Analysis
-
max time kernel
160s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe
Resource
win7-20221111-en
General
-
Target
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe
-
Size
255KB
-
MD5
0118fafb572f326409e0a7c487ede3ae
-
SHA1
59454507736c67fc557bfcb89802c5b407f5c604
-
SHA256
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528
-
SHA512
70cfbaeaf7fd4ae5be1bfe24e91959f36eb49e4354e243484e8a50d356b33c730cf07a13ecc976578ec8d4f19af73315f92ccc154881fd5e4728fda601aa8924
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJs:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" kdbvjkelao.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kdbvjkelao.exe -
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" kdbvjkelao.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" kdbvjkelao.exe -
Executes dropped EXE 5 IoCs
Processes:
kdbvjkelao.exektzgwcoyzoodsaz.exejrdphhhg.exeqrduxvrfgizum.exejrdphhhg.exepid process 2236 kdbvjkelao.exe 4720 ktzgwcoyzoodsaz.exe 212 jrdphhhg.exe 1892 qrduxvrfgizum.exe 3172 jrdphhhg.exe -
Processes:
resource yara_rule behavioral2/memory/1412-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\kdbvjkelao.exe upx C:\Windows\SysWOW64\kdbvjkelao.exe upx behavioral2/memory/2236-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\ktzgwcoyzoodsaz.exe upx C:\Windows\SysWOW64\ktzgwcoyzoodsaz.exe upx C:\Windows\SysWOW64\jrdphhhg.exe upx C:\Windows\SysWOW64\jrdphhhg.exe upx C:\Windows\SysWOW64\qrduxvrfgizum.exe upx C:\Windows\SysWOW64\qrduxvrfgizum.exe upx C:\Windows\SysWOW64\jrdphhhg.exe upx behavioral2/memory/4720-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1892-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/212-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3172-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1412-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx behavioral2/memory/2236-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4720-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/212-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1892-169-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3172-170-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Users\Admin\Documents\GetStart.doc.exe upx C:\Users\Admin\Documents\ResetFormat.doc.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kdbvjkelao.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
ktzgwcoyzoodsaz.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ktzgwcoyzoodsaz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\drzajotn = "kdbvjkelao.exe" ktzgwcoyzoodsaz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bopkdumy = "ktzgwcoyzoodsaz.exe" ktzgwcoyzoodsaz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qrduxvrfgizum.exe" ktzgwcoyzoodsaz.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kdbvjkelao.exejrdphhhg.exejrdphhhg.exedescription ioc process File opened (read-only) \??\y: kdbvjkelao.exe File opened (read-only) \??\x: kdbvjkelao.exe File opened (read-only) \??\b: jrdphhhg.exe File opened (read-only) \??\h: jrdphhhg.exe File opened (read-only) \??\p: jrdphhhg.exe File opened (read-only) \??\x: jrdphhhg.exe File opened (read-only) \??\q: jrdphhhg.exe File opened (read-only) \??\y: jrdphhhg.exe File opened (read-only) \??\s: kdbvjkelao.exe File opened (read-only) \??\v: kdbvjkelao.exe File opened (read-only) \??\w: jrdphhhg.exe File opened (read-only) \??\y: jrdphhhg.exe File opened (read-only) \??\h: jrdphhhg.exe File opened (read-only) \??\n: jrdphhhg.exe File opened (read-only) \??\b: kdbvjkelao.exe File opened (read-only) \??\a: jrdphhhg.exe File opened (read-only) \??\r: jrdphhhg.exe File opened (read-only) \??\o: jrdphhhg.exe File opened (read-only) \??\w: jrdphhhg.exe File opened (read-only) \??\h: kdbvjkelao.exe File opened (read-only) \??\q: kdbvjkelao.exe File opened (read-only) \??\e: jrdphhhg.exe File opened (read-only) \??\s: jrdphhhg.exe File opened (read-only) \??\v: jrdphhhg.exe File opened (read-only) \??\s: jrdphhhg.exe File opened (read-only) \??\i: kdbvjkelao.exe File opened (read-only) \??\j: kdbvjkelao.exe File opened (read-only) \??\u: jrdphhhg.exe File opened (read-only) \??\a: jrdphhhg.exe File opened (read-only) \??\t: jrdphhhg.exe File opened (read-only) \??\u: jrdphhhg.exe File opened (read-only) \??\e: kdbvjkelao.exe File opened (read-only) \??