Analysis
-
max time kernel
154s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
Resource
win10v2004-20221111-en
General
-
Target
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
-
Size
255KB
-
MD5
e81ae6bf902b5f9948886395b8bcbe80
-
SHA1
eff4bf340bba164d00e05a3d575c68634669f920
-
SHA256
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007
-
SHA512
4bab12495fb5b4f07bd8a85234f14590c365f6159eb35d79879b88bd3c43af9948ca468b53cee2f1bfc9c8e5d9a390fc058fb1fb13dd6d7fef34877c7da27ef6
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ5:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" xgpxqavxlb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xgpxqavxlb.exe -
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" xgpxqavxlb.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xgpxqavxlb.exe -
Executes dropped EXE 5 IoCs
Processes:
xgpxqavxlb.exeyoljoryyheuhjwh.exehxoczmjp.exefgonkpzdpuiks.exehxoczmjp.exepid process 4932 xgpxqavxlb.exe 1748 yoljoryyheuhjwh.exe 3704 hxoczmjp.exe 1688 fgonkpzdpuiks.exe 2820 hxoczmjp.exe -
Processes:
resource yara_rule C:\Windows\SysWOW64\xgpxqavxlb.exe upx behavioral2/memory/1808-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\yoljoryyheuhjwh.exe upx C:\Windows\SysWOW64\hxoczmjp.exe upx C:\Windows\SysWOW64\fgonkpzdpuiks.exe upx C:\Windows\SysWOW64\fgonkpzdpuiks.exe upx C:\Windows\SysWOW64\hxoczmjp.exe upx behavioral2/memory/4932-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\yoljoryyheuhjwh.exe upx C:\Windows\SysWOW64\xgpxqavxlb.exe upx behavioral2/memory/1748-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1688-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3704-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1808-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4932-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1748-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3704-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1688-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\hxoczmjp.exe upx behavioral2/memory/1808-157-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2820-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2820-159-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe -
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xgpxqavxlb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
yoljoryyheuhjwh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yoljoryyheuhjwh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fcvdyaau = "xgpxqavxlb.exe" yoljoryyheuhjwh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dvowlakt = "yoljoryyheuhjwh.exe" yoljoryyheuhjwh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "fgonkpzdpuiks.exe" yoljoryyheuhjwh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hxoczmjp.exexgpxqavxlb.exehxoczmjp.exedescription ioc process File opened (read-only) \??\k: hxoczmjp.exe File opened (read-only) \??\o: hxoczmjp.exe File opened (read-only) \??\e: xgpxqavxlb.exe File opened (read-only) \??\s: xgpxqavxlb.exe File opened (read-only) \??\s: hxoczmjp.exe File opened (read-only) \??\a: hxoczmjp.exe File opened (read-only) \??\l: hxoczmjp.exe File opened (read-only) \??\m: hxoczmjp.exe File opened (read-only) \??\z: xgpxqavxlb.exe File opened (read-only) \??\o: hxoczmjp.exe File opened (read-only) \??\g: hxoczmjp.exe File opened (read-only) \??\r: hxoczmjp.exe File opened (read-only) \??\s: hxoczmjp.exe File opened (read-only) \??\b: xgpxqavxlb.exe File opened (read-only) \??\n: xgpxqavxlb.exe File opened (read-only) \??\t: hxoczmjp.exe File opened (read-only) \??\b: hxoczmjp.exe File opened (read-only) \??\z: hxoczmjp.exe File opened (read-only) \??\i: xgpxqavxlb.exe File opened (read-only) \??\j: xgpxqavxlb.exe File opened (read-only) \??\u: xgpxqavxlb.exe File opened (read-only) \??\q: hxoczmjp.exe File opened (read-only) \??\e: hxoczmjp.exe File opened (read-only) \??