Analysis
-
max time kernel
161s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:04
Behavioral task
behavioral1
Sample
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe
Resource
win7-20221111-en
General
-
Target
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe
-
Size
255KB
-
MD5
976029ff747858a500d02ae8d82be4fd
-
SHA1
82d3668bf501d003fba3bfc027bef6437978ee89
-
SHA256
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3
-
SHA512
8fab9d6e91532641cc23585dd855b5a1fd9020a7b18eab2b1e396dc2cf1d70adbe58b202219751190556feb2d54624787361bc805b133ec4739477adec86601f
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJa:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIF
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" aysdpzhcqi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aysdpzhcqi.exe -
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" aysdpzhcqi.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aysdpzhcqi.exe -
Executes dropped EXE 5 IoCs
Processes:
aysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 4940 aysdpzhcqi.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 2116 cciavxhajwbdw.exe 540 vznmmmdj.exe -
Processes:
resource yara_rule behavioral2/memory/4204-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\aysdpzhcqi.exe upx C:\Windows\SysWOW64\aysdpzhcqi.exe upx C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe upx C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe upx C:\Windows\SysWOW64\vznmmmdj.exe upx C:\Windows\SysWOW64\vznmmmdj.exe upx C:\Windows\SysWOW64\cciavxhajwbdw.exe upx C:\Windows\SysWOW64\cciavxhajwbdw.exe upx behavioral2/memory/4940-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2116-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4076-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5048-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\vznmmmdj.exe upx behavioral2/memory/540-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4204-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4204-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4940-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5048-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4076-157-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2116-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/540-159-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" aysdpzhcqi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
zdgexajzlbvwqfg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run zdgexajzlbvwqfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pyszbqtn = "aysdpzhcqi.exe" zdgexajzlbvwqfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ieyvcjeb = "zdgexajzlbvwqfg.exe" zdgexajzlbvwqfg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cciavxhajwbdw.exe" zdgexajzlbvwqfg.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vznmmmdj.exeaysdpzhcqi.exevznmmmdj.exedescription ioc process File opened (read-only) \??\v: vznmmmdj.exe File opened (read-only) \??\o: aysdpzhcqi.exe File opened (read-only) \??\u: aysdpzhcqi.exe File opened (read-only) \??\i: vznmmmdj.exe File opened (read-only) \??\j: aysdpzhcqi.exe File opened (read-only) \??\p: aysdpzhcqi.exe File opened (read-only) \??\g: vznmmmdj.exe File opened (read-only) \??\g: vznmmmdj.exe File opened (read-only) \??\s: aysdpzhcqi.exe File opened (read-only) \??\a: vznmmmdj.exe File opened (read-only) \??\u: vznmmmdj.exe File opened (read-only) \??\m: aysdpzhcqi.exe File opened (read-only) \??\r: aysdpzhcqi.exe File opened (read-only) \??\v: aysdpzhcqi.exe File opened (read-only) \??\x: aysdpzhcqi.exe File opened (read-only) \??\z: vznmmmdj.exe File opened (read-only) \??\t: vznmmmdj.exe File opened (read-only) \??\n: vznmmmdj.exe File opened (read-only) \??\g: aysdpzhcqi.exe File opened (read-only) \??\w: aysdpzhcqi.exe File opened (read-only) \??\h: vznmmmdj.exe File opened (read-only) \??\i: vznmmmdj.exe File opened (read-only) \??\j: vznmmmdj.exe File opened (read-only) \??\q: vznmmmdj.exe File opened (read-only) \??\s: vznmmmdj.exe File opened (read-only) \??\l: aysdpzhcqi.exe File opened (read-only) \??\e: vznmmmdj.exe File opened (read-only) \??\h: aysdpzhcqi.exe File opened (read-only) \??\m: vznmmmdj.exe File opened (read-only) \??\x: vznmmmdj.exe File opened (read-only) \??\a: aysdpzhcqi.exe File opened (read-only) \??\t: vznmmmdj.exe File opened (read-only) \??\q: aysdpzhcqi.exe File opened (read-only) \??\b: vznmmmdj.exe File opened (read-only) \??\o: vznmmmdj.exe File opened (read-only) \??\s: vznmmmdj.exe File opened (read-only) \??\p: vznmmmdj.exe File opened (read-only) \??