID 1484 wrote to memory of 1108 1484 qbmaucvsra.exe 84 PID 4340 wrote to memory of 5008 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 85 PID 4340 wrote to memory of 5008 4340 7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe"C:\Users\Admin\AppData\Local\Temp\7696a68e36b79705404dda918e91505ec64e4a443ced4aeb7df84bbe3a01c481.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\qbmaucvsra.exeqbmaucvsra.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\wcyohppj.exeC:\Windows\system32\wcyohppj.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1108
-
-
-
C:\Windows\SysWOW64\plvqdwrcyuvdbeh.exeplvqdwrcyuvdbeh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4628
-
-
C:\Windows\SysWOW64\wcyohppj.exewcyohppj.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668
-
-
C:\Windows\SysWOW64\qyyczhoavjqww.exeqyyczhoavjqww.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5056
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5008
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5a9e7b47218b04b8894d4540016d95ff5
SHA1713327aae934da69690c269332441a978fbbdb4a
SHA256f9b8c19f18ea1538a37b0e10741dd94320c9e12cd0b87f04c3ac84400b2c3f88
SHA512c6af51b4c18b82d6f690e60e6f118f64c356b9826ba174efb80f0b94d7de431ff982951ddc8b18cb0a5e8b99016e4178ce0e1b4a80361e50c0433de3c310f086
-
Filesize
255KB
MD55a9bf61c82ec7405352f24e846c98c9a
SHA1237ec25c15d0306f56eb6a600afac8ed732e6215
SHA25683631a2e5d96687aa074d08a183c34c3d7a074db61a38847083dcf44f1186d2a
SHA51210f6c7bcab6504619f54401c2120f914151def40833ea005a28bdfa1174aacf177882987684be7acb28b44a714d94e57d5c6a2705eb1de830e133a18eec903fe
-
Filesize
255KB
MD53ef4f4059b392b4e5bf42e8410d16934
SHA13b6e4191e90ae8cf1e88f5a80baba7b56c0eae50
SHA2567492e0fd1a90aaf83d9feea3da001d2611b002c86c10ee9e656a3084f99cef1f
SHA51273fcf4e6cd762d04abf12051d4c22fe0e8418f14088d7975bd556414dda2a7121e3a8368b9f8e4033bd1dc16a085859504dfb41238a3338635237c4320e90376
-
Filesize
255KB
MD538d87ce12d528be5a02058925db55543
SHA1a7b9b47739eb5bd85097f1c30ab15d88f6db2a85
SHA25688c126a28f03ec547dbc493ede45535bc79cb2b3931d7641694515ec8e63d1fc
SHA5127124a596777b49192a3ca84157686fcb35dc4f5b65d39162c9a74e61d7318b58973f5775e9a3eb73ac1864f831b881d58c92df203b09cacb85df97d18a627954
-
Filesize
255KB
MD538d87ce12d528be5a02058925db55543
SHA1a7b9b47739eb5bd85097f1c30ab15d88f6db2a85
SHA25688c126a28f03ec547dbc493ede45535bc79cb2b3931d7641694515ec8e63d1fc
SHA5127124a596777b49192a3ca84157686fcb35dc4f5b65d39162c9a74e61d7318b58973f5775e9a3eb73ac1864f831b881d58c92df203b09cacb85df97d18a627954
-
Filesize
255KB
MD5216fd166a531f91fb017fec3610ebe15
SHA1eda943ba8453117abb9cfe7fb1f8bfaface61d62
SHA2565c60a55f522bda0d3bb2a8d4020b26b2013a1cab3f38d6a27b8531d8953cd7df
SHA5128c31fa181fcbe5dcdee9f474efb24f1c73bd7812078e2d1b4038f4408ccc7526be2b54b189b1f55e59140bedd3091ec87ea13bbcd59725da01b99b6a4dceb20b
-
Filesize
255KB
MD5216fd166a531f91fb017fec3610ebe15
SHA1eda943ba8453117abb9cfe7fb1f8bfaface61d62
SHA2565c60a55f522bda0d3bb2a8d4020b26b2013a1cab3f38d6a27b8531d8953cd7df
SHA5128c31fa181fcbe5dcdee9f474efb24f1c73bd7812078e2d1b4038f4408ccc7526be2b54b189b1f55e59140bedd3091ec87ea13bbcd59725da01b99b6a4dceb20b
-
Filesize
255KB
MD50ef19534bd8f0496e90510686f1c4943
SHA1022234d12b639368123895884d6459f3183bfe99
SHA256aa7a1183a9ad45b7c31de8347b289b89d841da85ccceba9846dcd8cadc3162b2
SHA512f5f39330855dd6417451a96c9d225776b39e4456c98ecef142d1a95788a9bba350434b4f20e49a9e2b7b41921b3801ea6b47ebf73afc48c64c838784c30f7da1
-
Filesize
255KB
MD50ef19534bd8f0496e90510686f1c4943
SHA1022234d12b639368123895884d6459f3183bfe99
SHA256aa7a1183a9ad45b7c31de8347b289b89d841da85ccceba9846dcd8cadc3162b2
SHA512f5f39330855dd6417451a96c9d225776b39e4456c98ecef142d1a95788a9bba350434b4f20e49a9e2b7b41921b3801ea6b47ebf73afc48c64c838784c30f7da1
-
Filesize
255KB
MD517bfbf000fe388d0f892450cc6ab0966
SHA13c7c3019584bd5bca1267f308a2c3e59be591d2a
SHA2569b473c28ab318cac250f4882d93c774932d24f68ee7337299c928f3b67cf7858
SHA5127e52e4ca04713bda73f1732783d71d2f8f654f85aec9095e742ddd761bf9744e4b1253fc5ee03e8310ddf746380a30cb1a9305b7be2e2851aba81eb57537b3ef
-
Filesize
255KB
MD517bfbf000fe388d0f892450cc6ab0966
SHA13c7c3019584bd5bca1267f308a2c3e59be591d2a
SHA2569b473c28ab318cac250f4882d93c774932d24f68ee7337299c928f3b67cf7858
SHA5127e52e4ca04713bda73f1732783d71d2f8f654f85aec9095e742ddd761bf9744e4b1253fc5ee03e8310ddf746380a30cb1a9305b7be2e2851aba81eb57537b3ef
-
Filesize
255KB
MD517bfbf000fe388d0f892450cc6ab0966
SHA13c7c3019584bd5bca1267f308a2c3e59be591d2a
SHA2569b473c28ab318cac250f4882d93c774932d24f68ee7337299c928f3b67cf7858
SHA5127e52e4ca04713bda73f1732783d71d2f8f654f85aec9095e742ddd761bf9744e4b1253fc5ee03e8310ddf746380a30cb1a9305b7be2e2851aba81eb57537b3ef
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5a9e7b47218b04b8894d4540016d95ff5
SHA1713327aae934da69690c269332441a978fbbdb4a
SHA256f9b8c19f18ea1538a37b0e10741dd94320c9e12cd0b87f04c3ac84400b2c3f88
SHA512c6af51b4c18b82d6f690e60e6f118f64c356b9826ba174efb80f0b94d7de431ff982951ddc8b18cb0a5e8b99016e4178ce0e1b4a80361e50c0433de3c310f086