Analysis
-
max time kernel
189s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:01
Behavioral task
behavioral1
Sample
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe
Resource
win10v2004-20221111-en
General
-
Target
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe
-
Size
255KB
-
MD5
6a904955e5d93b6249e15884922aed13
-
SHA1
7d34143401e1f7ab5d90a7859a59f9c2e16aaa57
-
SHA256
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac
-
SHA512
526926da856da97ee14d6362fb5658708e76dc5688eae14ad4c29fbe38383dd53dad46ce5796b5be2fe8251b8b9d64dccdc679d3dba3730badfc283b9cc97c83
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJR:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ghibehrqty.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ghibehrqty.exe -
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ghibehrqty.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ghibehrqty.exe -
Executes dropped EXE 5 IoCs
Processes:
ghibehrqty.exehdndzyoqixrtjef.exelilwzxyy.exelmugoautznmam.exelilwzxyy.exepid process 2156 ghibehrqty.exe 4472 hdndzyoqixrtjef.exe 1044 lilwzxyy.exe 4452 lmugoautznmam.exe 4408 lilwzxyy.exe -
Processes:
resource yara_rule behavioral2/memory/4612-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\ghibehrqty.exe upx C:\Windows\SysWOW64\hdndzyoqixrtjef.exe upx C:\Windows\SysWOW64\hdndzyoqixrtjef.exe upx C:\Windows\SysWOW64\lilwzxyy.exe upx C:\Windows\SysWOW64\lilwzxyy.exe upx C:\Windows\SysWOW64\lmugoautznmam.exe upx C:\Windows\SysWOW64\lmugoautznmam.exe upx C:\Windows\SysWOW64\ghibehrqty.exe upx behavioral2/memory/4612-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2156-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\lilwzxyy.exe upx behavioral2/memory/1044-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4472-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4452-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4408-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/2156-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4472-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1044-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4452-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4408-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe -
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ghibehrqty.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
hdndzyoqixrtjef.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zbmsggod = "hdndzyoqixrtjef.exe" hdndzyoqixrtjef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "lmugoautznmam.exe" hdndzyoqixrtjef.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hdndzyoqixrtjef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tvfbnomc = "ghibehrqty.exe" hdndzyoqixrtjef.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lilwzxyy.exelilwzxyy.exeghibehrqty.exedescription ioc process File opened (read-only) \??\n: lilwzxyy.exe File opened (read-only) \??\r: lilwzxyy.exe File opened (read-only) \??\t: lilwzxyy.exe File opened (read-only) \??\k: lilwzxyy.exe File opened (read-only) \??\e: ghibehrqty.exe File opened (read-only) \??\i: ghibehrqty.exe File opened (read-only) \??\m: ghibehrqty.exe File opened (read-only) \??\q: lilwzxyy.exe File opened (read-only) \??\t: lilwzxyy.exe File opened (read-only) \??\b: ghibehrqty.exe File opened (read-only) \??\h: ghibehrqty.exe File opened (read-only) \??\x: ghibehrqty.exe File opened (read-only) \??\x: lilwzxyy.exe File opened (read-only) \??\b: lilwzxyy.exe File opened (read-only) \??\p: lilwzxyy.exe File opened (read-only) \??\z: lilwzxyy.exe File opened (read-only) \??\g: lilwzxyy.exe File opened (read-only) \??\n: lilwzxyy.exe File opened (read-only) \??\e: lilwzxyy.exe File opened (read-only) \??\t: ghibehrqty.exe File opened (read-only) \??\a: lilwzxyy.exe File opened (read-only) \??\e: lilwzxyy.exe File opened (read-only) \??\o: lilwzxyy.exe File opened (read-only) \??\w: lilwzxyy.exe File opened (read-only) \??\k: ghibehrqty.exe File opened (read-only) \??\n: ghibehrqty.exe File opened (read-only) \??