Analysis
-
max time kernel
189s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe
Resource
win10v2004-20221111-en
General
-
Target
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe
-
Size
255KB
-
MD5
eaefe78dd0ca9b0d51a10039bbb94a3f
-
SHA1
cb4a65fbebfcd5a1507d2247e213c1ff54b1b179
-
SHA256
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8
-
SHA512
07c39f5eb8c05eda926c9403d9895836d633c8896405f7990773ee5c9854ab1598a062e4c096743c5331c765f8312a5a3c47795428bdf319850fb875aba2867a
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJd:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gofrkpvatl.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gofrkpvatl.exe -
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gofrkpvatl.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gofrkpvatl.exe -
Executes dropped EXE 5 IoCs
Processes:
gofrkpvatl.exerfiljhtlpbkdkud.exegicjocqw.exenytpbculqkbbl.exegicjocqw.exepid process 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 380 gicjocqw.exe 4300 nytpbculqkbbl.exe 2172 gicjocqw.exe -
Processes:
resource yara_rule behavioral2/memory/4000-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gofrkpvatl.exe upx C:\Windows\SysWOW64\gofrkpvatl.exe upx C:\Windows\SysWOW64\rfiljhtlpbkdkud.exe upx C:\Windows\SysWOW64\rfiljhtlpbkdkud.exe upx C:\Windows\SysWOW64\gicjocqw.exe upx C:\Windows\SysWOW64\gicjocqw.exe upx behavioral2/memory/5096-143-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\nytpbculqkbbl.exe upx C:\Windows\SysWOW64\nytpbculqkbbl.exe upx behavioral2/memory/380-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3824-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gicjocqw.exe upx behavioral2/memory/4000-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4300-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2172-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/5096-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3824-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/380-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4300-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2172-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe -
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gofrkpvatl.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
rfiljhtlpbkdkud.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "nytpbculqkbbl.exe" rfiljhtlpbkdkud.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rfiljhtlpbkdkud.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tcdjkeyi = "gofrkpvatl.exe" rfiljhtlpbkdkud.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qcesvnya = "rfiljhtlpbkdkud.exe" rfiljhtlpbkdkud.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gicjocqw.exegofrkpvatl.exegicjocqw.exedescription ioc process File opened (read-only) \??\o: gicjocqw.exe File opened (read-only) \??\k: gofrkpvatl.exe File opened (read-only) \??\r: gofrkpvatl.exe File opened (read-only) \??\w: gofrkpvatl.exe File opened (read-only) \??\v: gicjocqw.exe File opened (read-only) \??\e: gofrkpvatl.exe File opened (read-only) \??\g: gicjocqw.exe File opened (read-only) \??\v: gofrkpvatl.exe File opened (read-only) \??\t: gicjocqw.exe File opened (read-only) \??\v: gicjocqw.exe File opened (read-only) \??\w: gicjocqw.exe File opened (read-only) \??\b: gicjocqw.exe File opened (read-only) \??\y: gicjocqw.exe File opened (read-only) \??\a: gofrkpvatl.exe File opened (read-only) \??\f: gofrkpvatl.exe File opened (read-only) \??\s: gofrkpvatl.exe File opened (read-only) \??\l: gicjocqw.exe File opened (read-only) \??\l: gicjocqw.exe File opened (read-only) \??\q: gicjocqw.exe File opened (read-only) \??\t: gicjocqw.exe File opened (read-only) \??\u: gofrkpvatl.exe File opened (read-only) \??\a: gicjocqw.exe File opened (read-only) \??\k: gicjocqw.exe File opened (read-only) \??\p: gicjocqw.exe File opened (read-only) \??\r: gicjocqw.exe File opened (read-only) \??\h: gicjocqw.exe File opened (read-only) \??\k: gicjocqw.exe File opened (read-only) \??\n: gicjocqw.exe File opened (read-only) \??\q: gicjocqw.exe File opened (read-only) \??\g: gofrkpvatl.exe File opened (read-only) \??