Analysis
-
max time kernel
186s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe
Resource
win10v2004-20221111-en
General
-
Target
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe
-
Size
255KB
-
MD5
f245eab61c253a24c28a1e410cd0b077
-
SHA1
f9cdee35ad2005d88ea04503875226ac204584dd
-
SHA256
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1
-
SHA512
064365b1b254889eaa7a950f0431d995a32f80bb24166849f94398d5fc76b9f7f186304b98c490169239a51df9cd85752582a72a89c82d6b651547628189b65e
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJi:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dmnvifrpfp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dmnvifrpfp.exe -
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dmnvifrpfp.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dmnvifrpfp.exe -
Executes dropped EXE 5 IoCs
Processes:
dmnvifrpfp.exeqrpmxnenkstvnbd.exeunbaajdz.exeyjoxeapnutxrp.exeunbaajdz.exepid process 4204 dmnvifrpfp.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 4392 yjoxeapnutxrp.exe 4368 unbaajdz.exe -
Processes:
resource yara_rule behavioral2/memory/1396-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\dmnvifrpfp.exe upx C:\Windows\SysWOW64\dmnvifrpfp.exe upx C:\Windows\SysWOW64\qrpmxnenkstvnbd.exe upx C:\Windows\SysWOW64\qrpmxnenkstvnbd.exe upx C:\Windows\SysWOW64\unbaajdz.exe upx C:\Windows\SysWOW64\unbaajdz.exe upx C:\Windows\SysWOW64\yjoxeapnutxrp.exe upx behavioral2/memory/4204-144-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4248-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\yjoxeapnutxrp.exe upx behavioral2/memory/4392-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2100-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\unbaajdz.exe upx behavioral2/memory/4368-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1396-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/4204-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4248-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2100-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4392-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4368-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe -
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dmnvifrpfp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
qrpmxnenkstvnbd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "yjoxeapnutxrp.exe" qrpmxnenkstvnbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run qrpmxnenkstvnbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mabztjus = "dmnvifrpfp.exe" qrpmxnenkstvnbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rodeakxs = "qrpmxnenkstvnbd.exe" qrpmxnenkstvnbd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
unbaajdz.exedmnvifrpfp.exeunbaajdz.exedescription ioc process File opened (read-only) \??\o: unbaajdz.exe File opened (read-only) \??\h: dmnvifrpfp.exe File opened (read-only) \??\v: dmnvifrpfp.exe File opened (read-only) \??\b: unbaajdz.exe File opened (read-only) \??\n: unbaajdz.exe File opened (read-only) \??\y: unbaajdz.exe File opened (read-only) \??\i: dmnvifrpfp.exe File opened (read-only) \??\k: unbaajdz.exe File opened (read-only) \??\x: unbaajdz.exe File opened (read-only) \??\j: unbaajdz.exe File opened (read-only) \??\x: unbaajdz.exe File opened (read-only) \??\k: dmnvifrpfp.exe File opened (read-only) \??\m: dmnvifrpfp.exe File opened (read-only) \??\o: unbaajdz.exe File opened (read-only) \??\p: unbaajdz.exe File opened (read-only) \??\l: unbaajdz.exe File opened (read-only) \??\j: dmnvifrpfp.exe File opened (read-only) \??\l: dmnvifrpfp.exe File opened (read-only) \??\z: unbaajdz.exe File opened (read-only) \??\e: dmnvifrpfp.exe File opened (read-only) \??\n: dmnvifrpfp.exe File opened (read-only) \??\x: dmnvifrpfp.exe File opened (read-only) \??\u: unbaajdz.exe File opened (read-only) \??\w: unbaajdz.exe File opened (read-only) \??\b: unbaajdz.exe File opened (read-only) \??\m: unbaajdz.exe File opened (read-only) \??\q: unbaajdz.exe File opened (read-only) \??\g: unbaajdz.exe File opened (read-only) \??\k: unbaajdz.exe File opened (read-only) \??\r: unbaajdz.exe File opened (read-only) \??\u: unbaajdz.exe File opened (read-only) \??\w: dmnvifrpfp.exe File opened (read-only) \??\l: unbaajdz.exe File opened (read-only) \??\h: unbaajdz.exe File opened (read-only) \??\i: unbaajdz.exe File opened (read-only) \??\f: unbaajdz.exe File opened (read-only) \??\f: unbaajdz.exe File opened (read-only) \??\y: unbaajdz.exe File opened (read-only) \??\b: dmnvifrpfp.exe File opened (read-only) \??