Analysis
-
max time kernel
210s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:02
Behavioral task
behavioral1
Sample
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe
Resource
win10v2004-20221111-en
General
-
Target
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe
-
Size
255KB
-
MD5
1fa7b053eb181dfa0c1632fb7a8eab99
-
SHA1
bad62dbd43017abc28d42ec120f30b19c3d7dab8
-
SHA256
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d
-
SHA512
fd471195b9c47ef3649eb40a5102fce146e323ce1cf071d28138016749759032281dfbd7179845afe9b937369a961a6d346a665c96e5424fc03c11ef49cd6e57
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJh:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" iwgzpbcmrn.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iwgzpbcmrn.exe -
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" iwgzpbcmrn.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iwgzpbcmrn.exe -
Executes dropped EXE 5 IoCs
Processes:
iwgzpbcmrn.exenydglpcdoskfaqb.exefzzqbedz.exeiucoahdlhzekh.exefzzqbedz.exepid process 2744 iwgzpbcmrn.exe 3048 nydglpcdoskfaqb.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4992 fzzqbedz.exe -
Processes:
resource yara_rule behavioral2/memory/1420-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\iwgzpbcmrn.exe upx C:\Windows\SysWOW64\iwgzpbcmrn.exe upx C:\Windows\SysWOW64\nydglpcdoskfaqb.exe upx C:\Windows\SysWOW64\nydglpcdoskfaqb.exe upx C:\Windows\SysWOW64\fzzqbedz.exe upx C:\Windows\SysWOW64\iucoahdlhzekh.exe upx C:\Windows\SysWOW64\fzzqbedz.exe upx C:\Windows\SysWOW64\iucoahdlhzekh.exe upx behavioral2/memory/2744-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3048-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3320-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4516-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1420-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3048-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3320-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4516-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\fzzqbedz.exe upx behavioral2/memory/4992-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4992-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1420-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe -
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" iwgzpbcmrn.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
nydglpcdoskfaqb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "iucoahdlhzekh.exe" nydglpcdoskfaqb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run nydglpcdoskfaqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uybentyr = "iwgzpbcmrn.exe" nydglpcdoskfaqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\omtenrzi = "nydglpcdoskfaqb.exe" nydglpcdoskfaqb.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
fzzqbedz.exefzzqbedz.exeiwgzpbcmrn.exedescription ioc process File opened (read-only) \??\f: fzzqbedz.exe File opened (read-only) \??\q: fzzqbedz.exe File opened (read-only) \??\t: fzzqbedz.exe File opened (read-only) \??\u: fzzqbedz.exe File opened (read-only) \??\x: fzzqbedz.exe File opened (read-only) \??\i: fzzqbedz.exe File opened (read-only) \??\m: fzzqbedz.exe File opened (read-only) \??\o: iwgzpbcmrn.exe File opened (read-only) \??\z: iwgzpbcmrn.exe File opened (read-only) \??\h: fzzqbedz.exe File opened (read-only) \??\j: fzzqbedz.exe File opened (read-only) \??\g: iwgzpbcmrn.exe File opened (read-only) \??\h: iwgzpbcmrn.exe File opened (read-only) \??\p: iwgzpbcmrn.exe File opened (read-only) \??\u: iwgzpbcmrn.exe File opened (read-only) \??\n: fzzqbedz.exe File opened (read-only) \??\t: iwgzpbcmrn.exe File opened (read-only) \??\h: fzzqbedz.exe File opened (read-only) \??\k: fzzqbedz.exe File opened (read-only) \??\v: fzzqbedz.exe File opened (read-only) \??\b: iwgzpbcmrn.exe File opened (read-only) \??\b: fzzqbedz.exe File opened (read-only) \??\l: fzzqbedz.exe File opened (read-only) \??\r: iwgzpbcmrn.exe File opened (read-only) \??\i: iwgzpbcmrn.exe File opened (read-only) \??\x: iwgzpbcmrn.exe File opened (read-only) \??\l: fzzqbedz.exe File opened (read-only) \??\r: fzzqbedz.exe File opened (read-only) \??\e: iwgzpbcmrn.exe File opened (read-only) \??\e: fzzqbedz.exe File opened (read-only) \??\g: fzzqbedz.exe File opened (read-only) \??\s: fzzqbedz.exe File opened (read-only) \??\u: fzzqbedz.exe File opened (read-only) \??\v: fzzqbedz.exe File opened (read-only) \??\p: fzzqbedz.exe File opened (read-only) \??\x: fzzqbedz.exe File opened (read-only) \??\z: fzzqbedz.exe File opened (read-only) \??