Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:04
Behavioral task
behavioral1
Sample
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe
Resource
win7-20220812-en
General
-
Target
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe
-
Size
255KB
-
MD5
7d5dc99d15d0b9b3b86665c091fad166
-
SHA1
c50b78c1dd46fb4a283f1532268390454a7181cf
-
SHA256
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be
-
SHA512
bd0370c6e297c3ed120e1299fb13591b757d563310b6a2a78b97ed4617eebb5c14702a194d76a9840299ca117d1bab6b14ebf44922b776afb567a36ee383d7e3
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ1:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rgeakkdahd.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rgeakkdahd.exe -
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rgeakkdahd.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rgeakkdahd.exe -
Executes dropped EXE 5 IoCs
Processes:
rgeakkdahd.execlwhlgtxvhnjjed.exexgvqmpak.exepahplvtsculme.exexgvqmpak.exepid process 1068 rgeakkdahd.exe 2236 clwhlgtxvhnjjed.exe 4056 xgvqmpak.exe 4748 pahplvtsculme.exe 4080 xgvqmpak.exe -
Processes:
resource yara_rule behavioral2/memory/3492-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\rgeakkdahd.exe upx C:\Windows\SysWOW64\rgeakkdahd.exe upx C:\Windows\SysWOW64\clwhlgtxvhnjjed.exe upx C:\Windows\SysWOW64\clwhlgtxvhnjjed.exe upx C:\Windows\SysWOW64\xgvqmpak.exe upx C:\Windows\SysWOW64\pahplvtsculme.exe upx C:\Windows\SysWOW64\pahplvtsculme.exe upx C:\Windows\SysWOW64\xgvqmpak.exe upx C:\Windows\SysWOW64\xgvqmpak.exe upx behavioral2/memory/1068-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2236-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4056-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4080-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4748-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3492-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3492-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1068-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4056-157-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2236-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4080-159-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4748-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rgeakkdahd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
clwhlgtxvhnjjed.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run clwhlgtxvhnjjed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aqxkzfmp = "rgeakkdahd.exe" clwhlgtxvhnjjed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qkylhxoc = "clwhlgtxvhnjjed.exe" clwhlgtxvhnjjed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "pahplvtsculme.exe" clwhlgtxvhnjjed.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
xgvqmpak.exergeakkdahd.exexgvqmpak.exedescription ioc process File opened (read-only) \??\m: xgvqmpak.exe File opened (read-only) \??\p: xgvqmpak.exe File opened (read-only) \??\y: xgvqmpak.exe File opened (read-only) \??\g: rgeakkdahd.exe File opened (read-only) \??\n: rgeakkdahd.exe File opened (read-only) \??\i: xgvqmpak.exe File opened (read-only) \??\v: xgvqmpak.exe File opened (read-only) \??\i: rgeakkdahd.exe File opened (read-only) \??\e: xgvqmpak.exe File opened (read-only) \??\r: xgvqmpak.exe File opened (read-only) \??\b: xgvqmpak.exe File opened (read-only) \??\e: xgvqmpak.exe File opened (read-only) \??\z: xgvqmpak.exe File opened (read-only) \??\t: xgvqmpak.exe File opened (read-only) \??\x: rgeakkdahd.exe File opened (read-only) \??\n: xgvqmpak.exe File opened (read-only) \??\l: xgvqmpak.exe File opened (read-only) \??\l: xgvqmpak.exe File opened (read-only) \??\t: xgvqmpak.exe File opened (read-only) \??\i: xgvqmpak.exe File opened (read-only) \??\p: xgvqmpak.exe File opened (read-only) \??\a: rgeakkdahd.exe File opened (read-only) \??\p: rgeakkdahd.exe File opened (read-only) \??\v: rgeakkdahd.exe File opened (read-only) \??\f: xgvqmpak.exe File opened (read-only) \??\v: xgvqmpak.exe File opened (read-only) \??\s: xgvqmpak.exe File opened (read-only) \??