\o: kdbvjkelao.exe File opened (read-only) \??\z: jrdphhhg.exe File opened (read-only) \??\b: jrdphhhg.exe File opened (read-only) \??\o: jrdphhhg.exe File opened (read-only) \??\f: jrdphhhg.exe File opened (read-only) \??\m: jrdphhhg.exe File opened (read-only) \??\r: kdbvjkelao.exe File opened (read-only) \??\t: kdbvjkelao.exe File opened (read-only) \??\l: jrdphhhg.exe File opened (read-only) \??\q: jrdphhhg.exe File opened (read-only) \??\t: jrdphhhg.exe File opened (read-only) \??\e: jrdphhhg.exe File opened (read-only) \??\f: kdbvjkelao.exe File opened (read-only) \??\l: kdbvjkelao.exe File opened (read-only) \??\m: kdbvjkelao.exe File opened (read-only) \??\j: jrdphhhg.exe File opened (read-only) \??\k: jrdphhhg.exe File opened (read-only) \??\m: jrdphhhg.exe File opened (read-only) \??\u: kdbvjkelao.exe File opened (read-only) \??\w: kdbvjkelao.exe File opened (read-only) \??\i: jrdphhhg.exe File opened (read-only) \??\g: jrdphhhg.exe File opened (read-only) \??\g: jrdphhhg.exe File opened (read-only) \??\i: jrdphhhg.exe File opened (read-only) \??\j: jrdphhhg.exe File opened (read-only) \??\k: jrdphhhg.exe File opened (read-only) \??\x: jrdphhhg.exe File opened (read-only) \??\z: jrdphhhg.exe File opened (read-only) \??\g: kdbvjkelao.exe File opened (read-only) \??\p: kdbvjkelao.exe File opened (read-only) \??\n: jrdphhhg.exe File opened (read-only) \??\l: jrdphhhg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
kdbvjkelao.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" kdbvjkelao.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" kdbvjkelao.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1412-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2236-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4720-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1892-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/212-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3172-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1412-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2236-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4720-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/212-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1892-169-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3172-170-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exekdbvjkelao.exedescription ioc process File created C:\Windows\SysWOW64\jrdphhhg.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\kdbvjkelao.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File created C:\Windows\SysWOW64\ktzgwcoyzoodsaz.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\ktzgwcoyzoodsaz.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\qrduxvrfgizum.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll kdbvjkelao.exe File created C:\Windows\SysWOW64\kdbvjkelao.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\jrdphhhg.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File created C:\Windows\SysWOW64\qrduxvrfgizum.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe -
Drops file in Program Files directory 14 IoCs
Processes:
jrdphhhg.exejrdphhhg.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jrdphhhg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jrdphhhg.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jrdphhhg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jrdphhhg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jrdphhhg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jrdphhhg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jrdphhhg.exe -
Drops file in Windows directory 3 IoCs
Processes:
WINWORD.EXE7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