\s: fzzqbedz.exe File opened (read-only) \??\m: iwgzpbcmrn.exe File opened (read-only) \??\y: iwgzpbcmrn.exe File opened (read-only) \??\z: fzzqbedz.exe File opened (read-only) \??\g: fzzqbedz.exe File opened (read-only) \??\r: fzzqbedz.exe File opened (read-only) \??\j: iwgzpbcmrn.exe File opened (read-only) \??\v: iwgzpbcmrn.exe File opened (read-only) \??\b: fzzqbedz.exe File opened (read-only) \??\y: fzzqbedz.exe File opened (read-only) \??\o: fzzqbedz.exe File opened (read-only) \??\f: fzzqbedz.exe File opened (read-only) \??\i: fzzqbedz.exe File opened (read-only) \??\o: fzzqbedz.exe File opened (read-only) \??\w: fzzqbedz.exe File opened (read-only) \??\n: fzzqbedz.exe File opened (read-only) \??\y: fzzqbedz.exe File opened (read-only) \??\w: iwgzpbcmrn.exe File opened (read-only) \??\a: fzzqbedz.exe File opened (read-only) \??\p: fzzqbedz.exe File opened (read-only) \??\t: fzzqbedz.exe File opened (read-only) \??\f: iwgzpbcmrn.exe File opened (read-only) \??\j: fzzqbedz.exe File opened (read-only) \??\m: fzzqbedz.exe File opened (read-only) \??\q: fzzqbedz.exe File opened (read-only) \??\a: fzzqbedz.exe File opened (read-only) \??\e: fzzqbedz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
iwgzpbcmrn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" iwgzpbcmrn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" iwgzpbcmrn.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2744-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3048-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3320-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4516-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1420-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3048-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3320-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4516-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4992-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4992-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1420-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeiwgzpbcmrn.exedescription ioc process File opened for modification C:\Windows\SysWOW64\iucoahdlhzekh.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File created C:\Windows\SysWOW64\iwgzpbcmrn.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File opened for modification C:\Windows\SysWOW64\iwgzpbcmrn.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File created C:\Windows\SysWOW64\nydglpcdoskfaqb.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File created C:\Windows\SysWOW64\fzzqbedz.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File opened for modification C:\Windows\SysWOW64\nydglpcdoskfaqb.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File opened for modification C:\Windows\SysWOW64\fzzqbedz.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File created C:\Windows\SysWOW64\iucoahdlhzekh.exe 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll iwgzpbcmrn.exe -
Drops file in Program Files directory 14 IoCs
Processes:
fzzqbedz.exefzzqbedz.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fzzqbedz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fzzqbedz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe fzzqbedz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fzzqbedz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fzzqbedz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fzzqbedz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe fzzqbedz.exe -
Drops file in Windows directory 3 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
iwgzpbcmrn.exe9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iwgzpbcmrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf iwgzpbcmrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iwgzpbcmrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" iwgzpbcmrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBF9BDF910F1E7837C3A4186983995B080038C4363033FE1CF459A08A8" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B02044E438E353CCBAD732EAD4CC" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F468C3FE6621DDD27ED1D18B099013" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs iwgzpbcmrn.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat iwgzpbcmrn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg iwgzpbcmrn.