Analysis
-
max time kernel
343s -
max time network
379s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:59
Behavioral task
behavioral1
Sample
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe
Resource
win10v2004-20221111-en
General
-
Target
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe
-
Size
255KB
-
MD5
d1b1341d083a3008b97a28077e52e1c5
-
SHA1
3de7acf39298dec436b6d749ddb27d73a92a9c56
-
SHA256
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98
-
SHA512
4465ef6f31d70321da2a0d88fbee0a18134ff0f964819c0d57be3f2560d2fb44ab0d664854b78eda959a3e663f16c8fc9e74b868f10be7ef918a81000aa610d3
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJa:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIZ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" oyoonrxekp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" oyoonrxekp.exe -
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oyoonrxekp.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" oyoonrxekp.exe -
Executes dropped EXE 5 IoCs
Processes:
oyoonrxekp.exemgkafluwtsthkoh.exegbjhtbxz.exeqfjkpoyzfcwjw.exegbjhtbxz.exepid process 4644 oyoonrxekp.exe 4716 mgkafluwtsthkoh.exe 1480 gbjhtbxz.exe 3520 qfjkpoyzfcwjw.exe 3008 gbjhtbxz.exe -
Processes:
resource yara_rule behavioral2/memory/2840-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\oyoonrxekp.exe upx C:\Windows\SysWOW64\oyoonrxekp.exe upx C:\Windows\SysWOW64\gbjhtbxz.exe upx C:\Windows\SysWOW64\gbjhtbxz.exe upx C:\Windows\SysWOW64\mgkafluwtsthkoh.exe upx C:\Windows\SysWOW64\mgkafluwtsthkoh.exe upx C:\Windows\SysWOW64\qfjkpoyzfcwjw.exe upx C:\Windows\SysWOW64\qfjkpoyzfcwjw.exe upx behavioral2/memory/4644-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4716-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1480-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3520-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2840-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4716-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3520-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gbjhtbxz.exe upx behavioral2/memory/3008-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe -
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" oyoonrxekp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
mgkafluwtsthkoh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run mgkafluwtsthkoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gaoifztg = "oyoonrxekp.exe" mgkafluwtsthkoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rdhsibrl = "mgkafluwtsthkoh.exe" mgkafluwtsthkoh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qfjkpoyzfcwjw.exe" mgkafluwtsthkoh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gbjhtbxz.exeoyoonrxekp.exegbjhtbxz.exedescription ioc process File opened (read-only) \??\q: gbjhtbxz.exe File opened (read-only) \??\z: gbjhtbxz.exe File opened (read-only) \??\b: oyoonrxekp.exe File opened (read-only) \??\r: oyoonrxekp.exe File opened (read-only) \??\h: gbjhtbxz.exe File opened (read-only) \??\e: gbjhtbxz.exe File opened (read-only) \??\h: gbjhtbxz.exe File opened (read-only) \??\n: gbjhtbxz.exe File opened (read-only) \??\s: gbjhtbxz.exe File opened (read-only) \??\k: oyoonrxekp.exe File opened (read-only) \??\l: oyoonrxekp.exe File opened (read-only) \??\j: gbjhtbxz.exe File opened (read-only) \??\r: gbjhtbxz.exe File opened (read-only) \??\s: gbjhtbxz.exe File opened (read-only) \??\v: gbjhtbxz.exe File opened (read-only) \??\f: gbjhtbxz.exe File opened (read-only) \??\m: gbjhtbxz.exe File opened (read-only) \??\i: oyoonrxekp.exe File opened (read-only) \??\p: oyoonrxekp.exe File opened (read-only) \??\t: oyoonrxekp.exe File opened (read-only) \??\z: oyoonrxekp.exe File opened (read-only) \??\g: oyoonrxekp.exe File opened (read-only) \??\n: oyoonrxekp.exe File opened (read-only) \??\n: gbjhtbxz.exe File opened (read-only) \??\i: gbjhtbxz.exe File opened (read-only) \??\o: gbjhtbxz.exe File opened (read-only) \??\i: gbjhtbxz.exe File opened (read-only) \??\r: gbjhtbxz.exe File opened (read-only) \??\a: oyoonrxekp.exe File opened (read-only) \??\e: oyoonrxekp.exe File opened (read-only) \??\h: oyoonrxekp.exe File opened (read-only) \??\s: oyoonrxekp.exe File opened (read-only) \??\a: gbjhtbxz.exe File opened (read-only) \??\g: gbjhtbxz.exe File opened (read-only) \??\g: gbjhtbxz.exe File opened (read-only) \??\o: oyoonrxekp.exe File opened (read-only) \??\y: oyoonrxekp.exe File opened (read-only) \??\b: gbjhtbxz.exe File opened (read-only) \??\m: gbjhtbxz.exe File opened (read-only) \??\q: gbjhtbxz.exe File opened (read-only) \??\y: gbjhtbxz.exe File opened (read-only) \??\m: oyoonrxekp.exe File opened (read-only) \??\v: oyoonrxekp.exe File opened (read-only) \??\b: gbjhtbxz.exe File opened (read-only) \??\w: gbjhtbxz.exe File opened (read-only) \??