kdbvjkelao.exe7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg kdbvjkelao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1839C67E14E2DAB0B8C07FE1ED9337B9" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat kdbvjkelao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" kdbvjkelao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf kdbvjkelao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" kdbvjkelao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs kdbvjkelao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" kdbvjkelao.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC1B028479538E253BDBAA1329DD7BE" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F568B7FF6E21D9D27AD0A18B7D9164" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" kdbvjkelao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh kdbvjkelao.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc kdbvjkelao.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FCFC485F826D9030D6217E97BD92E135593766366244D799" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" kdbvjkelao.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33332C7C9C5282596A3676A270232CAB7D8F64D6" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABEF9B0FE67F1E7840C3B4286ED3E98B3FC02FB4367033DE2CD429A09A0" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" kdbvjkelao.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4088 WINWORD.EXE 4088 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exekdbvjkelao.exektzgwcoyzoodsaz.exejrdphhhg.exeqrduxvrfgizum.exejrdphhhg.exepid process 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exekdbvjkelao.exektzgwcoyzoodsaz.exejrdphhhg.exeqrduxvrfgizum.exejrdphhhg.exepid process 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exekdbvjkelao.exektzgwcoyzoodsaz.exejrdphhhg.exeqrduxvrfgizum.exejrdphhhg.exepid process 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 2236 kdbvjkelao.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 4720 ktzgwcoyzoodsaz.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 212 jrdphhhg.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 1892 qrduxvrfgizum.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe 3172 jrdphhhg.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4088 WINWORD.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE 4088 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exektzgwcoyzoodsaz.exekdbvjkelao.exedescription pid process target process PID 1412 wrote to memory of 2236 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe kdbvjkelao.exe PID 1412 wrote to memory of 2236 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe kdbvjkelao.exe PID 1412 wrote to memory of 2236 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe kdbvjkelao.exe PID 1412 wrote to memory of 4720 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ktzgwcoyzoodsaz.exe PID 1412 wrote to memory of 4720 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ktzgwcoyzoodsaz.exe PID 1412 wrote to memory of 4720 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ktzgwcoyzoodsaz.exe PID 1412 wrote to memory of 212 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jrdphhhg.exe PID 1412 wrote to memory of 212 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jrdphhhg.exe PID 1412 wrote to memory of 212 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jrdphhhg.exe PID 1412 wrote to memory of 1892 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe qrduxvrfgizum.exe PID 1412 wrote to memory of 1892 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe qrduxvrfgizum.exe PID 1412 wrote to memory of 1892 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe qrduxvrfgizum.exe PID 4720 wrote to memory of 4688 4720 ktzgwcoyzoodsaz.exe cmd.exe PID 4720 wrote to memory of 4688 4720 ktzgwcoyzoodsaz.exe cmd.exe PID 4720 wrote to memory of 4688 4720 ktzgwcoyzoodsaz.exe cmd.exe PID 2236 wrote to memory of 3172 2236 kdbvjkelao.exe jrdphhhg.exe PID 2236 wrote to memory of 3172 2236 kdbvjkelao.exe jrdphhhg.exe PID 2236 wrote to memory of 3172 2236 kdbvjkelao.exe jrdphhhg.exe PID 1412 wrote to memory of 4088 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE PID 1412 wrote to memory of 4088 1412 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe"C:\Users\Admin\AppData\Local\Temp\7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\kdbvjkelao.exekdbvjkelao.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\jrdphhhg.exeC:\Windows\system32\jrdphhhg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3172
-
-
-
C:\Windows\SysWOW64\ktzgwcoyzoodsaz.exektzgwcoyzoodsaz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd.exe /c qrduxvrfgizum.exe3⤵PID:4688
-
-
-
C:\Windows\SysWOW64\jrdphhhg.exejrdphhhg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:212
-
-
C:\Windows\SysWOW64\qrduxvrfgizum.exeqrduxvrfgizum.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1892
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4088