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33352D7F9C5582556D4576D270252CAC7CF564D7" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF8FC82485A851E9140D72F7D91BDE1E143583667426335D79C" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184FC67C14E6DABEB8CA7FE6EC9434B9" 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4424 WINWORD.EXE 4424 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeiwgzpbcmrn.exenydglpcdoskfaqb.exefzzqbedz.exeiucoahdlhzekh.exepid process 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 4516 iucoahdlhzekh.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeiwgzpbcmrn.exenydglpcdoskfaqb.exefzzqbedz.exeiucoahdlhzekh.exefzzqbedz.exepid process 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4992 fzzqbedz.exe 4992 fzzqbedz.exe 4992 fzzqbedz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeiwgzpbcmrn.exenydglpcdoskfaqb.exefzzqbedz.exeiucoahdlhzekh.exefzzqbedz.exepid process 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 2744 iwgzpbcmrn.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3048 nydglpcdoskfaqb.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 3320 fzzqbedz.exe 4516 iucoahdlhzekh.exe 4992 fzzqbedz.exe 4992 fzzqbedz.exe 4992 fzzqbedz.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4424 WINWORD.EXE 4424 WINWORD.EXE 4424 WINWORD.EXE 4424 WINWORD.EXE 4424 WINWORD.EXE 4424 WINWORD.EXE 4424 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exeiwgzpbcmrn.exedescription pid process target process PID 1420 wrote to memory of 2744 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iwgzpbcmrn.exe PID 1420 wrote to memory of 2744 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iwgzpbcmrn.exe PID 1420 wrote to memory of 2744 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iwgzpbcmrn.exe PID 1420 wrote to memory of 3048 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe nydglpcdoskfaqb.exe PID 1420 wrote to memory of 3048 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe nydglpcdoskfaqb.exe PID 1420 wrote to memory of 3048 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe nydglpcdoskfaqb.exe PID 1420 wrote to memory of 3320 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe fzzqbedz.exe PID 1420 wrote to memory of 3320 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe fzzqbedz.exe PID 1420 wrote to memory of 3320 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe fzzqbedz.exe PID 1420 wrote to memory of 4516 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iucoahdlhzekh.exe PID 1420 wrote to memory of 4516 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iucoahdlhzekh.exe PID 1420 wrote to memory of 4516 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe iucoahdlhzekh.exe PID 2744 wrote to memory of 4992 2744 iwgzpbcmrn.exe fzzqbedz.exe PID 2744 wrote to memory of 4992 2744 iwgzpbcmrn.exe fzzqbedz.exe PID 2744 wrote to memory of 4992 2744 iwgzpbcmrn.exe fzzqbedz.exe PID 1420 wrote to memory of 4424 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe WINWORD.EXE PID 1420 wrote to memory of 4424 1420 9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe"C:\Users\Admin\AppData\Local\Temp\9a882fc1b4bef5d6e11239ed875c9bd8e51a0f593039485e7ba37cc701f5c45d.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\iwgzpbcmrn.exeiwgzpbcmrn.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\fzzqbedz.exeC:\Windows\system32\fzzqbedz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\nydglpcdoskfaqb.exenydglpcdoskfaqb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\fzzqbedz.exefzzqbedz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\iucoahdlhzekh.exeiucoahdlhzekh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hidden Files and Directories
2Modify Registry
6Disabling Security Tools
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exeFilesize
255KB
MD5d8c1543aaa78af0b63c36289801b13d2
SHA15c7e0b8bdebcb784b0b3b5e955a9fd0bb4cbe6df
SHA256b5f80962ae9f64e3c06d83e7366035d3db5135fb6d6310bfcffe404f8d94c94a
SHA5121830502d85c229e4596b339b230d514a9cdba2e068ee947905d332741138f2b4157dc98b81d7c8c520667732112dea016b2f65b65bb9f7568c665b7a111455d7
-
C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exeFilesize
255KB
MD5d269e6347571d14c56a08d7f7b8b75b0
SHA1670fa1ec347943a45a37b5a3926145e687b1301d
SHA256d7c54cb95e03b9b876811daa867f751ee9a503313165811b26e0f95872a60c64
SHA512365bd29f84e69b88f0ffa97e4db509b8a04733332d45f8674c6b52629f9ac14bab353de64761ef87f6922111d2102725051d7e46d422c3479cc4c21b36b6f048
-
C:\Windows\SysWOW64\fzzqbedz.exeFilesize
255KB
MD54c368ad0434283a3e320378969db017b
SHA1c54202214999dbfd5d55a6fd01e0e44906b75570
SHA2565c64ecfa3ef7be86e235ba5aa41d4b7a63dc90ec2a41e54b3664b19d15083475
SHA51269f9dc8e9de5a4b8d25240a7b11dee79ba7a937ebcb7014f543db6270c1e47dc4ac73598fb9c7825e0319d93be0549fd7a25a227f02729055e5b97af341fe821