\e: rgeakkdahd.exe File opened (read-only) \??\t: rgeakkdahd.exe File opened (read-only) \??\a: xgvqmpak.exe File opened (read-only) \??\z: xgvqmpak.exe File opened (read-only) \??\h: xgvqmpak.exe File opened (read-only) \??\y: xgvqmpak.exe File opened (read-only) \??\u: xgvqmpak.exe File opened (read-only) \??\k: rgeakkdahd.exe File opened (read-only) \??\w: rgeakkdahd.exe File opened (read-only) \??\q: xgvqmpak.exe File opened (read-only) \??\f: xgvqmpak.exe File opened (read-only) \??\w: xgvqmpak.exe File opened (read-only) \??\x: xgvqmpak.exe File opened (read-only) \??\j: rgeakkdahd.exe File opened (read-only) \??\q: rgeakkdahd.exe File opened (read-only) \??\b: xgvqmpak.exe File opened (read-only) \??\y: rgeakkdahd.exe File opened (read-only) \??\m: rgeakkdahd.exe File opened (read-only) \??\h: xgvqmpak.exe File opened (read-only) \??\x: xgvqmpak.exe File opened (read-only) \??\r: xgvqmpak.exe File opened (read-only) \??\g: xgvqmpak.exe File opened (read-only) \??\j: xgvqmpak.exe File opened (read-only) \??\k: xgvqmpak.exe File opened (read-only) \??\o: xgvqmpak.exe File opened (read-only) \??\z: rgeakkdahd.exe File opened (read-only) \??\j: xgvqmpak.exe File opened (read-only) \??\k: xgvqmpak.exe File opened (read-only) \??\q: xgvqmpak.exe File opened (read-only) \??\s: rgeakkdahd.exe File opened (read-only) \??\u: rgeakkdahd.exe File opened (read-only) \??\o: xgvqmpak.exe File opened (read-only) \??\s: xgvqmpak.exe File opened (read-only) \??\m: xgvqmpak.exe File opened (read-only) \??\h: rgeakkdahd.exe File opened (read-only) \??\l: rgeakkdahd.exe File opened (read-only) \??\o: rgeakkdahd.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
rgeakkdahd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rgeakkdahd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rgeakkdahd.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1068-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2236-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4056-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4080-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4748-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3492-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3492-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1068-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4056-157-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2236-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4080-159-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4748-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exergeakkdahd.exedescription ioc process File created C:\Windows\SysWOW64\clwhlgtxvhnjjed.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\SysWOW64\clwhlgtxvhnjjed.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\SysWOW64\xgvqmpak.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File created C:\Windows\SysWOW64\pahplvtsculme.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rgeakkdahd.exe File created C:\Windows\SysWOW64\rgeakkdahd.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\SysWOW64\rgeakkdahd.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File created C:\Windows\SysWOW64\xgvqmpak.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\SysWOW64\pahplvtsculme.exe 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe -
Drops file in Program Files directory 15 IoCs
Processes:
xgvqmpak.exexgvqmpak.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xgvqmpak.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xgvqmpak.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xgvqmpak.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xgvqmpak.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xgvqmpak.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xgvqmpak.exe -
Drops file in Windows directory 3 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