\w: gbjhtbxz.exe File opened (read-only) \??\u: gbjhtbxz.exe File opened (read-only) \??\y: gbjhtbxz.exe File opened (read-only) \??\u: gbjhtbxz.exe File opened (read-only) \??\f: oyoonrxekp.exe File opened (read-only) \??\u: oyoonrxekp.exe File opened (read-only) \??\k: gbjhtbxz.exe File opened (read-only) \??\o: gbjhtbxz.exe File opened (read-only) \??\p: gbjhtbxz.exe File opened (read-only) \??\j: gbjhtbxz.exe File opened (read-only) \??\t: gbjhtbxz.exe File opened (read-only) \??\q: oyoonrxekp.exe File opened (read-only) \??\w: oyoonrxekp.exe File opened (read-only) \??\x: oyoonrxekp.exe File opened (read-only) \??\a: gbjhtbxz.exe File opened (read-only) \??\t: gbjhtbxz.exe File opened (read-only) \??\l: gbjhtbxz.exe File opened (read-only) \??\x: gbjhtbxz.exe File opened (read-only) \??\k: gbjhtbxz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
oyoonrxekp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" oyoonrxekp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" oyoonrxekp.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2840-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4644-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4716-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1480-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3520-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2840-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4716-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3520-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3008-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exeoyoonrxekp.exedescription ioc process File created C:\Windows\SysWOW64\mgkafluwtsthkoh.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File created C:\Windows\SysWOW64\oyoonrxekp.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File opened for modification C:\Windows\SysWOW64\oyoonrxekp.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File opened for modification C:\Windows\SysWOW64\mgkafluwtsthkoh.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File created C:\Windows\SysWOW64\gbjhtbxz.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File opened for modification C:\Windows\SysWOW64\gbjhtbxz.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File created C:\Windows\SysWOW64\qfjkpoyzfcwjw.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File opened for modification C:\Windows\SysWOW64\qfjkpoyzfcwjw.exe ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll oyoonrxekp.exe -
Drops file in Windows directory 1 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
Processes:
oyoonrxekp.exeff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" oyoonrxekp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs oyoonrxekp.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33372D089C2683506A3277D2772E2CDB7D8565D9" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B12847E439EA52CABAD0339DD4CC" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" oyoonrxekp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB8FACAF966F198830F3B36819E3E96B38B038C42130348E1C542EF08A2" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FFF8482A851A9047D7287E9CBCE7E134594466406334D6EA" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F66BB4FE6B21D1D209D1A48B7D9114" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C6751593DBC3B8CD7CE6ECE734BE" ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh oyoonrxekp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" oyoonrxekp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" oyoonrxekp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exeoyoonrxekp.exegbjhtbxz.exemgkafluwtsthkoh.exeqfjkpoyzfcwjw.exepid process 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exeoyoonrxekp.exegbjhtbxz.exemgkafluwtsthkoh.exeqfjkpoyzfcwjw.exegbjhtbxz.exepid process 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3008 gbjhtbxz.exe 3008 gbjhtbxz.exe 3008 gbjhtbxz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exeoyoonrxekp.exegbjhtbxz.exemgkafluwtsthkoh.exeqfjkpoyzfcwjw.exegbjhtbxz.exepid process 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 4644 oyoonrxekp.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 1480 gbjhtbxz.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 4716 mgkafluwtsthkoh.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3520 qfjkpoyzfcwjw.exe 3008 gbjhtbxz.exe 3008 gbjhtbxz.exe 3008 gbjhtbxz.