Analysis
-
max time kernel
177s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:04
Behavioral task
behavioral1
Sample
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe
Resource
win10v2004-20221111-en
General
-
Target
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe
-
Size
255KB
-
MD5
c96b1a6425dc6b623667bc9547b3ebdb
-
SHA1
7af07d088f0e79b5075d3babb913e707002e66fb
-
SHA256
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef
-
SHA512
62d3534e01ccf955d7d5d622be8d58d2b07f8b20afd61e8f6110a64ea3364bcc6558f7fd6ee166d6149b0db4ace27593259586d98319c3bdb9a55624b510dfa2
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJC:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" aysdpzhcqi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aysdpzhcqi.exe -
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" aysdpzhcqi.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aysdpzhcqi.exe -
Executes dropped EXE 5 IoCs
Processes:
aysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 4604 aysdpzhcqi.exe 1712 zdgexajzlbvwqfg.exe 3592 vznmmmdj.exe 1444 cciavxhajwbdw.exe 4652 vznmmmdj.exe -
Processes:
resource yara_rule behavioral2/memory/544-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\aysdpzhcqi.exe upx C:\Windows\SysWOW64\aysdpzhcqi.exe upx C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe upx C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe upx C:\Windows\SysWOW64\cciavxhajwbdw.exe upx C:\Windows\SysWOW64\vznmmmdj.exe upx C:\Windows\SysWOW64\vznmmmdj.exe upx C:\Windows\SysWOW64\cciavxhajwbdw.exe upx behavioral2/memory/4604-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1712-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3592-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1444-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/544-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4604-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/544-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1712-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3592-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1444-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\vznmmmdj.exe upx behavioral2/memory/4652-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/4652-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe -
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" aysdpzhcqi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zdgexajzlbvwqfg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pyszbqtn = "aysdpzhcqi.exe" zdgexajzlbvwqfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ieyvcjeb = "zdgexajzlbvwqfg.exe" zdgexajzlbvwqfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cciavxhajwbdw.exe" zdgexajzlbvwqfg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run zdgexajzlbvwqfg.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vznmmmdj.exevznmmmdj.exeaysdpzhcqi.exedescription ioc process File opened (read-only) \??\k: vznmmmdj.exe File opened (read-only) \??\z: vznmmmdj.exe File opened (read-only) \??\y: vznmmmdj.exe File opened (read-only) \??\z: vznmmmdj.exe File opened (read-only) \??\p: aysdpzhcqi.exe File opened (read-only) \??\i: vznmmmdj.exe File opened (read-only) \??\j: vznmmmdj.exe File opened (read-only) \??\b: vznmmmdj.exe File opened (read-only) \??\o: vznmmmdj.exe File opened (read-only) \??\s: vznmmmdj.exe File opened (read-only) \??\b: vznmmmdj.exe File opened (read-only) \??\e: vznmmmdj.exe File opened (read-only) \??\v: aysdpzhcqi.exe File opened (read-only) \??\w: aysdpzhcqi.exe File opened (read-only) \??\x: aysdpzhcqi.exe File opened (read-only) \??\k: vznmmmdj.exe File opened (read-only) \??\w: vznmmmdj.exe File opened (read-only) \??\h: vznmmmdj.exe File opened (read-only) \??\q: vznmmmdj.exe File opened (read-only) \??\u: vznmmmdj.exe File opened (read-only) \??\h: aysdpzhcqi.exe File opened (read-only) \??\f: aysdpzhcqi.exe File opened (read-only) \??\u: aysdpzhcqi.exe File opened (read-only) \??\f: vznmmmdj.exe File opened (read-only) \??\p: vznmmmdj.exe File opened (read-only) \??\i: aysdpzhcqi.exe File opened (read-only) \??\j: aysdpzhcqi.exe File opened (read-only) \??\a: vznmmmdj.exe File opened (read-only) \??\r: vznmmmdj.exe File opened (read-only) \??\o: aysdpzhcqi.exe File opened (read-only) \??\r: aysdpzhcqi.exe File opened (read-only) \??\t: aysdpzhcqi.exe File opened (read-only) \??\t: vznmmmdj.exe File opened (read-only) \??\e: aysdpzhcqi.exe File opened (read-only) \??\u: vznmmmdj.exe File opened (read-only) \??\y: vznmmmdj.exe File opened (read-only) \??\m: vznmmmdj.exe File opened (read-only) \??\x: vznmmmdj.exe File opened (read-only) \??\n: vznmmmdj.exe File opened (read-only) \??\o: vznmmmdj.exe File opened (read-only) \??\l: aysdpzhcqi.exe File opened (read-only) \??\m: aysdpzhcqi.exe File opened (read-only) \??\z: aysdpzhcqi.exe File opened (read-only) \??\e: vznmmmdj.exe File opened (read-only) \??\l: vznmmmdj.exe File opened (read-only) \??