Analysis
-
max time kernel
158s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:02
Behavioral task
behavioral1
Sample
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe
Resource
win7-20220812-en
General
-
Target
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe
-
Size
255KB
-
MD5
5d634f5d3bd9fd9d8c3fcbcc1741b45c
-
SHA1
8e474559c791817ef9a362cfc2a2396157ae9b13
-
SHA256
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c
-
SHA512
9d4cae4d4547ad903b9978b77bf88459324ae8a14c30dc5b18d61518930ef4341f14011c841e09db68e9d7d9bd7a5990f4b31eaf923b8542f138adb6e8543ac5
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJG:1xlZam+akqx6YQJXcNlEHUIQeE3mmBID
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rpktrtcpvo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rpktrtcpvo.exe -
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rpktrtcpvo.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rpktrtcpvo.exe -
Executes dropped EXE 5 IoCs
Processes:
rpktrtcpvo.exelgobywmodpnstiu.exeygeflyri.exewagcmukoficcg.exeygeflyri.exepid process 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 2416 ygeflyri.exe 3740 wagcmukoficcg.exe 4284 ygeflyri.exe -
Processes:
resource yara_rule behavioral2/memory/2232-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\rpktrtcpvo.exe upx C:\Windows\SysWOW64\rpktrtcpvo.exe upx C:\Windows\SysWOW64\ygeflyri.exe upx C:\Windows\SysWOW64\ygeflyri.exe upx C:\Windows\SysWOW64\lgobywmodpnstiu.exe upx C:\Windows\SysWOW64\lgobywmodpnstiu.exe upx C:\Windows\SysWOW64\wagcmukoficcg.exe upx C:\Windows\SysWOW64\wagcmukoficcg.exe upx behavioral2/memory/4744-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2416-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3740-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2716-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\ygeflyri.exe upx behavioral2/memory/4284-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2232-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/4744-163-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2716-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2416-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3740-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4284-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rpktrtcpvo.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
lgobywmodpnstiu.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lgobywmodpnstiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\voosjdno = "rpktrtcpvo.exe" lgobywmodpnstiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cwwctukn = "lgobywmodpnstiu.exe" lgobywmodpnstiu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "wagcmukoficcg.exe" lgobywmodpnstiu.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ygeflyri.exerpktrtcpvo.exeygeflyri.exedescription ioc process File opened (read-only) \??\x: ygeflyri.exe File opened (read-only) \??\o: rpktrtcpvo.exe File opened (read-only) \??\h: ygeflyri.exe File opened (read-only) \??\l: ygeflyri.exe File opened (read-only) \??\i: ygeflyri.exe File opened (read-only) \??\y: ygeflyri.exe File opened (read-only) \??\v: rpktrtcpvo.exe File opened (read-only) \??\n: ygeflyri.exe File opened (read-only) \??\m: rpktrtcpvo.exe File opened (read-only) \??\g: ygeflyri.exe File opened (read-only) \??\p: ygeflyri.exe File opened (read-only) \??\e: ygeflyri.exe File opened (read-only) \??\h: rpktrtcpvo.exe File opened (read-only) \??\r: rpktrtcpvo.exe File opened (read-only) \??\t: rpktrtcpvo.exe File opened (read-only) \??\u: rpktrtcpvo.exe File opened (read-only) \??\l: ygeflyri.exe File opened (read-only) \??\r: ygeflyri.exe File opened (read-only) \??\m: ygeflyri.exe File opened (read-only) \??\r: ygeflyri.exe File opened (read-only) \??\a: rpktrtcpvo.exe File opened (read-only) \??\j: rpktrtcpvo.exe File opened (read-only) \??\q: rpktrtcpvo.exe File opened (read-only) \??\b: ygeflyri.exe File opened (read-only) \??\s: ygeflyri.exe File opened (read-only) \??\y: ygeflyri.exe File opened (read-only) \??\e: rpktrtcpvo.exe File opened (read-only) \??\p: rpktrtcpvo.exe File opened (read-only) \??\z: ygeflyri.exe File opened (read-only) \??\o: ygeflyri.exe File opened (read-only) \??\o: ygeflyri.exe File opened (read-only) \??