\u: hxoczmjp.exe File opened (read-only) \??\w: xgpxqavxlb.exe File opened (read-only) \??\x: xgpxqavxlb.exe File opened (read-only) \??\e: hxoczmjp.exe File opened (read-only) \??\r: hxoczmjp.exe File opened (read-only) \??\n: hxoczmjp.exe File opened (read-only) \??\x: hxoczmjp.exe File opened (read-only) \??\y: hxoczmjp.exe File opened (read-only) \??\g: xgpxqavxlb.exe File opened (read-only) \??\y: hxoczmjp.exe File opened (read-only) \??\j: hxoczmjp.exe File opened (read-only) \??\q: hxoczmjp.exe File opened (read-only) \??\i: hxoczmjp.exe File opened (read-only) \??\k: hxoczmjp.exe File opened (read-only) \??\w: hxoczmjp.exe File opened (read-only) \??\h: hxoczmjp.exe File opened (read-only) \??\p: hxoczmjp.exe File opened (read-only) \??\m: xgpxqavxlb.exe File opened (read-only) \??\m: hxoczmjp.exe File opened (read-only) \??\p: xgpxqavxlb.exe File opened (read-only) \??\r: xgpxqavxlb.exe File opened (read-only) \??\t: xgpxqavxlb.exe File opened (read-only) \??\v: xgpxqavxlb.exe File opened (read-only) \??\f: xgpxqavxlb.exe File opened (read-only) \??\h: hxoczmjp.exe File opened (read-only) \??\i: hxoczmjp.exe File opened (read-only) \??\t: hxoczmjp.exe File opened (read-only) \??\v: hxoczmjp.exe File opened (read-only) \??\k: xgpxqavxlb.exe File opened (read-only) \??\z: hxoczmjp.exe File opened (read-only) \??\a: xgpxqavxlb.exe File opened (read-only) \??\f: hxoczmjp.exe File opened (read-only) \??\n: hxoczmjp.exe File opened (read-only) \??\v: hxoczmjp.exe File opened (read-only) \??\q: xgpxqavxlb.exe File opened (read-only) \??\a: hxoczmjp.exe File opened (read-only) \??\g: hxoczmjp.exe File opened (read-only) \??\u: hxoczmjp.exe File opened (read-only) \??\x: hxoczmjp.exe File opened (read-only) \??\w: hxoczmjp.exe File opened (read-only) \??\h: xgpxqavxlb.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
xgpxqavxlb.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" xgpxqavxlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" xgpxqavxlb.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1808-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4932-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1748-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1688-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3704-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1808-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4932-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1748-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3704-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1688-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1808-157-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2820-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2820-159-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exedescription ioc process File created C:\Windows\SysWOW64\xgpxqavxlb.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\yoljoryyheuhjwh.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\hxoczmjp.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\xgpxqavxlb.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\yoljoryyheuhjwh.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\hxoczmjp.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\fgonkpzdpuiks.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\fgonkpzdpuiks.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll xgpxqavxlb.exe -
Drops file in Program Files directory 14 IoCs
Processes:
hxoczmjp.exehxoczmjp.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hxoczmjp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hxoczmjp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hxoczmjp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hxoczmjp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hxoczmjp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hxoczmjp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hxoczmjp.exe -
