Analysis
-
max time kernel
210s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:02
Behavioral task
behavioral1
Sample
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe
Resource
win10v2004-20221111-en
General
-
Target
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe
-
Size
255KB
-
MD5
1fc2c5d5c64c2d88634cd24e4054b01b
-
SHA1
350d5ecf1f0f23b7716dac8023044e66efe03c95
-
SHA256
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4
-
SHA512
8199f32abcf290f507f70230e7882dd5aee9d22d66fffde9435e32fac9ba5ecdee34a5e4ee70eda1cec57e04b35635180fd86913a2c70f353c5606bc03819ea2
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJI:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gnrkfzutmz.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gnrkfzutmz.exe -
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gnrkfzutmz.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gnrkfzutmz.exe -
Executes dropped EXE 5 IoCs
Processes:
gnrkfzutmz.exehutgwcibjwfdhnt.exelzfoushy.exephbunynoksuaa.exelzfoushy.exepid process 2140 gnrkfzutmz.exe 3672 hutgwcibjwfdhnt.exe 2624 lzfoushy.exe 4920 phbunynoksuaa.exe 3920 lzfoushy.exe -
Processes:
resource yara_rule behavioral2/memory/4740-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gnrkfzutmz.exe upx C:\Windows\SysWOW64\gnrkfzutmz.exe upx C:\Windows\SysWOW64\hutgwcibjwfdhnt.exe upx C:\Windows\SysWOW64\hutgwcibjwfdhnt.exe upx behavioral2/memory/2140-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3672-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\lzfoushy.exe upx C:\Windows\SysWOW64\lzfoushy.exe upx behavioral2/memory/2624-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4740-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\phbunynoksuaa.exe upx C:\Windows\SysWOW64\phbunynoksuaa.exe upx behavioral2/memory/4920-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2624-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4920-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\lzfoushy.exe upx behavioral2/memory/3920-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4740-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/3920-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe -
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gnrkfzutmz.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
hutgwcibjwfdhnt.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hutgwcibjwfdhnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iyiiwwtm = "gnrkfzutmz.exe" hutgwcibjwfdhnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nbgrlfcq = "hutgwcibjwfdhnt.exe" hutgwcibjwfdhnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "phbunynoksuaa.exe" hutgwcibjwfdhnt.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lzfoushy.exegnrkfzutmz.exelzfoushy.exedescription ioc process File opened (read-only) \??\q: lzfoushy.exe File opened (read-only) \??\u: lzfoushy.exe File opened (read-only) \??\t: gnrkfzutmz.exe File opened (read-only) \??\g: lzfoushy.exe File opened (read-only) \??\t: lzfoushy.exe File opened (read-only) \??\f: gnrkfzutmz.exe File opened (read-only) \??\x: gnrkfzutmz.exe File opened (read-only) \??\y: lzfoushy.exe File opened (read-only) \??\m: lzfoushy.exe File opened (read-only) \??\l: lzfoushy.exe File opened (read-only) \??\o: lzfoushy.exe File opened (read-only) \??\w: lzfoushy.exe File opened (read-only) \??\y: gnrkfzutmz.exe File opened (read-only) \??\f: lzfoushy.exe File opened (read-only) \??\o: lzfoushy.exe File opened (read-only) \??\e: lzfoushy.exe File opened (read-only) \??\k: gnrkfzutmz.exe File opened (read-only) \??\v: gnrkfzutmz.exe File opened (read-only) \??\h: lzfoushy.exe File opened (read-only) \??\n: gnrkfzutmz.exe File opened (read-only) \??\y: lzfoushy.exe File opened (read-only) \??\i: lzfoushy.exe File opened (read-only) \??\q: gnrkfzutmz.exe File opened (read-only) \??\e: lzfoushy.exe File opened (read-only) \??\k: lzfoushy.exe File opened (read-only) \??\w: lzfoushy.exe File opened (read-only) \??\x: lzfoushy.exe File opened (read-only) \??\e: gnrkfzutmz.exe File opened (read-only) \??\p: gnrkfzutmz.exe File opened (read-only) \??\h: gnrkfzutmz.exe File opened (read-only) \??