\h: ygeflyri.exe File opened (read-only) \??\p: ygeflyri.exe File opened (read-only) \??\u: ygeflyri.exe File opened (read-only) \??\f: rpktrtcpvo.exe File opened (read-only) \??\g: rpktrtcpvo.exe File opened (read-only) \??\w: rpktrtcpvo.exe File opened (read-only) \??\t: ygeflyri.exe File opened (read-only) \??\f: ygeflyri.exe File opened (read-only) \??\q: ygeflyri.exe File opened (read-only) \??\a: ygeflyri.exe File opened (read-only) \??\a: ygeflyri.exe File opened (read-only) \??\n: rpktrtcpvo.exe File opened (read-only) \??\z: rpktrtcpvo.exe File opened (read-only) \??\b: ygeflyri.exe File opened (read-only) \??\f: ygeflyri.exe File opened (read-only) \??\v: ygeflyri.exe File opened (read-only) \??\x: ygeflyri.exe File opened (read-only) \??\k: rpktrtcpvo.exe File opened (read-only) \??\i: rpktrtcpvo.exe File opened (read-only) \??\m: ygeflyri.exe File opened (read-only) \??\n: ygeflyri.exe File opened (read-only) \??\s: ygeflyri.exe File opened (read-only) \??\w: ygeflyri.exe File opened (read-only) \??\w: ygeflyri.exe File opened (read-only) \??\j: ygeflyri.exe File opened (read-only) \??\y: rpktrtcpvo.exe File opened (read-only) \??\i: ygeflyri.exe File opened (read-only) \??\v: ygeflyri.exe File opened (read-only) \??\x: rpktrtcpvo.exe File opened (read-only) \??\e: ygeflyri.exe File opened (read-only) \??\u: ygeflyri.exe File opened (read-only) \??\k: ygeflyri.exe File opened (read-only) \??\z: ygeflyri.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
rpktrtcpvo.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rpktrtcpvo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rpktrtcpvo.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2232-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4744-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2416-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3740-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2716-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4284-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2232-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4744-163-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2716-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2416-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3740-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4284-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exeygeflyri.exeygeflyri.exerpktrtcpvo.exedescription ioc process File created C:\Windows\SysWOW64\wagcmukoficcg.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification C:\Windows\SysWOW64\rpktrtcpvo.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification C:\Windows\SysWOW64\lgobywmodpnstiu.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File created C:\Windows\SysWOW64\ygeflyri.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification C:\Windows\SysWOW64\wagcmukoficcg.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rpktrtcpvo.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe ygeflyri.exe File created C:\Windows\SysWOW64\rpktrtcpvo.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File created C:\Windows\SysWOW64\lgobywmodpnstiu.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification C:\Windows\SysWOW64\ygeflyri.exe 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe -
Drops file in Program Files directory 14 IoCs
Processes:
ygeflyri.exeygeflyri.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ygeflyri.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ygeflyri.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ygeflyri.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ygeflyri.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ygeflyri.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ygeflyri.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ygeflyri.exe -
Drops file in Windows directory 11 IoCs
Processes:
WINWORD.EXEygeflyri.exeygeflyri.exe9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ygeflyri.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification C:\Windows\mydoc.rtf 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe ygeflyri.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ygeflyri.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ygeflyri.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe ygeflyri.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