Drops file in Windows directory 3 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8CFFFB482F851F9133D65C7EE6BD90E6325842674E6335D6EE" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs xgpxqavxlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B05B47E1399A52C4BAA6329FD4BF" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1844C70C15EDDBC7B8C87CE5ED9537CD" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" xgpxqavxlb.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32322C7F9D5082576D4676D177202DD67D8264DB" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBCFABBF961F193837F3A4381EB3E98B0FE02F142140348E1C445E708A2" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F76BB6FF1D21DCD179D0D68A789016" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat xgpxqavxlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" xgpxqavxlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" xgpxqavxlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc xgpxqavxlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" xgpxqavxlb.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4980 WINWORD.EXE 4980 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exehxoczmjp.exeyoljoryyheuhjwh.exepid process 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 4932 xgpxqavxlb.exe 3704 hxoczmjp.exe 4932 xgpxqavxlb.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exeyoljoryyheuhjwh.exehxoczmjp.exefgonkpzdpuiks.exehxoczmjp.exepid process 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 2820 hxoczmjp.exe 2820 hxoczmjp.exe 2820 hxoczmjp.exe -
Suspicious use of SendNotifyMessage 19 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exeyoljoryyheuhjwh.exehxoczmjp.exefgonkpzdpuiks.exehxoczmjp.exepid process 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 4932 xgpxqavxlb.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 1748 yoljoryyheuhjwh.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 3704 hxoczmjp.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 1688 fgonkpzdpuiks.exe 2820 hxoczmjp.exe 2820 hxoczmjp.exe 2820 hxoczmjp.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE 4980 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexgpxqavxlb.exedescription pid process target process PID 1808 wrote to memory of 4932 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xgpxqavxlb.exe PID 1808 wrote to memory of 4932 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xgpxqavxlb.exe PID 1808 wrote to memory of 4932 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xgpxqavxlb.exe PID 1808 wrote to memory of 1748 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe yoljoryyheuhjwh.exe PID 1808 wrote to memory of 1748 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe yoljoryyheuhjwh.exe PID 1808 wrote to memory of 1748 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe yoljoryyheuhjwh.exe PID 1808 wrote to memory of 3704 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe hxoczmjp.exe PID 1808 wrote to memory of 3704 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe hxoczmjp.exe PID 1808 wrote to memory of 3704 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe hxoczmjp.exe PID 1808 wrote to memory of 1688 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe fgonkpzdpuiks.exe PID 1808 wrote to memory of 1688 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe fgonkpzdpuiks.exe PID 1808 wrote to memory of 1688 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe fgonkpzdpuiks.exe PID 4932 wrote to memory of 2820 4932 xgpxqavxlb.exe hxoczmjp.exe PID 4932 wrote to memory of 2820 4932 xgpxqavxlb.exe hxoczmjp.exe PID 4932 wrote to memory of 2820 4932 xgpxqavxlb.exe hxoczmjp.exe PID 1808 wrote to memory of 4980 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE PID 1808 wrote to memory of 4980 1808 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe"C:\Users\Admin\AppData\Local\Temp\74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\xgpxqavxlb.exexgpxqavxlb.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\hxoczmjp.exeC:\Windows\system32\hxoczmjp.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2820 -