-
C:\Windows\SysWOW64\fzzqbedz.exeFilesize
255KB
MD54c368ad0434283a3e320378969db017b
SHA1c54202214999dbfd5d55a6fd01e0e44906b75570
SHA2565c64ecfa3ef7be86e235ba5aa41d4b7a63dc90ec2a41e54b3664b19d15083475
SHA51269f9dc8e9de5a4b8d25240a7b11dee79ba7a937ebcb7014f543db6270c1e47dc4ac73598fb9c7825e0319d93be0549fd7a25a227f02729055e5b97af341fe821
-
C:\Windows\SysWOW64\fzzqbedz.exeFilesize
255KB
MD54c368ad0434283a3e320378969db017b
SHA1c54202214999dbfd5d55a6fd01e0e44906b75570
SHA2565c64ecfa3ef7be86e235ba5aa41d4b7a63dc90ec2a41e54b3664b19d15083475
SHA51269f9dc8e9de5a4b8d25240a7b11dee79ba7a937ebcb7014f543db6270c1e47dc4ac73598fb9c7825e0319d93be0549fd7a25a227f02729055e5b97af341fe821
-
C:\Windows\SysWOW64\iucoahdlhzekh.exeFilesize
255KB
MD50cdf83bc6e593dbe43a69dcde6d47f3e
SHA1501d56e7b2b5146d59e26158afd97ac1258e2473
SHA2562343444c9b20e15af80506a8d0ae896a45da517c65830b1f0a0ad390ac84f07f
SHA5125f1a89e725fd0e10d05daa15c1fe84d6352db32989f34c6224f08feeea7c04ef16ae59b6cbb18c0b69a20873b439dd67376647db5ab1d2285c118fbd9db73e97
-
C:\Windows\SysWOW64\iucoahdlhzekh.exeFilesize
255KB
MD50cdf83bc6e593dbe43a69dcde6d47f3e
SHA1501d56e7b2b5146d59e26158afd97ac1258e2473
SHA2562343444c9b20e15af80506a8d0ae896a45da517c65830b1f0a0ad390ac84f07f
SHA5125f1a89e725fd0e10d05daa15c1fe84d6352db32989f34c6224f08feeea7c04ef16ae59b6cbb18c0b69a20873b439dd67376647db5ab1d2285c118fbd9db73e97
-
C:\Windows\SysWOW64\iwgzpbcmrn.exeFilesize
255KB
MD5faf183b6e9c8e64b582dcbaf142a5388
SHA1c2d83e1f213baee41366361236bf2701315418c2
SHA25640e0c99ccf44ee16b54f3e5cb1920e2adb6240bfd9f6447cdef8ab099fdaa184
SHA512b5bf4c6f81b144234d30c93148dc36171568443a140b156f872e555d33e4efd567d32089bf40669528d7d76420df389e0b85c9c5bba6ad7821febce3844268e2
-
C:\Windows\SysWOW64\iwgzpbcmrn.exeFilesize
255KB
MD5faf183b6e9c8e64b582dcbaf142a5388
SHA1c2d83e1f213baee41366361236bf2701315418c2
SHA25640e0c99ccf44ee16b54f3e5cb1920e2adb6240bfd9f6447cdef8ab099fdaa184
SHA512b5bf4c6f81b144234d30c93148dc36171568443a140b156f872e555d33e4efd567d32089bf40669528d7d76420df389e0b85c9c5bba6ad7821febce3844268e2
-
C:\Windows\SysWOW64\nydglpcdoskfaqb.exeFilesize
255KB
MD5ae7ae6421694ad04f885fa042f9d8903
SHA1e0eb2410dd6196b11485f03c87f6e998973a4879
SHA256b06f61e8821593323ce0928afb7584a5b97c2f5015b72e037483518be2ed99d5
SHA512f19f7152e0ff1e7922e8ebb8d068f6e70625f9d96ea4f7007f0c90fe36ee266cb696b66d0fb29c2e6649a95542a67f3f875eeb2330b587c404d5892bf0eee2cb
-
C:\Windows\SysWOW64\nydglpcdoskfaqb.exeFilesize
255KB
MD5ae7ae6421694ad04f885fa042f9d8903
SHA1e0eb2410dd6196b11485f03c87f6e998973a4879
SHA256b06f61e8821593323ce0928afb7584a5b97c2f5015b72e037483518be2ed99d5
SHA512f19f7152e0ff1e7922e8ebb8d068f6e70625f9d96ea4f7007f0c90fe36ee266cb696b66d0fb29c2e6649a95542a67f3f875eeb2330b587c404d5892bf0eee2cb
-
C:\Windows\mydoc.rtfFilesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
memory/1420-158-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1420-149-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1420-132-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/2744-145-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/2744-133-0x0000000000000000-mapping.dmp
-
memory/3048-146-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3048-150-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3048-136-0x0000000000000000-mapping.dmp
-
memory/3320-147-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3320-151-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3320-139-0x0000000000000000-mapping.dmp
-
memory/4424-171-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-167-0x00007FFB51AB0000-0x00007FFB51AC0000-memory.dmpFilesize
64KB
-
memory/4424-157-0x0000000000000000-mapping.dmp
-
memory/4424-170-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-159-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-160-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-161-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-162-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-163-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-164-0x00007FFB51AB0000-0x00007FFB51AC0000-memory.dmpFilesize
64KB
-
memory/4424-172-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4424-173-0x00007FFB54410000-0x00007FFB54420000-memory.dmpFilesize
64KB
-
memory/4516-141-0x0000000000000000-mapping.dmp
-
memory/4516-152-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4516-148-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4992-156-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4992-155-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4992-153-0x0000000000000000-mapping.dmp