rpktrtcpvo.exe9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rpktrtcpvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183AC70F14E5DAC3B9C07FE1ED9534C7" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F76BC1FE6B22DBD27AD0D18A0C9165" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8FFFF9482785129135D65B7DE5BDE2E134593767446346D7EA" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC2B12D4792399D53B9B9A233E8D7CF" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rpktrtcpvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rpktrtcpvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412D789C2282206D3E77D470252DDE7CF164D6" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AB9FACAF962F1E084793A46869639E5B08B038D4366023AE2CA42E909D6" 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rpktrtcpvo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rpktrtcpvo.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3912 WINWORD.EXE 3912 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exerpktrtcpvo.exelgobywmodpnstiu.exeygeflyri.exewagcmukoficcg.exepid process 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exerpktrtcpvo.exelgobywmodpnstiu.exeygeflyri.exewagcmukoficcg.exeygeflyri.exepid process 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 4284 ygeflyri.exe 4284 ygeflyri.exe 4284 ygeflyri.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exerpktrtcpvo.exelgobywmodpnstiu.exeygeflyri.exewagcmukoficcg.exeygeflyri.exepid process 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 4744 rpktrtcpvo.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 2716 lgobywmodpnstiu.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 2416 ygeflyri.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 3740 wagcmukoficcg.exe 4284 ygeflyri.exe 4284 ygeflyri.exe 4284 ygeflyri.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE 3912 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exerpktrtcpvo.exedescription pid process target process PID 2232 wrote to memory of 4744 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe rpktrtcpvo.exe PID 2232 wrote to memory of 4744 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe rpktrtcpvo.exe PID 2232 wrote to memory of 4744 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe rpktrtcpvo.exe PID 2232 wrote to memory of 2716 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe lgobywmodpnstiu.exe PID 2232 wrote to memory of 2716 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe lgobywmodpnstiu.exe PID 2232 wrote to memory of 2716 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe lgobywmodpnstiu.exe PID 2232 wrote to memory of 2416 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe ygeflyri.exe PID 2232 wrote to memory of 2416 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe ygeflyri.exe PID 2232 wrote to memory of 2416 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe ygeflyri.exe PID 2232 wrote to memory of 3740 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe wagcmukoficcg.exe PID 2232 wrote to memory of 3740 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe wagcmukoficcg.exe PID 2232 wrote to memory of 3740 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe wagcmukoficcg.exe PID 4744 wrote to memory of 4284 4744 rpktrtcpvo.exe ygeflyri.exe PID 4744 wrote to memory of 4284 4744 rpktrtcpvo.exe ygeflyri.exe PID 4744 wrote to memory of 4284 4744 rpktrtcpvo.exe ygeflyri.exe PID 2232 wrote to memory of 3912 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe WINWORD.EXE PID 2232 wrote to memory of 3912 2232 9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe"C:\Users\Admin\AppData\Local\Temp\9770da26e1b20d94ab37a12d4e719dceaa6130fd268482c5d475c196f8ddc94c.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rpktrtcpvo.exerpktrtcpvo.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\ygeflyri.exeC:\Windows\system32\ygeflyri.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4284
-
-
-
C:\Windows\SysWOW64\lgobywmodpnstiu.exelgobywmodpnstiu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2716
-
-