\r: vznmmmdj.exe File opened (read-only) \??\u: vznmmmdj.exe File opened (read-only) \??\w: vznmmmdj.exe File opened (read-only) \??\z: vznmmmdj.exe File opened (read-only) \??\n: aysdpzhcqi.exe File opened (read-only) \??\y: aysdpzhcqi.exe File opened (read-only) \??\z: aysdpzhcqi.exe File opened (read-only) \??\m: vznmmmdj.exe File opened (read-only) \??\p: vznmmmdj.exe File opened (read-only) \??\l: vznmmmdj.exe File opened (read-only) \??\l: vznmmmdj.exe File opened (read-only) \??\f: aysdpzhcqi.exe File opened (read-only) \??\i: aysdpzhcqi.exe File opened (read-only) \??\j: vznmmmdj.exe File opened (read-only) \??\b: vznmmmdj.exe File opened (read-only) \??\o: vznmmmdj.exe File opened (read-only) \??\y: vznmmmdj.exe File opened (read-only) \??\k: aysdpzhcqi.exe File opened (read-only) \??\k: vznmmmdj.exe File opened (read-only) \??\y: vznmmmdj.exe File opened (read-only) \??\f: vznmmmdj.exe File opened (read-only) \??\v: vznmmmdj.exe File opened (read-only) \??\r: vznmmmdj.exe File opened (read-only) \??\x: vznmmmdj.exe File opened (read-only) \??\t: aysdpzhcqi.exe File opened (read-only) \??\e: vznmmmdj.exe File opened (read-only) \??\f: vznmmmdj.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
aysdpzhcqi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" aysdpzhcqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" aysdpzhcqi.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4940-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2116-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4076-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5048-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/540-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4204-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4204-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4940-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5048-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4076-157-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2116-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/540-159-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exedescription ioc process File created C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File created C:\Windows\SysWOW64\vznmmmdj.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File created C:\Windows\SysWOW64\cciavxhajwbdw.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\SysWOW64\cciavxhajwbdw.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File created C:\Windows\SysWOW64\aysdpzhcqi.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\SysWOW64\aysdpzhcqi.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\SysWOW64\zdgexajzlbvwqfg.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\SysWOW64\vznmmmdj.exe 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll aysdpzhcqi.exe -
Drops file in Program Files directory 15 IoCs
Processes:
vznmmmdj.exevznmmmdj.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vznmmmdj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vznmmmdj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal vznmmmdj.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe vznmmmdj.exe -
Drops file in Windows directory 3 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBFFAB0F96AF1E584783B4086EA3EE2B0FA028F4215023EE2CF42E608D4" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFFFF482985699045D62F7D9DBD97E141584067456343D6EA" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33422D089D5183206D4577A1702E2CDD7C8F64AB" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh aysdpzhcqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F168C3FF6722A9D272D1D68B7D9164" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB6B02047E039EF53BABAA632EAD7CC" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1849C6741490DBC4B8BE7C97EDE234CB" 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" aysdpzhcqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" aysdpzhcqi.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4060 WINWORD.EXE 4060 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exepid process 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 540 vznmmmdj.exe 540 vznmmmdj.exe 540 vznmmmdj.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exezdgexajzlbvwqfg.exevznmmmdj.execciavxhajwbdw.exevznmmmdj.exepid process 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 4940 aysdpzhcqi.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 5048 zdgexajzlbvwqfg.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 4076 vznmmmdj.