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exeoyoonrxekp.exedescription pid process target process PID 2840 wrote to memory of 4644 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe oyoonrxekp.exe PID 2840 wrote to memory of 4644 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe oyoonrxekp.exe PID 2840 wrote to memory of 4644 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe oyoonrxekp.exe PID 2840 wrote to memory of 4716 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe mgkafluwtsthkoh.exe PID 2840 wrote to memory of 4716 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe mgkafluwtsthkoh.exe PID 2840 wrote to memory of 4716 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe mgkafluwtsthkoh.exe PID 2840 wrote to memory of 1480 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe gbjhtbxz.exe PID 2840 wrote to memory of 1480 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe gbjhtbxz.exe PID 2840 wrote to memory of 1480 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe gbjhtbxz.exe PID 2840 wrote to memory of 3520 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe qfjkpoyzfcwjw.exe PID 2840 wrote to memory of 3520 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe qfjkpoyzfcwjw.exe PID 2840 wrote to memory of 3520 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe qfjkpoyzfcwjw.exe PID 4644 wrote to memory of 3008 4644 oyoonrxekp.exe gbjhtbxz.exe PID 4644 wrote to memory of 3008 4644 oyoonrxekp.exe gbjhtbxz.exe PID 4644 wrote to memory of 3008 4644 oyoonrxekp.exe gbjhtbxz.exe PID 2840 wrote to memory of 3576 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe WINWORD.EXE PID 2840 wrote to memory of 3576 2840 ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe"C:\Users\Admin\AppData\Local\Temp\ff0c7a781d85d81363f385617476e5199791bc9702c323142ec53b7e839b8f98.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\oyoonrxekp.exeoyoonrxekp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\gbjhtbxz.exeC:\Windows\system32\gbjhtbxz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3008
-
-
-
C:\Windows\SysWOW64\gbjhtbxz.exegbjhtbxz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1480
-
-
C:\Windows\SysWOW64\qfjkpoyzfcwjw.exeqfjkpoyzfcwjw.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3520
-
-
C:\Windows\SysWOW64\mgkafluwtsthkoh.exemgkafluwtsthkoh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4716
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:3576
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5750d5542d9c0ce00dd53b085e579128b
SHA1a7b05fe867027e6664b855e0e6c93e8fd810ae25
SHA256e63074526b43781d26d6cc005c5fda19d9f044d07c60796c6361fd241f52cb9a
SHA51200baa3207a42698f7e5380eaaf2aeb37db8847f3291706126611108c0cb8f59499c3e7d35107d4ba60bf59eb24a6eea22476eb2f4b39a3f91aebe91c8d1fa01e
-
Filesize
255KB
MD5750d5542d9c0ce00dd53b085e579128b
SHA1a7b05fe867027e6664b855e0e6c93e8fd810ae25
SHA256e63074526b43781d26d6cc005c5fda19d9f044d07c60796c6361fd241f52cb9a
SHA51200baa3207a42698f7e5380eaaf2aeb37db8847f3291706126611108c0cb8f59499c3e7d35107d4ba60bf59eb24a6eea22476eb2f4b39a3f91aebe91c8d1fa01e
-
Filesize
255KB
MD5750d5542d9c0ce00dd53b085e579128b
SHA1a7b05fe867027e6664b855e0e6c93e8fd810ae25
SHA256e63074526b43781d26d6cc005c5fda19d9f044d07c60796c6361fd241f52cb9a
SHA51200baa3207a42698f7e5380eaaf2aeb37db8847f3291706126611108c0cb8f59499c3e7d35107d4ba60bf59eb24a6eea22476eb2f4b39a3f91aebe91c8d1fa01e
-
Filesize
255KB
MD54d6917f02aa49b74f5c438297a412bb6
SHA1b688fc8bde0d89c0457d0d901cbaa68ac6139e69
SHA2562df5bb0c0e8d1a7faf4dd708eb2e77c4629b8b2134bd4bf7734835e02c309094
SHA51248f259761cdee039f1c55cf6afba01296d11c15158b0e82137e8880af55c3224e88a52a68d819a09c95b1a52e886624a419a95277b3b8d9d7dc3e90bd9ce2188
-
Filesize
255KB
MD54d6917f02aa49b74f5c438297a412bb6
SHA1b688fc8bde0d89c0457d0d901cbaa68ac6139e69
SHA2562df5bb0c0e8d1a7faf4dd708eb2e77c4629b8b2134bd4bf7734835e02c309094
SHA51248f259761cdee039f1c55cf6afba01296d11c15158b0e82137e8880af55c3224e88a52a68d819a09c95b1a52e886624a419a95277b3b8d9d7dc3e90bd9ce2188
-
Filesize
255KB
MD55dccf1610e57f617ab3bcc0fd3ed178c
SHA1a53c7941971fde4df20b167ec9d2f8aec8927983
SHA25647e8ac55cb5f21d34a82255f9ece2367045491f7b9625279675b2f8bded0444b
SHA512228152b703f5f72db2e27816c6193d12dbeb1b5267cdf17b7b89dee6ff6901f36fdd9564469c5c6cff0794b9a629bd052c7afa854c5df6310d13494e517f582d
-
Filesize
255KB
MD55dccf1610e57f617ab3bcc0fd3ed178c
SHA1a53c7941971fde4df20b167ec9d2f8aec8927983
SHA25647e8ac55cb5f21d34a82255f9ece2367045491f7b9625279675b2f8bded0444b
SHA512228152b703f5f72db2e27816c6193d12dbeb1b5267cdf17b7b89dee6ff6901f36fdd9564469c5c6cff0794b9a629bd052c7afa854c5df6310d13494e517f582d
-
Filesize
255KB
MD5485e6b77d05696621f3576426ab7f138
SHA1aef9a0069a11c4868e0c9e0c6b19ba5271dc8845
SHA256117e4f8631a2cc23a837eeb5aa334140443f7bfaff4c3f2721bf013ce672b6b1
SHA512660dd38c6bfc6eb7678518079ea3bd436247f9f22f73eec956dd050cb0dd45ef898728b296e69390a59dc848dbfb8b96e81929f336d791aede4bff24ab67e4f3
-
Filesize
255KB
MD5485e6b77d05696621f3576426ab7f138
SHA1aef9a0069a11c4868e0c9e0c6b19ba5271dc8845
SHA256117e4f8631a2cc23a837eeb5aa334140443f7bfaff4c3f2721bf013ce672b6b1
SHA512660dd38c6bfc6eb7678518079ea3bd436247f9f22f73eec956dd050cb0dd45ef898728b296e69390a59dc848dbfb8b96e81929f336d791aede4bff24ab67e4f3