rgeakkdahd.exe6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rgeakkdahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rgeakkdahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rgeakkdahd.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1938C67A1490DAB7B8CC7F95ED9134CA" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F068B4FF6C21AAD17AD0A88A74906A" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rgeakkdahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" rgeakkdahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C7F9C2C83276A3776A270222CDF7D8664DD" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACDFAB8FE6AF191837C3B46819F3E99B38902FC43660333E1C4429E08D5" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" rgeakkdahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf rgeakkdahd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B12D449338E353BAB9D232EDD7CD" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rgeakkdahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rgeakkdahd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc rgeakkdahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" rgeakkdahd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8EFFF94828826A9134D6217E91BCEEE131584267346333D791" 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh rgeakkdahd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2184 WINWORD.EXE 2184 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exergeakkdahd.execlwhlgtxvhnjjed.exexgvqmpak.exepahplvtsculme.exexgvqmpak.exepid process 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exergeakkdahd.execlwhlgtxvhnjjed.exepahplvtsculme.exexgvqmpak.exexgvqmpak.exepid process 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exergeakkdahd.execlwhlgtxvhnjjed.exepahplvtsculme.exexgvqmpak.exexgvqmpak.exepid process 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 1068 rgeakkdahd.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 2236 clwhlgtxvhnjjed.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4748 pahplvtsculme.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4056 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe 4080 xgvqmpak.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2184 WINWORD.EXE 2184 WINWORD.EXE 2184 WINWORD.EXE 2184 WINWORD.EXE 2184 WINWORD.EXE 2184 WINWORD.EXE 2184 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exergeakkdahd.exedescription pid process target process PID 3492 wrote to memory of 1068 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe rgeakkdahd.exe PID 3492 wrote to memory of 1068 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe rgeakkdahd.exe PID 3492 wrote to memory of 1068 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe rgeakkdahd.exe PID 3492 wrote to memory of 2236 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe clwhlgtxvhnjjed.exe PID 3492 wrote to memory of 2236 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe clwhlgtxvhnjjed.exe PID 3492 wrote to memory of 2236 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe clwhlgtxvhnjjed.exe PID 3492 wrote to memory of 4056 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe xgvqmpak.exe PID 3492 wrote to memory of 4056 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe xgvqmpak.exe PID 3492 wrote to memory of 4056 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe xgvqmpak.exe PID 3492 wrote to memory of 4748 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe pahplvtsculme.exe PID 3492 wrote to memory of 4748 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe pahplvtsculme.exe PID 3492 wrote to memory of 4748 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe pahplvtsculme.exe PID 1068 wrote to memory of 4080 1068 rgeakkdahd.exe xgvqmpak.exe PID 1068 wrote to memory of 4080 1068 rgeakkdahd.exe xgvqmpak.exe PID 1068 wrote to memory of 4080 1068 rgeakkdahd.exe xgvqmpak.exe PID 3492 wrote to memory of 2184 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe WINWORD.EXE PID 3492 wrote to memory of 2184 3492 6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe"C:\Users\Admin\AppData\Local\Temp\6c827141d04dd86281be55e369b256d2ecbc2071ee257a3f78753729b36bf3be.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\rgeakkdahd.exergeakkdahd.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\xgvqmpak.exeC:\Windows\system32\xgvqmpak.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4080 -