\j: gnrkfzutmz.exe File opened (read-only) \??\u: gnrkfzutmz.exe File opened (read-only) \??\b: lzfoushy.exe File opened (read-only) \??\r: lzfoushy.exe File opened (read-only) \??\f: lzfoushy.exe File opened (read-only) \??\j: lzfoushy.exe File opened (read-only) \??\a: gnrkfzutmz.exe File opened (read-only) \??\s: lzfoushy.exe File opened (read-only) \??\v: lzfoushy.exe File opened (read-only) \??\k: lzfoushy.exe File opened (read-only) \??\j: lzfoushy.exe File opened (read-only) \??\p: lzfoushy.exe File opened (read-only) \??\s: gnrkfzutmz.exe File opened (read-only) \??\w: gnrkfzutmz.exe File opened (read-only) \??\a: lzfoushy.exe File opened (read-only) \??\i: lzfoushy.exe File opened (read-only) \??\x: lzfoushy.exe File opened (read-only) \??\z: lzfoushy.exe File opened (read-only) \??\b: gnrkfzutmz.exe File opened (read-only) \??\i: gnrkfzutmz.exe File opened (read-only) \??\z: lzfoushy.exe File opened (read-only) \??\l: lzfoushy.exe File opened (read-only) \??\b: lzfoushy.exe File opened (read-only) \??\g: lzfoushy.exe File opened (read-only) \??\p: lzfoushy.exe File opened (read-only) \??\a: lzfoushy.exe File opened (read-only) \??\r: lzfoushy.exe File opened (read-only) \??\z: gnrkfzutmz.exe File opened (read-only) \??\t: lzfoushy.exe File opened (read-only) \??\s: lzfoushy.exe File opened (read-only) \??\g: gnrkfzutmz.exe File opened (read-only) \??\l: gnrkfzutmz.exe File opened (read-only) \??\h: lzfoushy.exe File opened (read-only) \??\q: lzfoushy.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
gnrkfzutmz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gnrkfzutmz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gnrkfzutmz.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2140-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3672-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2624-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4740-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4920-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2624-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4920-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3920-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4740-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3920-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exegnrkfzutmz.exedescription ioc process File created C:\Windows\SysWOW64\gnrkfzutmz.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File opened for modification C:\Windows\SysWOW64\phbunynoksuaa.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gnrkfzutmz.exe File opened for modification C:\Windows\SysWOW64\gnrkfzutmz.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File created C:\Windows\SysWOW64\hutgwcibjwfdhnt.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File opened for modification C:\Windows\SysWOW64\hutgwcibjwfdhnt.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File created C:\Windows\SysWOW64\lzfoushy.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File opened for modification C:\Windows\SysWOW64\lzfoushy.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File created C:\Windows\SysWOW64\phbunynoksuaa.exe 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe -
Drops file in Program Files directory 14 IoCs
Processes:
lzfoushy.exelzfoushy.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lzfoushy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal lzfoushy.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lzfoushy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lzfoushy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lzfoushy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lzfoushy.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe lzfoushy.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal lzfoushy.exe -
Drops file in Windows directory 3 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