\n: vznmmmdj.exe File opened (read-only) \??\t: vznmmmdj.exe File opened (read-only) \??\w: vznmmmdj.exe File opened (read-only) \??\m: vznmmmdj.exe File opened (read-only) \??\b: aysdpzhcqi.exe File opened (read-only) \??\s: aysdpzhcqi.exe File opened (read-only) \??\p: vznmmmdj.exe File opened (read-only) \??\i: vznmmmdj.exe File opened (read-only) \??\s: vznmmmdj.exe File opened (read-only) \??\v: vznmmmdj.exe File opened (read-only) \??\g: aysdpzhcqi.exe File opened (read-only) \??\v: vznmmmdj.exe File opened (read-only) \??\j: vznmmmdj.exe File opened (read-only) \??\k: aysdpzhcqi.exe File opened (read-only) \??\q: aysdpzhcqi.exe File opened (read-only) \??\y: aysdpzhcqi.exe File opened (read-only) \??\g: vznmmmdj.exe File opened (read-only) \??\r: vznmmmdj.exe File opened (read-only) \??\g: vznmmmdj.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" aysdpzhcqi.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4604-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1712-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3592-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1444-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/544-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4604-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/544-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1712-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3592-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1444-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4652-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4652-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeaysdpzhcqi.exedescription ioc process File created C:\Windows\SysWOW64\cciavxhajwbdw.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\SysWOW64\cciavxhajwbdw.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll aysdpzhcqi.exe File created C:\Windows\SysWOW64\aysdpzhcqi.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File created C:\Windows\SysWOW64\vznmmmdj.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\SysWOW64\aysdpzhcqi.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File created C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\SysWOW64\vznmmmdj.exe 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe -
Drops file in Program Files directory 14 IoCs
Processes:
vznmmmdj.exevznmmmdj.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vznmmmdj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe -
Drops file in Windows directory 3 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
aysdpzhcqi.exe6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B02047E039EF53BABAA632EAD7CC" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFFFF482985699045D62F7D9DBD97E141584067456343D6EA" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F168C3FF6722A9D272D1D68B7D9164" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1849C6741490DBC4B8BE7C97EDE234CB" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf aysdpzhcqi.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFFAB0F96AF1E584783B4086EA3EE2B0FA028F4215023EE2CF42E608D4" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33422D089D5183206D4577A1702E2CDD7C8F64AB" 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" aysdpzhcqi.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3848 WINWORD.EXE 3848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeaysdpzhcqi.exevznmmmdj.exezdgexajzlbvwqfg.execciavxhajwbdw.exepid process 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 4604 aysdpzhcqi.exe 3592 vznmmmdj.exe 4604 aysdpzhcqi.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeaysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 4652 vznmmmdj.exe 4652 vznmmmdj.exe 4652 vznmmmdj.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeaysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 4604 aysdpzhcqi.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 1712 zdgexajzlbvwqfg.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 3592 vznmmmdj.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 1444 cciavxhajwbdw.exe 4652 vznmmmdj.exe 4652 vznmmmdj.exe 4652 vznmmmdj.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3848 WINWORD.EXE 3848 WINWORD.EXE 3848 WINWORD.EXE 3848 WINWORD.EXE 3848 WINWORD.EXE 3848 WINWORD.EXE 3848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exeaysdpzhcqi.exedescription pid process target process PID 544 wrote to memory of 4604 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe aysdpzhcqi.exe PID 544 wrote to memory of 4604 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe aysdpzhcqi.exe PID 544 wrote to memory of 4604 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe aysdpzhcqi.exe PID 544 wrote to memory of 1712 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe zdgexajzlbvwqfg.exe PID 544 wrote to memory of 1712 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe zdgexajzlbvwqfg.exe PID 544 wrote to memory of 1712 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe zdgexajzlbvwqfg.exe PID 544 wrote to memory of 3592 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe vznmmmdj.exe PID 544 wrote to memory of 3592 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe vznmmmdj.exe PID 544 wrote to memory of 3592 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe vznmmmdj.exe PID 544 wrote to memory of 1444 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe cciavxhajwbdw.exe PID 544 wrote to memory of 1444 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe cciavxhajwbdw.exe PID 544 wrote to memory of 1444 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe cciavxhajwbdw.exe PID 544 wrote to memory of 3848 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe WINWORD.EXE PID 544 wrote to memory of 3848 544 6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe WINWORD.EXE PID 4604 wrote to memory of 4652 4604 aysdpzhcqi.exe vznmmmdj.exe PID 4604 wrote to memory of 4652 4604 aysdpzhcqi.exe vznmmmdj.exe PID 4604 wrote to memory of 4652 4604 aysdpzhcqi.exe vznmmmdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe"C:\Users\Admin\AppData\Local\Temp\6b07fc7cab4ffc7709df9abdd1fa205558ab984cb393011464e44c8b84997bef.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\aysdpzhcqi.exeaysdpzhcqi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\vznmmmdj.exeC:\Windows\system32\vznmmmdj.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4652 -
C:\Windows\SysWOW64\zdgexajzlbvwqfg.exezdgexajzlbvwqfg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1712 -
C:\Windows\SysWOW64\cciavxhajwbdw.execciavxhajwbdw.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1444 -
C:\Windows\SysWOW64\vznmmmdj.exevznmmmdj.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3592 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3848
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD524ea1d21c882be246617e6bd97fc7557
SHA1fb0047f92aff3708d1864e46fe2c454303c5d17d
SHA2568fd6e62f261092f16f4e46f70ab26b778b4fb332824d6224a54ad21108519631
SHA5124bf4d989bf21a0a66be2216594f8d6cdb6ca952ae92c5f4bfc0ec71958694979bb356a5b91b541d7ff0c3659a2ca0640375ad3a99dd76f6e37f6f543bfec390f
-
Filesize
255KB
MD5499782ba8e020333a45e7c28bd46a328
SHA12761a429c123e59efc7250a26be3466f7fa08e2a
SHA256a1817c69a53582c2c953e23f88457413157d94f7c00bda537c92f60ed1ded5fa
SHA5120ecc5cb29144a52b371e28263ddeb6c80a6bd41186fd0a74c23976bf75c533f8d5db37e246e3a88b0b0acf252f5501d53236258c959cdea6625b9740d4d4c22f
-
Filesize
255KB
MD5499782ba8e020333a45e7c28bd46a328
SHA12761a429c123e59efc7250a26be3466f7fa08e2a
SHA256a1817c69a53582c2c953e23f88457413157d94f7c00bda537c92f60ed1ded5fa
SHA5120ecc5cb29144a52b371e28263ddeb6c80a6bd41186fd0a74c23976bf75c533f8d5db37e246e3a88b0b0acf252f5501d53236258c959cdea6625b9740d4d4c22f
-
Filesize
255KB
MD56022df5a210c11ffce51dd81b600671c
SHA193b0e47d21767b5bc669ddf17cb4356a59444f99
SHA25601ee49e901ad968aef6ef430f218dbad653d317790317cfaa105aadbec20c043
SHA512d5a1fd4dc6091eac23c96c2676cc6bb34c035906921ac5d6044312090de861122a37158e575b92d6c06026a14486b7408f77e0ecf102c08749ca95fc8aa234ec
-
Filesize
255KB
MD56022df5a210c11ffce51dd81b600671c
SHA193b0e47d21767b5bc669ddf17cb4356a59444f99
SHA25601ee49e901ad968aef6ef430f218dbad653d317790317cfaa105aadbec20c043
SHA512d5a1fd4dc6091eac23c96c2676cc6bb34c035906921ac5d6044312090de861122a37158e575b92d6c06026a14486b7408f77e0ecf102c08749ca95fc8aa234ec
-
Filesize
255KB
MD5e461fb25d34f98c2c151d2f1f780251a
SHA1a7c9f0f7414dda0c2b16104d78b84fe4f1b8e897
SHA25603a8c9ba9fc9c2acd9fe689048504e43a82c75238ec1bd9257ecfbb4deb060bc
SHA512959c79040c9063433d1eb4cb6006b5746b03c6932eceebe351a78fea0146b89f2f43a3efc040b22d13e4a70088b017c7adf52770917522ddcb19343f7a6f28f7
-
Filesize
255KB
MD5e461fb25d34f98c2c151d2f1f780251a
SHA1a7c9f0f7414dda0c2b16104d78b84fe4f1b8e897
SHA25603a8c9ba9fc9c2acd9fe689048504e43a82c75238ec1bd9257ecfbb4deb060bc
SHA512959c79040c9063433d1eb4cb6006b5746b03c6932eceebe351a78fea0146b89f2f43a3efc040b22d13e4a70088b017c7adf52770917522ddcb19343f7a6f28f7
-
Filesize
255KB
MD5e461fb25d34f98c2c151d2f1f780251a
SHA1a7c9f0f7414dda0c2b16104d78b84fe4f1b8e897
SHA25603a8c9ba9fc9c2acd9fe689048504e43a82c75238ec1bd9257ecfbb4deb060bc
SHA512959c79040c9063433d1eb4cb6006b5746b03c6932eceebe351a78fea0146b89f2f43a3efc040b22d13e4a70088b017c7adf52770917522ddcb19343f7a6f28f7
-
Filesize
255KB
MD511c6916d120dd4a4cfe81fb54fb6144f
SHA1ff6778cc7a212ec32e0cde5c94a6692ddc726e20
SHA2563ff97f19dd6dd0d2cdc905e0389f383a214084f4ec7d563531429709a56da182
SHA512102143e18a6c130885a3fe3722af9e78b4ec99da2aaa460f23b1d2835f63dd8e8842902ac0828987538f39a1c0d0e49256b13d0fdeed60ee30baf1cf1523c683
-
Filesize
255KB
MD511c6916d120dd4a4cfe81fb54fb6144f
SHA1ff6778cc7a212ec32e0cde5c94a6692ddc726e20
SHA2563ff97f19dd6dd0d2cdc905e0389f383a214084f4ec7d563531429709a56da182
SHA512102143e18a6c130885a3fe3722af9e78b4ec99da2aaa460f23b1d2835f63dd8e8842902ac0828987538f39a1c0d0e49256b13d0fdeed60ee30baf1cf1523c683
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7