\v: unbaajdz.exe File opened (read-only) \??\g: dmnvifrpfp.exe File opened (read-only) \??\t: dmnvifrpfp.exe File opened (read-only) \??\u: dmnvifrpfp.exe File opened (read-only) \??\z: dmnvifrpfp.exe File opened (read-only) \??\j: unbaajdz.exe File opened (read-only) \??\t: unbaajdz.exe File opened (read-only) \??\s: unbaajdz.exe File opened (read-only) \??\o: dmnvifrpfp.exe File opened (read-only) \??\e: unbaajdz.exe File opened (read-only) \??\t: unbaajdz.exe File opened (read-only) \??\a: dmnvifrpfp.exe File opened (read-only) \??\r: dmnvifrpfp.exe File opened (read-only) \??\s: dmnvifrpfp.exe File opened (read-only) \??\i: unbaajdz.exe File opened (read-only) \??\e: unbaajdz.exe File opened (read-only) \??\z: unbaajdz.exe File opened (read-only) \??\y: dmnvifrpfp.exe File opened (read-only) \??\h: unbaajdz.exe File opened (read-only) \??\p: unbaajdz.exe File opened (read-only) \??\n: unbaajdz.exe File opened (read-only) \??\q: unbaajdz.exe File opened (read-only) \??\r: unbaajdz.exe File opened (read-only) \??\v: unbaajdz.exe File opened (read-only) \??\g: unbaajdz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
dmnvifrpfp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" dmnvifrpfp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" dmnvifrpfp.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1396-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4204-144-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4248-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2100-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4368-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1396-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4204-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4248-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2100-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4392-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4368-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedmnvifrpfp.exedescription ioc process File opened for modification C:\Windows\SysWOW64\qrpmxnenkstvnbd.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File opened for modification C:\Windows\SysWOW64\yjoxeapnutxrp.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File created C:\Windows\SysWOW64\dmnvifrpfp.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File opened for modification C:\Windows\SysWOW64\dmnvifrpfp.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File created C:\Windows\SysWOW64\qrpmxnenkstvnbd.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll dmnvifrpfp.exe File created C:\Windows\SysWOW64\unbaajdz.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File opened for modification C:\Windows\SysWOW64\unbaajdz.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File created C:\Windows\SysWOW64\yjoxeapnutxrp.exe 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe -
Drops file in Program Files directory 15 IoCs
Processes:
unbaajdz.exeunbaajdz.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe unbaajdz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal unbaajdz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal unbaajdz.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe unbaajdz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal unbaajdz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe unbaajdz.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal unbaajdz.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe unbaajdz.exe -
Drops file in Windows directory 3 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedmnvifrpfp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472C0C9C2782596A3576D677242DDE7DF165D9" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C67E15E6DABEB8BC7C94EC9637CA" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc dmnvifrpfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf dmnvifrpfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" dmnvifrpfp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB7B15D479739E353CFBAA732EAD4CC" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF8FF8D482F8219913DD75F7E95BDE3E6375843664F6245D6EB" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat dmnvifrpfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4F9CDFE14F19484783B30869E39E6B0FB038C4213023FE1BF429B08D5" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FC6BB4FE6622A9D10FD0A48B7C9010" 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" dmnvifrpfp.