\o: gofrkpvatl.exe File opened (read-only) \??\x: gofrkpvatl.exe File opened (read-only) \??\u: gicjocqw.exe File opened (read-only) \??\l: gofrkpvatl.exe File opened (read-only) \??\n: gofrkpvatl.exe File opened (read-only) \??\p: gicjocqw.exe File opened (read-only) \??\u: gicjocqw.exe File opened (read-only) \??\x: gicjocqw.exe File opened (read-only) \??\w: gicjocqw.exe File opened (read-only) \??\z: gofrkpvatl.exe File opened (read-only) \??\f: gicjocqw.exe File opened (read-only) \??\i: gicjocqw.exe File opened (read-only) \??\j: gicjocqw.exe File opened (read-only) \??\r: gicjocqw.exe File opened (read-only) \??\n: gicjocqw.exe File opened (read-only) \??\y: gicjocqw.exe File opened (read-only) \??\g: gicjocqw.exe File opened (read-only) \??\h: gofrkpvatl.exe File opened (read-only) \??\j: gicjocqw.exe File opened (read-only) \??\m: gicjocqw.exe File opened (read-only) \??\e: gicjocqw.exe File opened (read-only) \??\e: gicjocqw.exe File opened (read-only) \??\i: gicjocqw.exe File opened (read-only) \??\m: gofrkpvatl.exe File opened (read-only) \??\p: gofrkpvatl.exe File opened (read-only) \??\q: gofrkpvatl.exe File opened (read-only) \??\y: gofrkpvatl.exe File opened (read-only) \??\f: gicjocqw.exe File opened (read-only) \??\o: gicjocqw.exe File opened (read-only) \??\j: gofrkpvatl.exe File opened (read-only) \??\i: gofrkpvatl.exe File opened (read-only) \??\h: gicjocqw.exe File opened (read-only) \??\s: gicjocqw.exe File opened (read-only) \??\a: gicjocqw.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
gofrkpvatl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gofrkpvatl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gofrkpvatl.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/5096-143-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/380-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3824-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4000-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4300-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2172-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5096-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3824-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/380-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4300-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2172-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exegofrkpvatl.exedescription ioc process File created C:\Windows\SysWOW64\rfiljhtlpbkdkud.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File created C:\Windows\SysWOW64\gicjocqw.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gofrkpvatl.exe File opened for modification C:\Windows\SysWOW64\gicjocqw.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File created C:\Windows\SysWOW64\nytpbculqkbbl.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File opened for modification C:\Windows\SysWOW64\nytpbculqkbbl.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File created C:\Windows\SysWOW64\gofrkpvatl.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File opened for modification C:\Windows\SysWOW64\gofrkpvatl.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File opened for modification C:\Windows\SysWOW64\rfiljhtlpbkdkud.exe 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe -
Drops file in Program Files directory 14 IoCs
Processes:
gicjocqw.exegicjocqw.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gicjocqw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gicjocqw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gicjocqw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal gicjocqw.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gicjocqw.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gicjocqw.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe gicjocqw.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe gicjocqw.exe -
Drops file in Windows directory 3 IoCs
Processes:
WINWORD.EXE77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exedescription ioc process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