\q: ghibehrqty.exe File opened (read-only) \??\m: lilwzxyy.exe File opened (read-only) \??\o: lilwzxyy.exe File opened (read-only) \??\y: lilwzxyy.exe File opened (read-only) \??\l: lilwzxyy.exe File opened (read-only) \??\i: lilwzxyy.exe File opened (read-only) \??\l: ghibehrqty.exe File opened (read-only) \??\r: ghibehrqty.exe File opened (read-only) \??\h: lilwzxyy.exe File opened (read-only) \??\i: lilwzxyy.exe File opened (read-only) \??\j: lilwzxyy.exe File opened (read-only) \??\s: lilwzxyy.exe File opened (read-only) \??\l: lilwzxyy.exe File opened (read-only) \??\p: lilwzxyy.exe File opened (read-only) \??\u: lilwzxyy.exe File opened (read-only) \??\u: ghibehrqty.exe File opened (read-only) \??\y: ghibehrqty.exe File opened (read-only) \??\b: lilwzxyy.exe File opened (read-only) \??\x: lilwzxyy.exe File opened (read-only) \??\v: ghibehrqty.exe File opened (read-only) \??\w: ghibehrqty.exe File opened (read-only) \??\s: lilwzxyy.exe File opened (read-only) \??\z: ghibehrqty.exe File opened (read-only) \??\v: lilwzxyy.exe File opened (read-only) \??\z: lilwzxyy.exe File opened (read-only) \??\g: lilwzxyy.exe File opened (read-only) \??\q: lilwzxyy.exe File opened (read-only) \??\o: ghibehrqty.exe File opened (read-only) \??\p: ghibehrqty.exe File opened (read-only) \??\g: ghibehrqty.exe File opened (read-only) \??\r: lilwzxyy.exe File opened (read-only) \??\v: lilwzxyy.exe File opened (read-only) \??\a: ghibehrqty.exe File opened (read-only) \??\f: ghibehrqty.exe File opened (read-only) \??\j: lilwzxyy.exe File opened (read-only) \??\k: lilwzxyy.exe File opened (read-only) \??\a: lilwzxyy.exe File opened (read-only) \??\f: lilwzxyy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ghibehrqty.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ghibehrqty.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ghibehrqty.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4612-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2156-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1044-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4472-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4452-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4408-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2156-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4472-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1044-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4452-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4408-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exeghibehrqty.exedescription ioc process File opened for modification C:\Windows\SysWOW64\lilwzxyy.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File opened for modification C:\Windows\SysWOW64\lmugoautznmam.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File created C:\Windows\SysWOW64\hdndzyoqixrtjef.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File opened for modification C:\Windows\SysWOW64\hdndzyoqixrtjef.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File created C:\Windows\SysWOW64\lilwzxyy.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ghibehrqty.exe File created C:\Windows\SysWOW64\ghibehrqty.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File opened for modification C:\Windows\SysWOW64\ghibehrqty.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File created C:\Windows\SysWOW64\lmugoautznmam.exe b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe -
Drops file in Program Files directory 14 IoCs
Processes:
lilwzxyy.exelilwzxyy.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lilwzxyy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lilwzxyy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lilwzxyy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lilwzxyy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lilwzxyy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lilwzxyy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lilwzxyy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lilwzxyy.exe -