gnrkfzutmz.exe9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" gnrkfzutmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDF9B1FE10F1E7840C3B4286EB3993B0FC03884315033DE1BD42EE09D5" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gnrkfzutmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" gnrkfzutmz.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C769D5283546A4377A177232DDA7D8365AA" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC60815E5DBC0B8C87CE2EDE437C8" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gnrkfzutmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh gnrkfzutmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gnrkfzutmz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gnrkfzutmz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B020479339ED52CBB9D1329DD4CF" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8EFF8F485D826D9136D62E7DE2BDE2E14658446642633FD7EC" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E78168C3FE6D21D1D10ED1A98B7D9167" 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2432 WINWORD.EXE 2432 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exegnrkfzutmz.exehutgwcibjwfdhnt.exelzfoushy.exephbunynoksuaa.exepid process 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exegnrkfzutmz.exehutgwcibjwfdhnt.exelzfoushy.exephbunynoksuaa.exelzfoushy.exepid process 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 3920 lzfoushy.exe 3920 lzfoushy.exe 3920 lzfoushy.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exegnrkfzutmz.exehutgwcibjwfdhnt.exelzfoushy.exephbunynoksuaa.exelzfoushy.exepid process 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 2140 gnrkfzutmz.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 3672 hutgwcibjwfdhnt.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 2624 lzfoushy.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 4920 phbunynoksuaa.exe 3920 lzfoushy.exe 3920 lzfoushy.exe 3920 lzfoushy.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2432 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE 2432 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exehutgwcibjwfdhnt.exegnrkfzutmz.exedescription pid process target process PID 4740 wrote to memory of 2140 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe gnrkfzutmz.exe PID 4740 wrote to memory of 2140 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe gnrkfzutmz.exe PID 4740 wrote to memory of 2140 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe gnrkfzutmz.exe PID 4740 wrote to memory of 3672 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe hutgwcibjwfdhnt.exe PID 4740 wrote to memory of 3672 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe hutgwcibjwfdhnt.exe PID 4740 wrote to memory of 3672 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe hutgwcibjwfdhnt.exe PID 4740 wrote to memory of 2624 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe lzfoushy.exe PID 4740 wrote to memory of 2624 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe lzfoushy.exe PID 4740 wrote to memory of 2624 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe lzfoushy.exe PID 4740 wrote to memory of 4920 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe phbunynoksuaa.exe PID 4740 wrote to memory of 4920 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe phbunynoksuaa.exe PID 4740 wrote to memory of 4920 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe phbunynoksuaa.exe PID 3672 wrote to memory of 5000 3672 hutgwcibjwfdhnt.exe cmd.exe PID 3672 wrote to memory of 5000 3672 hutgwcibjwfdhnt.exe cmd.exe PID 3672 wrote to memory of 5000 3672 hutgwcibjwfdhnt.exe cmd.exe PID 2140 wrote to memory of 3920 2140 gnrkfzutmz.exe lzfoushy.exe PID 2140 wrote to memory of 3920 2140 gnrkfzutmz.exe lzfoushy.exe PID 2140 wrote to memory of 3920 2140 gnrkfzutmz.exe lzfoushy.exe PID 4740 wrote to memory of 2432 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe WINWORD.EXE PID 4740 wrote to memory of 2432 4740 9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe"C:\Users\Admin\AppData\Local\Temp\9669d6016ea6b09226849a22ae58dce628c2a8d71d88bc618bc56c35200ff5d4.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\gnrkfzutmz.exegnrkfzutmz.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\lzfoushy.exeC:\Windows\system32\lzfoushy.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3920 -