C:\Windows\SysWOW64\clwhlgtxvhnjjed.execlwhlgtxvhnjjed.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2236 -
C:\Windows\SysWOW64\xgvqmpak.exexgvqmpak.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4056 -
C:\Windows\SysWOW64\pahplvtsculme.exepahplvtsculme.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4748 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2184
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5689475d49f3b23323d337e62c51f55ef
SHA1f9b7422a1221abd04de1309d5681e5f0d3d74b26
SHA256304c18a4a5e0cef8cf84c0feab2e2cc4ab186820efbb7cf5eec0ca3ba9c3ebef
SHA51210cce599bb37dbe50589c80fcd02f72f6f073b7e34aa893877cb76a2e3f7eebf1e48d9dc85bab09a436ffb292197cf3cc51677c14708c7c73e55faf52ed81a94
-
Filesize
255KB
MD553fd7427e7d96701a1108e5957a0bc45
SHA136c74523f38ae36aa4390868b724306277282f6d
SHA2569340ff24a90fec81cc3a79dd826acb7a38e6114292eac1d49b1b473f599fcfc8
SHA512820fd9ae9132a258f2a90a830822c1d83d36abf684fd9ff1fd00905f0a8dbd20c7199129424e93050e270ad1b7d91acb390a36de2c1b568285bfcb92a20b4f13
-
Filesize
255KB
MD52dd38bbd0ca017884214a1352b85d283
SHA1352d592d3d10895cd4419b06901d355d39f271ff
SHA256c94b78153da8cdec3a3f80db9c113eb4cc52e80bc22ae10ec8f2d1012bbbdda0
SHA512f6dcdaf8a6fd41cbc7192f67d75368667a44bf554f877328318fe58bcd752cdc29e2d7eb18aef6d6c8b385bb9caefe6242da6b603cada197e2c05a6a77dc0534
-
Filesize
255KB
MD52dd38bbd0ca017884214a1352b85d283
SHA1352d592d3d10895cd4419b06901d355d39f271ff
SHA256c94b78153da8cdec3a3f80db9c113eb4cc52e80bc22ae10ec8f2d1012bbbdda0
SHA512f6dcdaf8a6fd41cbc7192f67d75368667a44bf554f877328318fe58bcd752cdc29e2d7eb18aef6d6c8b385bb9caefe6242da6b603cada197e2c05a6a77dc0534
-
Filesize
255KB
MD5fbad7ac1da687ac374ced8e577682a15
SHA1c7bc2b4d0fe8ae83913d124d79e920b65b7e4b3f
SHA25645aa7ff8d008b131403312d9c7af5a65ceaed1d2ef901862e20db4d0c430095e
SHA512cceae0abb83256424e627bf939705ffeb07ad73b8a32e32a05c8046e67a6a6343be02de56e9c641eb36d0fd61306cb9a1935ea05466d1f46abf619b6fef47781
-
Filesize
255KB
MD5fbad7ac1da687ac374ced8e577682a15
SHA1c7bc2b4d0fe8ae83913d124d79e920b65b7e4b3f
SHA25645aa7ff8d008b131403312d9c7af5a65ceaed1d2ef901862e20db4d0c430095e
SHA512cceae0abb83256424e627bf939705ffeb07ad73b8a32e32a05c8046e67a6a6343be02de56e9c641eb36d0fd61306cb9a1935ea05466d1f46abf619b6fef47781
-
Filesize
255KB
MD5619ce8b04b856627dbcbc58bd0275a61
SHA12981ec7bc8629608f92c9bb6932f435bd9f26b5c
SHA256ce588525b1956b6bfca2cb315049465c70b4a068453c6e7d2bc0dd0e885eb0c6
SHA51278b196dfd7304aed6b2c928bce79374a31d588331addfe5fc3d1a72ca52a7a77d885463605b3f5d4402bb805d4a7de005f873221a9aa39c0d837c107d053a89d
-
Filesize
255KB
MD5619ce8b04b856627dbcbc58bd0275a61
SHA12981ec7bc8629608f92c9bb6932f435bd9f26b5c
SHA256ce588525b1956b6bfca2cb315049465c70b4a068453c6e7d2bc0dd0e885eb0c6
SHA51278b196dfd7304aed6b2c928bce79374a31d588331addfe5fc3d1a72ca52a7a77d885463605b3f5d4402bb805d4a7de005f873221a9aa39c0d837c107d053a89d
-
Filesize
255KB
MD512dba5a9ea327811ec085c849be95d3a
SHA16f546bb2626d8c42b017d64f020814cc930dfe01
SHA2568ddf051d9b718d13b6436868111ca43e68ab087619490fa346f45a80d0877cfd
SHA51290da7fe6daa8a9aaba83c3a5ec2e9e184bbecdcf3d62589c9904777f629fda0ac26636c1fb2b160157df6eb20d4435402577c90f2d52c6aeac98a154761e8006
-
Filesize
255KB
MD512dba5a9ea327811ec085c849be95d3a
SHA16f546bb2626d8c42b017d64f020814cc930dfe01
SHA2568ddf051d9b718d13b6436868111ca43e68ab087619490fa346f45a80d0877cfd
SHA51290da7fe6daa8a9aaba83c3a5ec2e9e184bbecdcf3d62589c9904777f629fda0ac26636c1fb2b160157df6eb20d4435402577c90f2d52c6aeac98a154761e8006
-
Filesize
255KB
MD512dba5a9ea327811ec085c849be95d3a
SHA16f546bb2626d8c42b017d64f020814cc930dfe01
SHA2568ddf051d9b718d13b6436868111ca43e68ab087619490fa346f45a80d0877cfd
SHA51290da7fe6daa8a9aaba83c3a5ec2e9e184bbecdcf3d62589c9904777f629fda0ac26636c1fb2b160157df6eb20d4435402577c90f2d52c6aeac98a154761e8006
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7