Drops file in Windows directory 3 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
ghibehrqty.exeb2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ghibehrqty.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ghibehrqty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ghibehrqty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ghibehrqty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C0B9C2083226A4276A777242DDF7CF365AB" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC6081594DBC3B8BA7CE3ED9134CD" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDFAB0F963F1E2847A3A3186ED3E90B0FD03FC4211023DE1C4429E08D3" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFF8A4F5C856F9137D75F7E90BC90E64159326733633FD799" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ghibehrqty.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ghibehrqty.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ghibehrqty.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B15847E2389E52C4B9A1339CD4CF" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F568B3FE1D21DAD27ED0A18A749110" b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4692 WINWORD.EXE 4692 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exehdndzyoqixrtjef.exeghibehrqty.exelmugoautznmam.exelilwzxyy.exelilwzxyy.exepid process 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 4472 hdndzyoqixrtjef.exe 2156 ghibehrqty.exe 4472 hdndzyoqixrtjef.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exehdndzyoqixrtjef.exeghibehrqty.exelilwzxyy.exelmugoautznmam.exelilwzxyy.exepid process 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exehdndzyoqixrtjef.exeghibehrqty.exelilwzxyy.exelmugoautznmam.exelilwzxyy.exepid process 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 4472 hdndzyoqixrtjef.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 2156 ghibehrqty.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 1044 lilwzxyy.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4452 lmugoautznmam.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe 4408 lilwzxyy.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE 4692 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exeghibehrqty.exedescription pid process target process PID 4612 wrote to memory of 2156 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe ghibehrqty.exe PID 4612 wrote to memory of 2156 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe ghibehrqty.exe PID 4612 wrote to memory of 2156 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe ghibehrqty.exe PID 4612 wrote to memory of 4472 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe hdndzyoqixrtjef.exe PID 4612 wrote to memory of 4472 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe hdndzyoqixrtjef.exe PID 4612 wrote to memory of 4472 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe hdndzyoqixrtjef.exe PID 4612 wrote to memory of 1044 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lilwzxyy.exe PID 4612 wrote to memory of 1044 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lilwzxyy.exe PID 4612 wrote to memory of 1044 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lilwzxyy.exe PID 4612 wrote to memory of 4452 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lmugoautznmam.exe PID 4612 wrote to memory of 4452 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lmugoautznmam.exe PID 4612 wrote to memory of 4452 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe lmugoautznmam.exe PID 4612 wrote to memory of 4692 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe WINWORD.EXE PID 4612 wrote to memory of 4692 4612 b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe WINWORD.EXE PID 2156 wrote to memory of 4408 2156 ghibehrqty.exe lilwzxyy.exe PID 2156 wrote to memory of 4408 2156 ghibehrqty.exe lilwzxyy.exe PID 2156 wrote to memory of 4408 2156 ghibehrqty.exe lilwzxyy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe"C:\Users\Admin\AppData\Local\Temp\b2046a50217f1abc5559204d47791c7137637371230737be4340dd9e470835ac.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\ghibehrqty.exeghibehrqty.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\lilwzxyy.exeC:\Windows\system32\lilwzxyy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4408