gofrkpvatl.exe77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C779C5682226A3777D077202CDF7CF364AC" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFFFC8E4F5F826A9141D75D7E90BDE1E633593567456345D798" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gofrkpvatl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh gofrkpvatl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gofrkpvatl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB5B158479439E853B8BAD133EDD4BE" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F56BB6FE1B21A9D27BD0D28B099163" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gofrkpvatl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1938C60B15E7DBC3B9B97C93EC9734C8" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf gofrkpvatl.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCEFAC9F964F195837A3B32819F39E4B38F028F4363033DE1C5459E08D5" 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" gofrkpvatl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs gofrkpvatl.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3172 WINWORD.EXE 3172 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exegofrkpvatl.exerfiljhtlpbkdkud.exegicjocqw.exenytpbculqkbbl.exegicjocqw.exepid process 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 380 gicjocqw.exe 380 gicjocqw.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 2172 gicjocqw.exe 2172 gicjocqw.exe 2172 gicjocqw.exe 2172 gicjocqw.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exegofrkpvatl.exerfiljhtlpbkdkud.exegicjocqw.exenytpbculqkbbl.exegicjocqw.exepid process 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 2172 gicjocqw.exe 2172 gicjocqw.exe 2172 gicjocqw.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exegofrkpvatl.exerfiljhtlpbkdkud.exegicjocqw.exenytpbculqkbbl.exegicjocqw.exepid process 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 5096 gofrkpvatl.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 3824 rfiljhtlpbkdkud.exe 380 gicjocqw.exe 380 gicjocqw.exe 380 gicjocqw.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 4300 nytpbculqkbbl.exe 2172 gicjocqw.exe 2172 gicjocqw.exe 2172 gicjocqw.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3172 WINWORD.EXE 3172 WINWORD.EXE 3172 WINWORD.EXE 3172 WINWORD.EXE 3172 WINWORD.EXE 3172 WINWORD.EXE 3172 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exegofrkpvatl.exedescription pid process target process PID 4000 wrote to memory of 5096 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gofrkpvatl.exe PID 4000 wrote to memory of 5096 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gofrkpvatl.exe PID 4000 wrote to memory of 5096 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gofrkpvatl.exe PID 4000 wrote to memory of 3824 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe rfiljhtlpbkdkud.exe PID 4000 wrote to memory of 3824 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe rfiljhtlpbkdkud.exe PID 4000 wrote to memory of 3824 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe rfiljhtlpbkdkud.exe PID 4000 wrote to memory of 380 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gicjocqw.exe PID 4000 wrote to memory of 380 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gicjocqw.exe PID 4000 wrote to memory of 380 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe gicjocqw.exe PID 4000 wrote to memory of 4300 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe nytpbculqkbbl.exe PID 4000 wrote to memory of 4300 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe nytpbculqkbbl.exe PID 4000 wrote to memory of 4300 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe nytpbculqkbbl.exe PID 4000 wrote to memory of 3172 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe WINWORD.EXE PID 4000 wrote to memory of 3172 4000 77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe WINWORD.EXE PID 5096 wrote to memory of 2172 5096 gofrkpvatl.exe gicjocqw.exe PID 5096 wrote to memory of 2172 5096 gofrkpvatl.exe gicjocqw.exe PID 5096 wrote to memory of 2172 5096 gofrkpvatl.exe gicjocqw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe"C:\Users\Admin\AppData\Local\Temp\77b0ea439c327e12480ff5471a8915900cc95a1b99ab7272675a00ea3e1510f8.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\gofrkpvatl.exegofrkpvatl.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\gicjocqw.exeC:\Windows\system32\gicjocqw.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2172 -