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" dmnvifrpfp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" dmnvifrpfp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1288 WINWORD.EXE 1288 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedmnvifrpfp.exeqrpmxnenkstvnbd.exeunbaajdz.exeyjoxeapnutxrp.exeunbaajdz.exepid process 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4368 unbaajdz.exe 4368 unbaajdz.exe 4368 unbaajdz.exe 4368 unbaajdz.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedmnvifrpfp.exeqrpmxnenkstvnbd.exeunbaajdz.exeyjoxeapnutxrp.exeunbaajdz.exepid process 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4368 unbaajdz.exe 4368 unbaajdz.exe 4368 unbaajdz.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exedmnvifrpfp.exeqrpmxnenkstvnbd.exeunbaajdz.exeyjoxeapnutxrp.exeunbaajdz.exepid process 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4204 dmnvifrpfp.exe 4248 qrpmxnenkstvnbd.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 4248 qrpmxnenkstvnbd.exe 2100 unbaajdz.exe 2100 unbaajdz.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4392 yjoxeapnutxrp.exe 4368 unbaajdz.exe 4368 unbaajdz.exe 4368 unbaajdz.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1288 WINWORD.EXE 1288 WINWORD.EXE 1288 WINWORD.EXE 1288 WINWORD.EXE 1288 WINWORD.EXE 1288 WINWORD.EXE 1288 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exeqrpmxnenkstvnbd.exedmnvifrpfp.exedescription pid process target process PID 1396 wrote to memory of 4204 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe dmnvifrpfp.exe PID 1396 wrote to memory of 4204 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe dmnvifrpfp.exe PID 1396 wrote to memory of 4204 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe dmnvifrpfp.exe PID 1396 wrote to memory of 4248 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe qrpmxnenkstvnbd.exe PID 1396 wrote to memory of 4248 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe qrpmxnenkstvnbd.exe PID 1396 wrote to memory of 4248 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe qrpmxnenkstvnbd.exe PID 1396 wrote to memory of 2100 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe unbaajdz.exe PID 1396 wrote to memory of 2100 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe unbaajdz.exe PID 1396 wrote to memory of 2100 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe unbaajdz.exe PID 1396 wrote to memory of 4392 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe yjoxeapnutxrp.exe PID 1396 wrote to memory of 4392 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe yjoxeapnutxrp.exe PID 1396 wrote to memory of 4392 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe yjoxeapnutxrp.exe PID 4248 wrote to memory of 3628 4248 qrpmxnenkstvnbd.exe cmd.exe PID 4248 wrote to memory of 3628 4248 qrpmxnenkstvnbd.exe cmd.exe PID 4248 wrote to memory of 3628 4248 qrpmxnenkstvnbd.exe cmd.exe PID 4204 wrote to memory of 4368 4204 dmnvifrpfp.exe unbaajdz.exe PID 4204 wrote to memory of 4368 4204 dmnvifrpfp.exe unbaajdz.exe PID 4204 wrote to memory of 4368 4204 dmnvifrpfp.exe unbaajdz.exe PID 1396 wrote to memory of 1288 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe WINWORD.EXE PID 1396 wrote to memory of 1288 1396 7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe"C:\Users\Admin\AppData\Local\Temp\7a268510a83851b6c3442d1e7111baf53729ad3562bca45d67f364f1ddb7fff1.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dmnvifrpfp.exedmnvifrpfp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\unbaajdz.exeC:\Windows\system32\unbaajdz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\qrpmxnenkstvnbd.exeqrpmxnenkstvnbd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c yjoxeapnutxrp.exe3⤵
-
C:\Windows\SysWOW64\unbaajdz.exeunbaajdz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\yjoxeapnutxrp.exeyjoxeapnutxrp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hidden Files and Directories
2Modify Registry
6Disabling Security Tools
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exeFilesize
255KB
MD50e376b81c985c0171c328d14b0fb29e3
SHA1767b20165a46d4354001d99aa32e7c33e8a85109
SHA2567398fa356561091dfc1c6e7a0179079739fa2fc23bfc6763a0a1aa46fc802477
SHA5128bb8f198421e63b8154d567c26b694ed4ed2670ed5bdc636159a6144c6be573219d1ba586f95c2d5b875a0dc639dbeaa604b19344280382d9149532ab9e772ad
-
C:\Windows\SysWOW64\dmnvifrpfp.exeFilesize
255KB
MD5a24b50ca417ab1e46c3958a2ca1f5d74
SHA1c2042f2ec0f4e94c8bd2eb66edac5827ea04c036
SHA25652db553b680c1dd13650fd994daa4aeab0807b85d4192db54441f67c06add5f4