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD527915ec09d6ed2c523d8320df1856b0c
SHA12bf7f4e856ef5e9a0598d6849969cca3417f913a
SHA25620b08c89432fd2742d385a39fd2ba9fe3c8836fdc3f6a22cc00efeffe4738732
SHA51229afedff7e50e2b813e974159fdf5f5e9f72582feec1067606b9b014102a39fd7461482f7e219001a04eb3cdb3172e04ce7304b1cf832e41788a610cff6e0460
-
Filesize
255KB
MD5b8d163241422ef97c499773ebd03d1ec
SHA1402b2b142c90586f509cac6291345efc8bf3e187
SHA25681f22c9fcd9c1527172de269f525269ff11cbf31e337e2e78aba73d0cc0a4a0d
SHA5120a2dcbe547ed2c32f15caa329c6d403b3a2f55d814e8c3a14976b45f9eab8c3faa91640793dd978de46e8381dfdf968ce2a0acbd525b27ec99b365eb483cac16
-
Filesize
255KB
MD52bad79516acc7f68256dd587a45dce92
SHA1c22c25141fa1126a90f69c231208c0e640589f35
SHA2562e0280a811307ed303b573e995ff1ad3e8218c299bc9f775c953adba04903381
SHA512cdb5d3358b6ffbd6ba2ef58daeba855d10f69a41e2bbdec96efa180410b846a4c9aaee4d48dc673ac74bb10ba319455a7f01aea272be9635345090e8938ac9d7
-
Filesize
255KB
MD53948a5fd34a84b21bbedc7e6b99fce7d
SHA16a71673726d49f19c651afec914869cce28d90f1
SHA25683090cb2d6dc1d2220985458dd6e3bedb33de60675b95df956d8c9d7d9802277
SHA51202f372c35c11dd83fdbd012ac3f960d1a3e86b21a2e9be6d21746a0074588994f2f51cc29f7d4ea5dc5b1f6a9b3126e848fdafb5538d732b0cca6196bbd4f5fe
-
Filesize
255KB
MD5aa2f3291fe2b9a209fc21560640056c8
SHA10c95153472cd3609af70d3b6311228597af0dc6e
SHA256a49f2feae31d90c8fd56df53b5097b244332d8cd3f1f6c291e5977426049a106
SHA512fefec382a79d790283d28927ecf271ea09a912b7b24a41bfb21df8f34299b3936289d578bcf927f30a54e80cfcc2ceb0cd22693005260395776ffe091050e83b
-
Filesize
255KB
MD5aa2f3291fe2b9a209fc21560640056c8
SHA10c95153472cd3609af70d3b6311228597af0dc6e
SHA256a49f2feae31d90c8fd56df53b5097b244332d8cd3f1f6c291e5977426049a106
SHA512fefec382a79d790283d28927ecf271ea09a912b7b24a41bfb21df8f34299b3936289d578bcf927f30a54e80cfcc2ceb0cd22693005260395776ffe091050e83b
-
Filesize
255KB
MD5aa2f3291fe2b9a209fc21560640056c8
SHA10c95153472cd3609af70d3b6311228597af0dc6e
SHA256a49f2feae31d90c8fd56df53b5097b244332d8cd3f1f6c291e5977426049a106
SHA512fefec382a79d790283d28927ecf271ea09a912b7b24a41bfb21df8f34299b3936289d578bcf927f30a54e80cfcc2ceb0cd22693005260395776ffe091050e83b
-
Filesize
255KB
MD5a63271ba21ec7575ebef605d39fe09ac
SHA197c378b2e9f6551d9aaa7015f883f27a113f9efe
SHA2562935661e984d045d0a4318528a3f459057cd4b5f91a6d7a3627bbf19e70fc171
SHA51279d4cc8bb465effab0722f31f2e4899b7f75b605dbef78e69f30b485d61a2b6c05cf160a5996366681767d782388392e154a83409bdc02927bb07396be353213
-
Filesize
255KB
MD5a63271ba21ec7575ebef605d39fe09ac
SHA197c378b2e9f6551d9aaa7015f883f27a113f9efe
SHA2562935661e984d045d0a4318528a3f459057cd4b5f91a6d7a3627bbf19e70fc171
SHA51279d4cc8bb465effab0722f31f2e4899b7f75b605dbef78e69f30b485d61a2b6c05cf160a5996366681767d782388392e154a83409bdc02927bb07396be353213
-
Filesize
255KB
MD598f1257b2d54bf5ddf1155c854d19e20
SHA1d7836e0f70a7611705060559f7c9004003437cbe
SHA2563fb791985a200b4f8720c2d5e9d42a75d2224b2e2992d40e025d13a377e202d3
SHA512816652acdbb7ab4b4058a45b9201fa3469a89c1b71ae86fa487b10ded77a433e6c77546b22adce3b4cd1451b4ed60ed2c99d6ba52becc0eebc5cea61e91dbe92
-
Filesize
255KB
MD598f1257b2d54bf5ddf1155c854d19e20
SHA1d7836e0f70a7611705060559f7c9004003437cbe
SHA2563fb791985a200b4f8720c2d5e9d42a75d2224b2e2992d40e025d13a377e202d3
SHA512816652acdbb7ab4b4058a45b9201fa3469a89c1b71ae86fa487b10ded77a433e6c77546b22adce3b4cd1451b4ed60ed2c99d6ba52becc0eebc5cea61e91dbe92
-
Filesize
255KB
MD5f64c246cfa2ef410b7a66bd09ff3cbfb
SHA19964ae1d3ee08f61ff77bf284bd0e77a8bf1f02e
SHA256c6ad8aa7a37557911bd8e3cc0f15a19668e25d641f737b4a1abd13bd7971a417
SHA51289520cea5d8dba8c47d9cba6e721ee241a2ff8c619ba11a2f30474b37a5a2ced4a4c664c1582dbc92589916372948e0143570cff63c4c79d13cb9167c5fb6ffe
-
Filesize
255KB
MD5f64c246cfa2ef410b7a66bd09ff3cbfb
SHA19964ae1d3ee08f61ff77bf284bd0e77a8bf1f02e
SHA256c6ad8aa7a37557911bd8e3cc0f15a19668e25d641f737b4a1abd13bd7971a417
SHA51289520cea5d8dba8c47d9cba6e721ee241a2ff8c619ba11a2f30474b37a5a2ced4a4c664c1582dbc92589916372948e0143570cff63c4c79d13cb9167c5fb6ffe
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD527915ec09d6ed2c523d8320df1856b0c
SHA12bf7f4e856ef5e9a0598d6849969cca3417f913a
SHA25620b08c89432fd2742d385a39fd2ba9fe3c8836fdc3f6a22cc00efeffe4738732
SHA51229afedff7e50e2b813e974159fdf5f5e9f72582feec1067606b9b014102a39fd7461482f7e219001a04eb3cdb3172e04ce7304b1cf832e41788a610cff6e0460