-
-
-
C:\Windows\SysWOW64\hdndzyoqixrtjef.exehdndzyoqixrtjef.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4472
-
-
C:\Windows\SysWOW64\lilwzxyy.exelilwzxyy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1044
-
-
C:\Windows\SysWOW64\lmugoautznmam.exelmugoautznmam.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4452
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4692
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e616dd373c94dca2867752c0cfdc4b35
SHA17e4384fa27273a3f5ecf516e9216c47b18da6d39
SHA256e73a61ce00e6093a61afa3848bfd980de17a1950e97956d8eec8187ed8ce0f92
SHA5128c86674bb59054b4c5875459a695c955d2aec421883efbc38bfcf8f38d6f51b23e0076297ac8a4ed7de173a3b31b37bc73ec605df41a1d7b0f2db5de01c67bd9
-
Filesize
255KB
MD51d976815d5fe88dfbb3f5baaf11926de
SHA1c4ecaa1e603bb356e2cde3bf62b7dda89d63e522
SHA25652af0bde7d7b6fbb3ac8dc37feddad580ae2de98517e312824343107d5de752c
SHA51248487db9141890128d3ec25df36a52e5f9d1970fba67872f1204f91d9b776d2e6f7d665686d956b552d3cc2ddfd8b9a02b9e0c4a9637fe86e247977b90e32f69
-
Filesize
255KB
MD51d976815d5fe88dfbb3f5baaf11926de
SHA1c4ecaa1e603bb356e2cde3bf62b7dda89d63e522
SHA25652af0bde7d7b6fbb3ac8dc37feddad580ae2de98517e312824343107d5de752c
SHA51248487db9141890128d3ec25df36a52e5f9d1970fba67872f1204f91d9b776d2e6f7d665686d956b552d3cc2ddfd8b9a02b9e0c4a9637fe86e247977b90e32f69
-
Filesize
255KB
MD5d4d9217d89477f0994ff547914018aae
SHA1e27e81447d6299ec17cb67ad383513045b3d5ccd
SHA25666746a7e58cb7606ac6df7f75ab49e9f531f37a2e158e74d6180ac9989ebbc54
SHA5125860625c5ff717c2d4cc6a5901f43b2d822ab19e9ea27e9e45e50ffabaf2aad909cb537991c7a18d3eb848531dfe1def783befe7c46295efc612afdc69bac0e8
-
Filesize
255KB
MD5d4d9217d89477f0994ff547914018aae
SHA1e27e81447d6299ec17cb67ad383513045b3d5ccd
SHA25666746a7e58cb7606ac6df7f75ab49e9f531f37a2e158e74d6180ac9989ebbc54
SHA5125860625c5ff717c2d4cc6a5901f43b2d822ab19e9ea27e9e45e50ffabaf2aad909cb537991c7a18d3eb848531dfe1def783befe7c46295efc612afdc69bac0e8
-
Filesize
255KB
MD55a41d3b6964fc8355d8cff8d6aaf8a97
SHA1331f2f0628f9f97ed305c2e0d78faf9745e224d5
SHA256de6a9f390b817fda3b699786c2e7188da2c2517173d2dd8f3fe705af43098c37
SHA5126d07007f2e2346780a3cb5b34ef49a8764f444f6fb9e601fbc1d3434019dd9dd02ab0676b09da2760bb3e8298ac5a3a130cacbde6f5b0683df59cfc22333a9f7
-
Filesize
255KB
MD55a41d3b6964fc8355d8cff8d6aaf8a97
SHA1331f2f0628f9f97ed305c2e0d78faf9745e224d5
SHA256de6a9f390b817fda3b699786c2e7188da2c2517173d2dd8f3fe705af43098c37
SHA5126d07007f2e2346780a3cb5b34ef49a8764f444f6fb9e601fbc1d3434019dd9dd02ab0676b09da2760bb3e8298ac5a3a130cacbde6f5b0683df59cfc22333a9f7
-
Filesize
255KB
MD55a41d3b6964fc8355d8cff8d6aaf8a97
SHA1331f2f0628f9f97ed305c2e0d78faf9745e224d5
SHA256de6a9f390b817fda3b699786c2e7188da2c2517173d2dd8f3fe705af43098c37
SHA5126d07007f2e2346780a3cb5b34ef49a8764f444f6fb9e601fbc1d3434019dd9dd02ab0676b09da2760bb3e8298ac5a3a130cacbde6f5b0683df59cfc22333a9f7
-
Filesize
255KB
MD53b8fbcae0a56337b6e3dab9099419dea
SHA17bced4b155c42f6470e815aae79f44c1681713a9
SHA256298e5d74fc1e820f40bf01fc9b26ed1acdb9d532a1d9375d9c8edf742a526c41
SHA512b29c7a77cf541b785b66c008172654d269485743682e423503229012535b188e06f54e911bac0878a6130c3e4e2502499390e18df583fb5040e80a8f0a1e03b6
-
Filesize
255KB
MD53b8fbcae0a56337b6e3dab9099419dea
SHA17bced4b155c42f6470e815aae79f44c1681713a9
SHA256298e5d74fc1e820f40bf01fc9b26ed1acdb9d532a1d9375d9c8edf742a526c41
SHA512b29c7a77cf541b785b66c008172654d269485743682e423503229012535b188e06f54e911bac0878a6130c3e4e2502499390e18df583fb5040e80a8f0a1e03b6
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5e616dd373c94dca2867752c0cfdc4b35
SHA17e4384fa27273a3f5ecf516e9216c47b18da6d39
SHA256e73a61ce00e6093a61afa3848bfd980de17a1950e97956d8eec8187ed8ce0f92
SHA5128c86674bb59054b4c5875459a695c955d2aec421883efbc38bfcf8f38d6f51b23e0076297ac8a4ed7de173a3b31b37bc73ec605df41a1d7b0f2db5de01c67bd9