C:\Windows\SysWOW64\rfiljhtlpbkdkud.exerfiljhtlpbkdkud.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3824 -
C:\Windows\SysWOW64\gicjocqw.exegicjocqw.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:380 -
C:\Windows\SysWOW64\nytpbculqkbbl.exenytpbculqkbbl.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4300 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3172
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD577b6dad312d63aa9e2c6813252983daf
SHA1c78d39d07228c99fe4369cdc81343138b3321e5f
SHA2567089c80a9325a82fa9edc8240401e49755729d635d25a8873eb66bbfb2cb57bb
SHA512cb75e175b4eee51af2ab2b74d546ae5a24e7be8aa947c35245bc32895d68d138ae85c74ec2dcfa72254838f9ef62b83cf5da6f1fdad8f851524924242dfb02cb
-
Filesize
255KB
MD5878d2f691d9aebb502e92bcb520bb456
SHA10315f9edaf501303ce939c5abe68b5cbb9ce74f3
SHA256b054176a852756def97c3ed6e6c7bc4d0a13d6cb1e9b6c58505637fb8016f555
SHA512fedc9b27b9135d12a13ef84d4b12e41553bdb22333bac3f0f6a9676f776ab3d20c5c5f15bcc829f4c116c368189ff1567e5624f2a1b16c4ee8f00d4f178f4c30
-
Filesize
255KB
MD5d8424b163eca9261fb4e02c6f2a4b0aa
SHA176867fcaf7460aa14d1e4b11c52bd42ba051a22b
SHA2563271279070b1a38579d87456ab47ebf7e5a0633d7b776555ce912a8bee7e3f9a
SHA512d446939af9f43c42d876ddcaa3165695031f916af79fa53bfe8628dd8c6045385a8d6758d267d2ee0fce2473f28879daf39df8691e19c246a9401e025711a62f
-
Filesize
255KB
MD5d8424b163eca9261fb4e02c6f2a4b0aa
SHA176867fcaf7460aa14d1e4b11c52bd42ba051a22b
SHA2563271279070b1a38579d87456ab47ebf7e5a0633d7b776555ce912a8bee7e3f9a
SHA512d446939af9f43c42d876ddcaa3165695031f916af79fa53bfe8628dd8c6045385a8d6758d267d2ee0fce2473f28879daf39df8691e19c246a9401e025711a62f
-
Filesize
255KB
MD5d8424b163eca9261fb4e02c6f2a4b0aa
SHA176867fcaf7460aa14d1e4b11c52bd42ba051a22b
SHA2563271279070b1a38579d87456ab47ebf7e5a0633d7b776555ce912a8bee7e3f9a
SHA512d446939af9f43c42d876ddcaa3165695031f916af79fa53bfe8628dd8c6045385a8d6758d267d2ee0fce2473f28879daf39df8691e19c246a9401e025711a62f
-
Filesize
255KB
MD5298bd89bbe095964bff5aa7a30657f30
SHA114bb935dc4e7e1388b270087d04be05e3a85cef2
SHA2567a8aefcefd0050e2858b0a35b9879699942693c14e2de0041a038f3e46bce946
SHA512a0908020495c20f62243cc61a0990afa62b6292ed59b5d5dac60302130de4924ff62a5fab34afcffc1722924724a42a3281784f74f00d1305837272b7a6251fd
-
Filesize
255KB
MD5298bd89bbe095964bff5aa7a30657f30
SHA114bb935dc4e7e1388b270087d04be05e3a85cef2
SHA2567a8aefcefd0050e2858b0a35b9879699942693c14e2de0041a038f3e46bce946
SHA512a0908020495c20f62243cc61a0990afa62b6292ed59b5d5dac60302130de4924ff62a5fab34afcffc1722924724a42a3281784f74f00d1305837272b7a6251fd
-
Filesize
255KB
MD58f36ac331b17bd093a4f69275536c388
SHA173e1a934225894612384b193e14517d278cd320b
SHA25676a5a9f5fd3554765ba344c9194a44b9a0e59a9fd111d5545159c21c82a926a8
SHA5122092f45e554a5abde5fe303ac39d092ab6a89950e321aeeb98edc04e86911de1bae1799e0d3d00aebadd42941979f57364128541964e82d4a9d4aa4ad5e9fe81
-
Filesize
255KB
MD58f36ac331b17bd093a4f69275536c388
SHA173e1a934225894612384b193e14517d278cd320b
SHA25676a5a9f5fd3554765ba344c9194a44b9a0e59a9fd111d5545159c21c82a926a8
SHA5122092f45e554a5abde5fe303ac39d092ab6a89950e321aeeb98edc04e86911de1bae1799e0d3d00aebadd42941979f57364128541964e82d4a9d4aa4ad5e9fe81
-
Filesize
255KB
MD5d808d304db7b551b3b8f429fe3fa94ce
SHA1d860177e9cf682386c76cf2ecde3ab8648b073b0
SHA256d4db9d95feed245676b671ee642fdc1cc858493571492576abbdb1982fda7137
SHA512a24b010f50d86d4e206a3a4a6cf1a84a74486a96af21bd6886d07868baa6f06487d4bf0902b91ad0137de7f2c6f72b9aa47430cbe1ef9052137a7de4e0a919b9
-
Filesize
255KB
MD5d808d304db7b551b3b8f429fe3fa94ce
SHA1d860177e9cf682386c76cf2ecde3ab8648b073b0
SHA256d4db9d95feed245676b671ee642fdc1cc858493571492576abbdb1982fda7137
SHA512a24b010f50d86d4e206a3a4a6cf1a84a74486a96af21bd6886d07868baa6f06487d4bf0902b91ad0137de7f2c6f72b9aa47430cbe1ef9052137a7de4e0a919b9
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7