C:\Windows\SysWOW64\yoljoryyheuhjwh.exeyoljoryyheuhjwh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1748 -
C:\Windows\SysWOW64\fgonkpzdpuiks.exefgonkpzdpuiks.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1688 -
C:\Windows\SysWOW64\hxoczmjp.exehxoczmjp.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3704 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4980
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5f071648453c9a295790898483500fe79
SHA15f7c06456dd7f458c14713a3eb885473a8aa5628
SHA256079e5c3d4f527eb9029e2a4543b7236a749b04507d2e628f760275caa8b2d97d
SHA512f1538ae051504599d3b7722e4d23525922e2c6ac0916cdf99fbece13f407f62abd8f226ecc2efff27468b89c79366da29e0bc56df1fdc2f9b9559e75625e645b
-
Filesize
255KB
MD5a018ea6b4ac42c5055c5b91ab3f53b19
SHA12a3de1fa068f077af1ef03419f1b755fd8ab63f6
SHA25694d1674877a02b78a824da3296c21d3bf5f95336a203c994c451a2c403b7ca86
SHA512fd633347bf4f0db65fb847c007e4e83f603b51a2947d27144482a546fac5fd5f161ff829b38c3629acd099e9f4075e3632e6742b8a7409d6e9bc2ce0329c1d8a
-
Filesize
255KB
MD5a018ea6b4ac42c5055c5b91ab3f53b19
SHA12a3de1fa068f077af1ef03419f1b755fd8ab63f6
SHA25694d1674877a02b78a824da3296c21d3bf5f95336a203c994c451a2c403b7ca86
SHA512fd633347bf4f0db65fb847c007e4e83f603b51a2947d27144482a546fac5fd5f161ff829b38c3629acd099e9f4075e3632e6742b8a7409d6e9bc2ce0329c1d8a
-
Filesize
255KB
MD5a878d30356ba032ab65a865563790205
SHA1a26d8bd2033e93acc3a9476ea1cf79dfd52513c1
SHA25688408df55a7e6649f262f6643ff8a33a9d7378089828220d46ea67f363765a35
SHA5129c00d65a4d88373d9d7ed4471f0e0f4ff88b78db9d6033c9963ee08d286a93f9711acc3c23e943402f0839d3c066cdbb7445ce1ad56cf145880fafb8ac33b4c8
-
Filesize
255KB
MD5a878d30356ba032ab65a865563790205
SHA1a26d8bd2033e93acc3a9476ea1cf79dfd52513c1
SHA25688408df55a7e6649f262f6643ff8a33a9d7378089828220d46ea67f363765a35
SHA5129c00d65a4d88373d9d7ed4471f0e0f4ff88b78db9d6033c9963ee08d286a93f9711acc3c23e943402f0839d3c066cdbb7445ce1ad56cf145880fafb8ac33b4c8
-
Filesize
255KB
MD5a878d30356ba032ab65a865563790205
SHA1a26d8bd2033e93acc3a9476ea1cf79dfd52513c1
SHA25688408df55a7e6649f262f6643ff8a33a9d7378089828220d46ea67f363765a35
SHA5129c00d65a4d88373d9d7ed4471f0e0f4ff88b78db9d6033c9963ee08d286a93f9711acc3c23e943402f0839d3c066cdbb7445ce1ad56cf145880fafb8ac33b4c8
-
Filesize
255KB
MD521e63fa0a3aeec38c2bef4013cfcdfe2
SHA15fe17b2846cbc5ef46b6d54e9caba2f77ced02cb
SHA25626933c5ca27e176a881b69ec9a30859f7d8a865ce2d283a34bfc4a754cbe6d06
SHA5126d3a319cd07964515d340a2f6a4fb2c362e07f89c0801956834062aeda95e78392624647a4cbdcd6b5fccf94a43241d0ea40178c90ee7802209fec5e3a776ee4
-
Filesize
255KB
MD521e63fa0a3aeec38c2bef4013cfcdfe2
SHA15fe17b2846cbc5ef46b6d54e9caba2f77ced02cb
SHA25626933c5ca27e176a881b69ec9a30859f7d8a865ce2d283a34bfc4a754cbe6d06
SHA5126d3a319cd07964515d340a2f6a4fb2c362e07f89c0801956834062aeda95e78392624647a4cbdcd6b5fccf94a43241d0ea40178c90ee7802209fec5e3a776ee4
-
Filesize
255KB
MD5a0a384ee18de79972fbc06490fb2f3d9
SHA1893e90ce5b0159d39aab0cd1564013d9e83f8745
SHA256da4abc39be081a4fdfc79751f46fc88e1cb8c2ff739a4d6a9699fbfed0a5edda
SHA512ffa31da21282c64c3cb2957085d209f68f9c69392ebfa9cb404f8f7c20f293fe5fab95384d0976bd083268c666b624ebdc39b1584b52a6d1b78d848a8cf774cb
-
Filesize
255KB
MD5a0a384ee18de79972fbc06490fb2f3d9
SHA1893e90ce5b0159d39aab0cd1564013d9e83f8745
SHA256da4abc39be081a4fdfc79751f46fc88e1cb8c2ff739a4d6a9699fbfed0a5edda
SHA512ffa31da21282c64c3cb2957085d209f68f9c69392ebfa9cb404f8f7c20f293fe5fab95384d0976bd083268c666b624ebdc39b1584b52a6d1b78d848a8cf774cb
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7