C:\Windows\SysWOW64\hutgwcibjwfdhnt.exehutgwcibjwfdhnt.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.execmd.exe /c phbunynoksuaa.exe3⤵PID:5000
-
C:\Windows\SysWOW64\lzfoushy.exelzfoushy.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2624 -
C:\Windows\SysWOW64\phbunynoksuaa.exephbunynoksuaa.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4920 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2432
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD552cc73463fc95f7de7f3dcf792c95e25
SHA10da5a6dd19493d4b9fb16da2015aac0e22e362b9
SHA256520d88b21ee995c5e3c104594da3cbd99f9258f8149718a4d894ff360a8cc9e9
SHA5124ca18387453588534659d2d3887b39c49e77c506140d53e7cfeece11766c3a8c48c34ce445c989802a91a6d0a405a4d8a2d10c6e2b36c59de3dc0027ff066e54
-
Filesize
255KB
MD58c866f5128117d5f8cd0c93fe90b4547
SHA179ea48ed944fae069ed234503f98b4d3b7a48b8d
SHA256257b78e2ba2e29557fbfa5500686b2b2063564197238715c74a0470c465fb4dd
SHA512a7bfa7de733c01ceb1b9824c0d4931dbbb835793e7c8445f349eb19250659bfee2f1eacd3d57581f4bb99f9fd0f72a638f0335ec4783e95d0c48ef13c3313152
-
Filesize
255KB
MD59bad2c546d4ce5f93dba6806351d69f2
SHA156a125601e134452f088602511943736aa81eacb
SHA256cca8bca282683ba00a4f20f6c5fc4758da78e04c6bcf4934ef022f45c7cd5886
SHA512dedfe27dafa44553531676049d60c0fb9f8dd7b72a4db531dc3972ac938c047332a7daf30a4ef94d67cdaab55f3b8431c1dd39c41217ebbc8e75d0d7ca3a13a5
-
Filesize
255KB
MD59bad2c546d4ce5f93dba6806351d69f2
SHA156a125601e134452f088602511943736aa81eacb
SHA256cca8bca282683ba00a4f20f6c5fc4758da78e04c6bcf4934ef022f45c7cd5886
SHA512dedfe27dafa44553531676049d60c0fb9f8dd7b72a4db531dc3972ac938c047332a7daf30a4ef94d67cdaab55f3b8431c1dd39c41217ebbc8e75d0d7ca3a13a5
-
Filesize
255KB
MD5b42386dafea54c24a6bfe0e9ad48630f
SHA196d2dd1a54520049a1b8fe22a11ab75657f8ff5c
SHA256caa2615068c4b4a1a6e7eea01586dfe79263e636bf67619095c2e9c3b8dfaf99
SHA5127d95b73549a73ea5cfca85eb83821e8a540e501a1458ff7d7923ee66ae77f1cac20d96f00f92398dda8866b4c9633b1ababeb71acf205fe8545595d9a0bb5cde
-
Filesize
255KB
MD5b42386dafea54c24a6bfe0e9ad48630f
SHA196d2dd1a54520049a1b8fe22a11ab75657f8ff5c
SHA256caa2615068c4b4a1a6e7eea01586dfe79263e636bf67619095c2e9c3b8dfaf99
SHA5127d95b73549a73ea5cfca85eb83821e8a540e501a1458ff7d7923ee66ae77f1cac20d96f00f92398dda8866b4c9633b1ababeb71acf205fe8545595d9a0bb5cde
-
Filesize
255KB
MD57c6dfe2af472e8306c68baa59b5406bc
SHA1ad318b3393a044e78442136a4877eb2354e084d8
SHA256d8a5b3b11995248c623acdb0f8b47f6e6bd319c74725ceed4d85534c5c33dbb2
SHA51260853881fa456982bede098c5b70fca4b3f2060fd2c8c751e64d773ff581f6974a20c174b55dedefd98b8a96029edd93f2af9208e10b1a4c37bf73209d5adcc8
-
Filesize
255KB
MD57c6dfe2af472e8306c68baa59b5406bc
SHA1ad318b3393a044e78442136a4877eb2354e084d8
SHA256d8a5b3b11995248c623acdb0f8b47f6e6bd319c74725ceed4d85534c5c33dbb2
SHA51260853881fa456982bede098c5b70fca4b3f2060fd2c8c751e64d773ff581f6974a20c174b55dedefd98b8a96029edd93f2af9208e10b1a4c37bf73209d5adcc8
-
Filesize
255KB
MD57c6dfe2af472e8306c68baa59b5406bc
SHA1ad318b3393a044e78442136a4877eb2354e084d8
SHA256d8a5b3b11995248c623acdb0f8b47f6e6bd319c74725ceed4d85534c5c33dbb2
SHA51260853881fa456982bede098c5b70fca4b3f2060fd2c8c751e64d773ff581f6974a20c174b55dedefd98b8a96029edd93f2af9208e10b1a4c37bf73209d5adcc8
-
Filesize
255KB
MD5eae685e7e11d318804a57651f7d32023
SHA1b9ec9adf6e624d1161ee10026affd0136cebf62d
SHA2564c6370c6e764ff48b631ef3929a3ecc801105cb688bd4211ae50ffb341d9c3a9
SHA5124250875617f0cd72c3f7ce916d2c52101d0f612dec3082354f2035d12d55548f03c99c2e6f452a668fd064e3da96d9703d7603cd413b128d888b3083c90fa7fb
-
Filesize
255KB
MD5eae685e7e11d318804a57651f7d32023
SHA1b9ec9adf6e624d1161ee10026affd0136cebf62d
SHA2564c6370c6e764ff48b631ef3929a3ecc801105cb688bd4211ae50ffb341d9c3a9
SHA5124250875617f0cd72c3f7ce916d2c52101d0f612dec3082354f2035d12d55548f03c99c2e6f452a668fd064e3da96d9703d7603cd413b128d888b3083c90fa7fb
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD58c866f5128117d5f8cd0c93fe90b4547
SHA179ea48ed944fae069ed234503f98b4d3b7a48b8d
SHA256257b78e2ba2e29557fbfa5500686b2b2063564197238715c74a0470c465fb4dd
SHA512a7bfa7de733c01ceb1b9824c0d4931dbbb835793e7c8445f349eb19250659bfee2f1eacd3d57581f4bb99f9fd0f72a638f0335ec4783e95d0c48ef13c3313152