SHA5128155cfa89c42eb390b2d8f5ad5871b9b08f5f8412b9def69b1adba6b232677a3d2f03781632a44988d7623af6c5db7b1b676626acbe50168d945e1ecfb77d541
-
C:\Windows\SysWOW64\dmnvifrpfp.exeFilesize
255KB
MD5a24b50ca417ab1e46c3958a2ca1f5d74
SHA1c2042f2ec0f4e94c8bd2eb66edac5827ea04c036
SHA25652db553b680c1dd13650fd994daa4aeab0807b85d4192db54441f67c06add5f4
SHA5128155cfa89c42eb390b2d8f5ad5871b9b08f5f8412b9def69b1adba6b232677a3d2f03781632a44988d7623af6c5db7b1b676626acbe50168d945e1ecfb77d541
-
C:\Windows\SysWOW64\qrpmxnenkstvnbd.exeFilesize
255KB
MD54aaf44e360f68ad0530fce7767965772
SHA1996c48617ba4a7436c3eca5ee6c563cfe2bef2db
SHA25676f09c695729151b4d2610d49d030cf6f85f5b80575ecd445a0e63c6554bd707
SHA512ead81ec43d8e86c3d28d6e9905ba00c7f15e79e1839bd0b2c18f6c8bc60d7ed688be366a8985f4aa6daec2317ae7090bfe26625844450292e1882fa1a1f5f8af
-
C:\Windows\SysWOW64\qrpmxnenkstvnbd.exeFilesize
255KB
MD54aaf44e360f68ad0530fce7767965772
SHA1996c48617ba4a7436c3eca5ee6c563cfe2bef2db
SHA25676f09c695729151b4d2610d49d030cf6f85f5b80575ecd445a0e63c6554bd707
SHA512ead81ec43d8e86c3d28d6e9905ba00c7f15e79e1839bd0b2c18f6c8bc60d7ed688be366a8985f4aa6daec2317ae7090bfe26625844450292e1882fa1a1f5f8af
-
C:\Windows\SysWOW64\unbaajdz.exeFilesize
255KB
MD51bf4a51330117c92f889b9f19a7ad761
SHA1e71adcb3b66b5da3a45ac4980b7171d19a2ef7d7
SHA256a5e5cbe3eea9bed8d048c84ef43dad358de9b20d7ba8b22e676fe31c92cbb6cd
SHA512f71d791446ed4e7ff08d5ac425332062a202bc1100e900e6b40b8e60cdcabc81287fc18fad34dfe720833efe9fcdaf71abe661a926250b9903ff3be2b91ffbcc
-
C:\Windows\SysWOW64\unbaajdz.exeFilesize
255KB
MD51bf4a51330117c92f889b9f19a7ad761
SHA1e71adcb3b66b5da3a45ac4980b7171d19a2ef7d7
SHA256a5e5cbe3eea9bed8d048c84ef43dad358de9b20d7ba8b22e676fe31c92cbb6cd
SHA512f71d791446ed4e7ff08d5ac425332062a202bc1100e900e6b40b8e60cdcabc81287fc18fad34dfe720833efe9fcdaf71abe661a926250b9903ff3be2b91ffbcc
-
C:\Windows\SysWOW64\unbaajdz.exeFilesize
255KB
MD51bf4a51330117c92f889b9f19a7ad761
SHA1e71adcb3b66b5da3a45ac4980b7171d19a2ef7d7
SHA256a5e5cbe3eea9bed8d048c84ef43dad358de9b20d7ba8b22e676fe31c92cbb6cd
SHA512f71d791446ed4e7ff08d5ac425332062a202bc1100e900e6b40b8e60cdcabc81287fc18fad34dfe720833efe9fcdaf71abe661a926250b9903ff3be2b91ffbcc
-
C:\Windows\SysWOW64\yjoxeapnutxrp.exeFilesize
255KB
MD5f51fb2df54f263c51062ff085ad52e78
SHA1e15566db66bff92ba6d3197d708f014568d7d7de
SHA256c246debbfd768d2a32a16c92ab41080f44e893bf7eaf597c97a5912afd6949e4
SHA512ebcd9fb756801250a5dfacb00c559b98a94fd5faffb3753303dfc0baf3eb5e2b9a517cbb475468afd5a419ff6af5af632fd9d17d806fc91b7005e62b6dad63cd
-
C:\Windows\SysWOW64\yjoxeapnutxrp.exeFilesize
255KB
MD5f51fb2df54f263c51062ff085ad52e78
SHA1e15566db66bff92ba6d3197d708f014568d7d7de
SHA256c246debbfd768d2a32a16c92ab41080f44e893bf7eaf597c97a5912afd6949e4
SHA512ebcd9fb756801250a5dfacb00c559b98a94fd5faffb3753303dfc0baf3eb5e2b9a517cbb475468afd5a419ff6af5af632fd9d17d806fc91b7005e62b6dad63cd
-
C:\Windows\mydoc.rtfFilesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
memory/1288-159-0x00007FFEA7AB0000-0x00007FFEA7AC0000-memory.dmpFilesize
64KB
-
memory/1288-162-0x00007FFEA54A0000-0x00007FFEA54B0000-memory.dmpFilesize
64KB
-
memory/1288-160-0x00007FFEA54A0000-0x00007FFEA54B0000-memory.dmpFilesize
64KB
-
memory/1288-158-0x00007FFEA7AB0000-0x00007FFEA7AC0000-memory.dmpFilesize
64KB
-
memory/1288-155-0x00007FFEA7AB0000-0x00007FFEA7AC0000-memory.dmpFilesize
64KB
-
memory/1288-156-0x00007FFEA7AB0000-0x00007FFEA7AC0000-memory.dmpFilesize
64KB
-
memory/1288-157-0x00007FFEA7AB0000-0x00007FFEA7AC0000-memory.dmpFilesize
64KB
-
memory/1288-152-0x0000000000000000-mapping.dmp
-
memory/1396-154-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1396-132-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/2100-146-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/2100-139-0x0000000000000000-mapping.dmp
-
memory/2100-166-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/3628-148-0x0000000000000000-mapping.dmp
-
memory/4204-133-0x0000000000000000-mapping.dmp
-
memory/4204-144-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4204-164-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4248-145-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4248-136-0x0000000000000000-mapping.dmp
-
memory/4248-165-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4368-150-0x0000000000000000-mapping.dmp
-
memory/4368-153-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4368-168-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4392-142-0x0000000000000000-mapping.dmp
-
memory/4392-149-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4392-167-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB