Analysis
-
max time kernel
186s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe
Resource
win10v2004-20221111-en
General
-
Target
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe
-
Size
255KB
-
MD5
f7c1cb4e34afd6d23fce916221b1be97
-
SHA1
eaa65157ace3e49e458ca6647b7e2ebe3a58510b
-
SHA256
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5
-
SHA512
39516139df477d30ccb520a27a267fee5157b35197c8fa6fc50df96821e641b9038e996760523c9a4b97b4b6c3f5312eca255da3305e00b92ec3fcee764aae9d
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJz:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIC
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" emstpkjpyh.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" emstpkjpyh.exe -
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" emstpkjpyh.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" emstpkjpyh.exe -
Executes dropped EXE 5 IoCs
Processes:
emstpkjpyh.exeucqrscqmsmotlov.exeveeuhjpw.exextuczxygpgnvl.exeveeuhjpw.exepid process 3600 emstpkjpyh.exe 3608 ucqrscqmsmotlov.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 5096 veeuhjpw.exe -
Processes:
resource yara_rule behavioral2/memory/3456-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\emstpkjpyh.exe upx C:\Windows\SysWOW64\emstpkjpyh.exe upx C:\Windows\SysWOW64\ucqrscqmsmotlov.exe upx C:\Windows\SysWOW64\ucqrscqmsmotlov.exe upx behavioral2/memory/3600-139-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3608-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\veeuhjpw.exe upx C:\Windows\SysWOW64\xtuczxygpgnvl.exe upx C:\Windows\SysWOW64\veeuhjpw.exe upx C:\Windows\SysWOW64\xtuczxygpgnvl.exe upx C:\Windows\SysWOW64\veeuhjpw.exe upx behavioral2/memory/808-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4640-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5096-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3456-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx behavioral2/memory/3600-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3608-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/808-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4640-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5096-169-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe -
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" emstpkjpyh.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ucqrscqmsmotlov.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xtuczxygpgnvl.exe" ucqrscqmsmotlov.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ucqrscqmsmotlov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\icewkmnz = "emstpkjpyh.exe" ucqrscqmsmotlov.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\muozrdjq = "ucqrscqmsmotlov.exe" ucqrscqmsmotlov.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
veeuhjpw.exeveeuhjpw.exeemstpkjpyh.exedescription ioc process File opened (read-only) \??\v: veeuhjpw.exe File opened (read-only) \??\z: veeuhjpw.exe File opened (read-only) \??\f: veeuhjpw.exe File opened (read-only) \??\i: veeuhjpw.exe File opened (read-only) \??\x: veeuhjpw.exe File opened (read-only) \??\o: veeuhjpw.exe File opened (read-only) \??\w: veeuhjpw.exe File opened (read-only) \??\a: emstpkjpyh.exe File opened (read-only) \??\h: emstpkjpyh.exe File opened (read-only) \??\m: veeuhjpw.exe File opened (read-only) \??\j: veeuhjpw.exe File opened (read-only) \??\l: veeuhjpw.exe File opened (read-only) \??\u: veeuhjpw.exe File opened (read-only) \??\n: veeuhjpw.exe File opened (read-only) \??\r: veeuhjpw.exe File opened (read-only) \??\b: emstpkjpyh.exe File opened (read-only) \??\i: emstpkjpyh.exe File opened (read-only) \??\e: veeuhjpw.exe File opened (read-only) \??\m: emstpkjpyh.exe File opened (read-only) \??\n: veeuhjpw.exe File opened (read-only) \??\q: veeuhjpw.exe File opened (read-only) \??\s: veeuhjpw.exe File opened (read-only) \??\t: veeuhjpw.exe File opened (read-only) \??\u: veeuhjpw.exe File opened (read-only) \??\y: veeuhjpw.exe File opened (read-only) \??\f: emstpkjpyh.exe File opened (read-only) \??\g: emstpkjpyh.exe File opened (read-only) \??\p: emstpkjpyh.exe File opened (read-only) \??\q: emstpkjpyh.exe File opened (read-only) \??\a: veeuhjpw.exe File opened (read-only) \??\j: emstpkjpyh.exe File opened (read-only) \??\i: veeuhjpw.exe File opened (read-only) \??\r: veeuhjpw.exe File opened (read-only) \??\p: veeuhjpw.exe File opened (read-only) \??\z: veeuhjpw.exe File opened (read-only) \??\s: veeuhjpw.exe File opened (read-only) \??\h: veeuhjpw.exe File opened (read-only) \??\q: veeuhjpw.exe File opened (read-only) \??\e: emstpkjpyh.exe File opened (read-only) \??\r: emstpkjpyh.exe File opened (read-only) \??\v: emstpkjpyh.exe File opened (read-only) \??\z: emstpkjpyh.exe File opened (read-only) \??\a: veeuhjpw.exe File opened (read-only) \??\u: emstpkjpyh.exe File opened (read-only) \??\b: veeuhjpw.exe File opened (read-only) \??\b: veeuhjpw.exe File opened (read-only) \??\v: veeuhjpw.exe File opened (read-only) \??\m: veeuhjpw.exe File opened (read-only) \??\t: veeuhjpw.exe File opened (read-only) \??\k: emstpkjpyh.exe File opened (read-only) \??\w: emstpkjpyh.exe File opened (read-only) \??\h: veeuhjpw.exe File opened (read-only) \??\k: veeuhjpw.exe File opened (read-only) \??\w: veeuhjpw.exe File opened (read-only) \??\l: emstpkjpyh.exe File opened (read-only) \??\o: emstpkjpyh.exe File opened (read-only) \??\t: emstpkjpyh.exe File opened (read-only) \??\j: veeuhjpw.exe File opened (read-only) \??\y: veeuhjpw.exe File opened (read-only) \??\n: emstpkjpyh.exe File opened (read-only) \??\x: emstpkjpyh.exe File opened (read-only) \??\x: veeuhjpw.exe File opened (read-only) \??\f: veeuhjpw.exe File opened (read-only) \??\s: emstpkjpyh.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
emstpkjpyh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" emstpkjpyh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" emstpkjpyh.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3456-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3600-139-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3608-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/808-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4640-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5096-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3456-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3600-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3608-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/808-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4640-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5096-169-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exeemstpkjpyh.exedescription ioc process File created C:\Windows\SysWOW64\emstpkjpyh.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File created C:\Windows\SysWOW64\ucqrscqmsmotlov.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\SysWOW64\veeuhjpw.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\SysWOW64\xtuczxygpgnvl.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\SysWOW64\emstpkjpyh.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\SysWOW64\ucqrscqmsmotlov.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File created C:\Windows\SysWOW64\veeuhjpw.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File created C:\Windows\SysWOW64\xtuczxygpgnvl.exe 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll emstpkjpyh.exe -
Drops file in Program Files directory 15 IoCs
Processes:
veeuhjpw.exeveeuhjpw.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal veeuhjpw.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal veeuhjpw.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal veeuhjpw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe veeuhjpw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe veeuhjpw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe veeuhjpw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe veeuhjpw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe veeuhjpw.exe -
Drops file in Windows directory 3 IoCs
Processes:
WINWORD.EXE8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exedescription ioc process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
emstpkjpyh.exe8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" emstpkjpyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh emstpkjpyh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" emstpkjpyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs emstpkjpyh.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462C0C9D5182206D4576A270552DDE7C8764A8" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B12F4792389853BDBAA733EED4BE" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7816BB6FE1822DFD27BD0A38A0C9060" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" emstpkjpyh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC77415EDDBB1B9BD7CE0ED9437C8" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf emstpkjpyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg emstpkjpyh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCFFACEFE17F2E084083B42819A39E3B38C02F94367023DE1B942EF09D3" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" emstpkjpyh.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" emstpkjpyh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FC834F5C85129032D62F7E9CBD95E632594067326241D798" 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat emstpkjpyh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc emstpkjpyh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" emstpkjpyh.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 632 WINWORD.EXE 632 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exeemstpkjpyh.exeucqrscqmsmotlov.exeveeuhjpw.exextuczxygpgnvl.exeveeuhjpw.exepid process 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 4640 xtuczxygpgnvl.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exeemstpkjpyh.exeucqrscqmsmotlov.exextuczxygpgnvl.exeveeuhjpw.exeveeuhjpw.exepid process 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exeemstpkjpyh.exeucqrscqmsmotlov.exextuczxygpgnvl.exeveeuhjpw.exeveeuhjpw.exepid process 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3600 emstpkjpyh.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 3608 ucqrscqmsmotlov.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 4640 xtuczxygpgnvl.exe 808 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe 5096 veeuhjpw.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE 632 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exeucqrscqmsmotlov.exeemstpkjpyh.exedescription pid process target process PID 3456 wrote to memory of 3600 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe emstpkjpyh.exe PID 3456 wrote to memory of 3600 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe emstpkjpyh.exe PID 3456 wrote to memory of 3600 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe emstpkjpyh.exe PID 3456 wrote to memory of 3608 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe ucqrscqmsmotlov.exe PID 3456 wrote to memory of 3608 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe ucqrscqmsmotlov.exe PID 3456 wrote to memory of 3608 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe ucqrscqmsmotlov.exe PID 3608 wrote to memory of 932 3608 ucqrscqmsmotlov.exe cmd.exe PID 3608 wrote to memory of 932 3608 ucqrscqmsmotlov.exe cmd.exe PID 3608 wrote to memory of 932 3608 ucqrscqmsmotlov.exe cmd.exe PID 3456 wrote to memory of 808 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe veeuhjpw.exe PID 3456 wrote to memory of 808 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe veeuhjpw.exe PID 3456 wrote to memory of 808 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe veeuhjpw.exe PID 3456 wrote to memory of 4640 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe xtuczxygpgnvl.exe PID 3456 wrote to memory of 4640 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe xtuczxygpgnvl.exe PID 3456 wrote to memory of 4640 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe xtuczxygpgnvl.exe PID 3600 wrote to memory of 5096 3600 emstpkjpyh.exe veeuhjpw.exe PID 3600 wrote to memory of 5096 3600 emstpkjpyh.exe veeuhjpw.exe PID 3600 wrote to memory of 5096 3600 emstpkjpyh.exe veeuhjpw.exe PID 3456 wrote to memory of 632 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe WINWORD.EXE PID 3456 wrote to memory of 632 3456 8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe"C:\Users\Admin\AppData\Local\Temp\8397bc1ad6e62e8dc6c71e087dd82ccaa811889baf9f3a317721f396846c75f5.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\emstpkjpyh.exeemstpkjpyh.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\veeuhjpw.exeC:\Windows\system32\veeuhjpw.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5096 -
C:\Windows\SysWOW64\ucqrscqmsmotlov.exeucqrscqmsmotlov.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\cmd.execmd.exe /c xtuczxygpgnvl.exe3⤵PID:932
-
C:\Windows\SysWOW64\veeuhjpw.exeveeuhjpw.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:808 -
C:\Windows\SysWOW64\xtuczxygpgnvl.exextuczxygpgnvl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4640 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:632
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD58063182e0445e141f1aa3a0a1765c0b4
SHA182d1818786ffe7b8c6a53d9be78057bd55c90ad7
SHA256f797b1d121353b26e0b1b503dd431e2e27c9951ebd4a82adef8a5521fa414884
SHA51256bec1d94219e735c29c20fc8ce8407ff02e5b3d746e5fac8e48cff490d18cfe5cd115d104eaea4ce0ab281645071ae2b79ecdcb02ba4e9ff41ef6747a7a5976
-
Filesize
255KB
MD5a0b8a2e1fab5d8962e647fc2a291a9bf
SHA160464e46147610665760a85414a1843c2eb58ad5
SHA256c557e745aa8882f011a1f8eec686c5d27cf08a94f81f06ae65333dd2c3a6db0f
SHA512e5584bdb4966e3c8ae91996a4554ccc281e0e85a02eb85b691d19922ca95042d29d5b26080784c4c0e567ac36e27a00ef84ed6aa9e9acfea5325f46474a57400
-
Filesize
255KB
MD5a0b8a2e1fab5d8962e647fc2a291a9bf
SHA160464e46147610665760a85414a1843c2eb58ad5
SHA256c557e745aa8882f011a1f8eec686c5d27cf08a94f81f06ae65333dd2c3a6db0f
SHA512e5584bdb4966e3c8ae91996a4554ccc281e0e85a02eb85b691d19922ca95042d29d5b26080784c4c0e567ac36e27a00ef84ed6aa9e9acfea5325f46474a57400
-
Filesize
255KB
MD5bdc4a20074ec4646e80b926f586886b7
SHA10200cf35c11ab5dace27897ef04af48035e2e9ba
SHA256719d39ca2780151c9766dc4037435d1704cdfc9a0da1ea744105236e14d4620e
SHA5126c3bd659a3534af80d4567635a36b19f5fa19247ac782a3f60467a4a8f589ca06dd769313380857f31dbe20ef6fe2b31c45ac99bfea0cdfa15ff3ec415f2a7a0
-
Filesize
255KB
MD5bdc4a20074ec4646e80b926f586886b7
SHA10200cf35c11ab5dace27897ef04af48035e2e9ba
SHA256719d39ca2780151c9766dc4037435d1704cdfc9a0da1ea744105236e14d4620e
SHA5126c3bd659a3534af80d4567635a36b19f5fa19247ac782a3f60467a4a8f589ca06dd769313380857f31dbe20ef6fe2b31c45ac99bfea0cdfa15ff3ec415f2a7a0
-
Filesize
255KB
MD525fd693bcbed6e24e3ed31c5a5f222a8
SHA12f9f6781dfbc51e89a084b3c2b87d4670e3a9c0e
SHA256baa74c1c3e1a86aa2bd1f90e4196196a56796ca547f1db1d0c74c52a70f83b06
SHA512a700631f6cf06d343da47fc110b17690f0cc2c67f4ad3ab09bcfefd317bef7966300fb9ee94eb9081ac011389a88016baf30a4ec9bdd270f9937769703b87442
-
Filesize
255KB
MD525fd693bcbed6e24e3ed31c5a5f222a8
SHA12f9f6781dfbc51e89a084b3c2b87d4670e3a9c0e
SHA256baa74c1c3e1a86aa2bd1f90e4196196a56796ca547f1db1d0c74c52a70f83b06
SHA512a700631f6cf06d343da47fc110b17690f0cc2c67f4ad3ab09bcfefd317bef7966300fb9ee94eb9081ac011389a88016baf30a4ec9bdd270f9937769703b87442
-
Filesize
255KB
MD525fd693bcbed6e24e3ed31c5a5f222a8
SHA12f9f6781dfbc51e89a084b3c2b87d4670e3a9c0e
SHA256baa74c1c3e1a86aa2bd1f90e4196196a56796ca547f1db1d0c74c52a70f83b06
SHA512a700631f6cf06d343da47fc110b17690f0cc2c67f4ad3ab09bcfefd317bef7966300fb9ee94eb9081ac011389a88016baf30a4ec9bdd270f9937769703b87442
-
Filesize
255KB
MD545283f11fe43f794d566acf73df17812
SHA1e78c154ff38af4c9b80782c67786ca13ae821792
SHA2567e192a35bab67e5527ff051760c7e60e74eccc7ebfe8a9149505a9431234754d
SHA5120e4b912bdfc0738aad46e9d4f2b016574b3bf209e39370a5815514cea6a1f58cf3360fbe0dbb29a258f46c8aca1c3cacd13e80cfda263ae6111210b7c614b2da
-
Filesize
255KB
MD545283f11fe43f794d566acf73df17812
SHA1e78c154ff38af4c9b80782c67786ca13ae821792
SHA2567e192a35bab67e5527ff051760c7e60e74eccc7ebfe8a9149505a9431234754d
SHA5120e4b912bdfc0738aad46e9d4f2b016574b3bf209e39370a5815514cea6a1f58cf3360fbe0dbb29a258f46c8aca1c3cacd13e80cfda263ae6111210b7c614b2da
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD52ca4f0c9cc5afcf57058f5e8bdaf312c
SHA193f3f683d56066e79fa2beb911613be7b054b0b7
SHA256aedf3072e68dc51ca83535c731cc9c893c97084529b7755b9bf61fd4be160bf6
SHA5121512a715c23848155150c5a0f84ef2db21302677f0c5bb9b13a65f64f9db082471a5ce671f98c7b3dbc05f403c71e2a63c028226fc890eaabd171fa8a152109d