C:\Windows\SysWOW64\ygeflyri.exeygeflyri.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2416
-
-
C:\Windows\SysWOW64\wagcmukoficcg.exewagcmukoficcg.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3740
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3912
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD56facd519c754d74379a2d458277777ac
SHA1f5f334d97555977c57293f16d7bfacb301c97885
SHA25688e5d2da8da1f85e48e0334efa83b31b556b33acec195510ea9731e34d3756d8
SHA51273905e4bd8c0ecc1be22cc57efebf9b0733533920a6c7eada106363483bc5e4dd0f72d16f4091cbcb2f4535901ab4d89bcf55024f611ae9fc95ff2430b66ae66
-
Filesize
255KB
MD57b872e0ee9bad79f442223a80346bde7
SHA1d369defefde23ad15f663fa5e3f55d994cb77e21
SHA256c5045b9196a058feb825d2698e25d3447f19ebea0c8aa85af95b48f19f9e4203
SHA512543e92812d7cca089abe641f86e27a78c64c297503be9ab6462f3e81609024cf4ce0ed493e0946e17c9b91457db35702b57702013850cae5c24948cd97f5ff99
-
Filesize
255KB
MD57b872e0ee9bad79f442223a80346bde7
SHA1d369defefde23ad15f663fa5e3f55d994cb77e21
SHA256c5045b9196a058feb825d2698e25d3447f19ebea0c8aa85af95b48f19f9e4203
SHA512543e92812d7cca089abe641f86e27a78c64c297503be9ab6462f3e81609024cf4ce0ed493e0946e17c9b91457db35702b57702013850cae5c24948cd97f5ff99
-
Filesize
255KB
MD5f754fb4ba5816972854a68baeeadfac7
SHA18aaa674438f9f83efee039e052ff395e7eb5bcfa
SHA256f3b339740a4494049f06438cd66d0aecfa8524ad02238bc5c100ef93b2fa0c14
SHA512ae90f5fc9c4e4021b603fccb7b104afb14c750a14711e1c58d03b2122acf28793739b82decd68d413cb74980f6c094bfb9a7335fe640400af07875fd8ec0edd8
-
Filesize
255KB
MD5f754fb4ba5816972854a68baeeadfac7
SHA18aaa674438f9f83efee039e052ff395e7eb5bcfa
SHA256f3b339740a4494049f06438cd66d0aecfa8524ad02238bc5c100ef93b2fa0c14
SHA512ae90f5fc9c4e4021b603fccb7b104afb14c750a14711e1c58d03b2122acf28793739b82decd68d413cb74980f6c094bfb9a7335fe640400af07875fd8ec0edd8
-
Filesize
255KB
MD574e769b6cfb88f21b3ee5bd5b3edd3a9
SHA1fd962e51bc984b13892b3437f9fe8876ed5e8482
SHA25695a56dcaad118aafe78334670ae16856e97884586f275bc8ce7cfb0e724c5dab
SHA51275f47e877f6c391c233bf08bbbc3997887aa893bc19899df349798b3b53cfcd11addcdb959f89cd4c92acaa0ca47fe6a4822cb51894c9ffde36a2d4113da0c82
-
Filesize
255KB
MD574e769b6cfb88f21b3ee5bd5b3edd3a9
SHA1fd962e51bc984b13892b3437f9fe8876ed5e8482
SHA25695a56dcaad118aafe78334670ae16856e97884586f275bc8ce7cfb0e724c5dab
SHA51275f47e877f6c391c233bf08bbbc3997887aa893bc19899df349798b3b53cfcd11addcdb959f89cd4c92acaa0ca47fe6a4822cb51894c9ffde36a2d4113da0c82
-
Filesize
255KB
MD513406a7f763cdd4908a17aa692ef24a8
SHA178186572f1572a4da6d47c94fa63de9353620981
SHA256e99e2a63570ce801cbd17d08e6b567db6cbbb76f0cd98a575c89d7351af56e64
SHA512ad38c604898ad447f68650d4e3e6839e55ea6568df9f248c91c9db4f889c17d2fd1251e7e0800c447f9dce16746abb4a95fa0c784a05203d62648f77a77ca056
-
Filesize
255KB
MD513406a7f763cdd4908a17aa692ef24a8
SHA178186572f1572a4da6d47c94fa63de9353620981
SHA256e99e2a63570ce801cbd17d08e6b567db6cbbb76f0cd98a575c89d7351af56e64
SHA512ad38c604898ad447f68650d4e3e6839e55ea6568df9f248c91c9db4f889c17d2fd1251e7e0800c447f9dce16746abb4a95fa0c784a05203d62648f77a77ca056
-
Filesize
255KB
MD513406a7f763cdd4908a17aa692ef24a8
SHA178186572f1572a4da6d47c94fa63de9353620981
SHA256e99e2a63570ce801cbd17d08e6b567db6cbbb76f0cd98a575c89d7351af56e64
SHA512ad38c604898ad447f68650d4e3e6839e55ea6568df9f248c91c9db4f889c17d2fd1251e7e0800c447f9dce16746abb4a95fa0c784a05203d62648f77a77ca056
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD52254c9060f993333a8a4c0289163820e
SHA1c84ac0811cfc4cca2d562881da346903f2c11790
SHA256ec7e44c5b3fc38002f56c973cc336a41227b4380d1bb53b2c962a603238d20e9
SHA512d384c7a3e845555163997f619ffd0b2772ecf82240ee9757614af13df0f798a45f888160125d759108c0aa9b9ee461dfa08ac8b306c5b8953628494c51a9f3b7
-
Filesize
255KB
MD5183420465a48513c73a2d387f8495712
SHA12ada5217a01d04b8f151dd22eceab58e0ae651ef
SHA25643f718d0a2b7cdc8206de5813a1aba33c0dc59acc987227f346542796ec56e01
SHA512f120deca21920de426331a401c395667aaa4802aeb88f2c4ef80144e24fe62dd06a3fcde09170959b71d7b16df86eb3130b41cb3e0d551ed91d8f6ca37faa5de
-
Filesize
255KB
MD5183420465a48513c73a2d387f8495712
SHA12ada5217a01d04b8f151dd22eceab58e0ae651ef
SHA25643f718d0a2b7cdc8206de5813a1aba33c0dc59acc987227f346542796ec56e01
SHA512f120deca21920de426331a401c395667aaa4802aeb88f2c4ef80144e24fe62dd06a3fcde09170959b71d7b16df86eb3130b41cb3e0d551ed91d8f6ca37faa5de