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 2116 cciavxhajwbdw.exe 540 vznmmmdj.exe 540 vznmmmdj.exe 540 vznmmmdj.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4060 WINWORD.EXE 4060 WINWORD.EXE 4060 WINWORD.EXE 4060 WINWORD.EXE 4060 WINWORD.EXE 4060 WINWORD.EXE 4060 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exeaysdpzhcqi.exedescription pid process target process PID 4204 wrote to memory of 4940 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe aysdpzhcqi.exe PID 4204 wrote to memory of 4940 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe aysdpzhcqi.exe PID 4204 wrote to memory of 4940 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe aysdpzhcqi.exe PID 4204 wrote to memory of 5048 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe zdgexajzlbvwqfg.exe PID 4204 wrote to memory of 5048 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe zdgexajzlbvwqfg.exe PID 4204 wrote to memory of 5048 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe zdgexajzlbvwqfg.exe PID 4204 wrote to memory of 4076 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe vznmmmdj.exe PID 4204 wrote to memory of 4076 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe vznmmmdj.exe PID 4204 wrote to memory of 4076 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe vznmmmdj.exe PID 4204 wrote to memory of 2116 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe cciavxhajwbdw.exe PID 4204 wrote to memory of 2116 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe cciavxhajwbdw.exe PID 4204 wrote to memory of 2116 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe cciavxhajwbdw.exe PID 4940 wrote to memory of 540 4940 aysdpzhcqi.exe vznmmmdj.exe PID 4940 wrote to memory of 540 4940 aysdpzhcqi.exe vznmmmdj.exe PID 4940 wrote to memory of 540 4940 aysdpzhcqi.exe vznmmmdj.exe PID 4204 wrote to memory of 4060 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe WINWORD.EXE PID 4204 wrote to memory of 4060 4204 5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe"C:\Users\Admin\AppData\Local\Temp\5d60f53b1aee1a136d1f5e8acdf1c12bb2e094a4547b9dd20e9f8935440148d3.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\aysdpzhcqi.exeaysdpzhcqi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\vznmmmdj.exeC:\Windows\system32\vznmmmdj.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:540
-
-
-
C:\Windows\SysWOW64\zdgexajzlbvwqfg.exezdgexajzlbvwqfg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5048
-
-
C:\Windows\SysWOW64\vznmmmdj.exevznmmmdj.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4076
-
-
C:\Windows\SysWOW64\cciavxhajwbdw.execciavxhajwbdw.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2116
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4060
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD52c232a2e8645092b994189bc3e6b8c86
SHA1ceaa8811948824c48750dfe5e2123eba864b2007
SHA256a5aadf83996a78057cdfff1f6ac5b3bf34274c35e77711f5fa34c56ebd3fce50
SHA512f277415d8f33a2a7c71d4f3de792d248c23150e8583ecedb296fa8eb44265ead9f6540777d07488923a04960d37775e3771e70bbd7fcf8127db7a08d0593eb90
-
Filesize
255KB
MD54a51ca0397bd2a6962572016488c3a1f
SHA1c35cd7ec17d7a1ffa35c0ba1d63697d29a6b9227
SHA2561129d20a792c20057b5481827d46f744dff8d103baf197576dd80505e8ed967d
SHA512d2a60d64c206fb6afd3402332594bdc371720176b1585949dc18b0b57f924e1e7be41f4909c49bc55ac65b70fe70efe10e08d982d312948f97973b9173be67f8
-
Filesize
255KB
MD5d4a9edec9332d43f4bf4e1efef4c1275
SHA12e3fc647eb2e72aa34904a7691a67a4cdbd2f9c9
SHA256dc36763e4f41c804d325778fecea7b5cf90b01e5dc9de6c1ee074ae69cc08967
SHA512d948f61d5e65212c7bf78c8bd8c6b098403e26579d1e713202572efbe056dc4337d9643eff881649af28e6dad92fea821f26c15d8859ab03cf80abb3f58cccf4
-
Filesize
255KB
MD5d4a9edec9332d43f4bf4e1efef4c1275
SHA12e3fc647eb2e72aa34904a7691a67a4cdbd2f9c9
SHA256dc36763e4f41c804d325778fecea7b5cf90b01e5dc9de6c1ee074ae69cc08967
SHA512d948f61d5e65212c7bf78c8bd8c6b098403e26579d1e713202572efbe056dc4337d9643eff881649af28e6dad92fea821f26c15d8859ab03cf80abb3f58cccf4
-
Filesize
255KB
MD5a5b1665e14c5606596b0326c9e481373
SHA1b882b18f58dda17a6baa4f5f3146173e4d2078eb
SHA2566573cecc5bd497b2abedbacfb085f9eca44b0ced3c8500f9207024f27a885e4f
SHA51293c59dc121e6ffdddeec96f1f77395c3c3fb14777a8093cb4abda27229f356688054c96193aea3d46b60373fca5687a69d6ff9b9047c68889a611df226eb438d
-
Filesize
255KB
MD5a5b1665e14c5606596b0326c9e481373
SHA1b882b18f58dda17a6baa4f5f3146173e4d2078eb
SHA2566573cecc5bd497b2abedbacfb085f9eca44b0ced3c8500f9207024f27a885e4f
SHA51293c59dc121e6ffdddeec96f1f77395c3c3fb14777a8093cb4abda27229f356688054c96193aea3d46b60373fca5687a69d6ff9b9047c68889a611df226eb438d
-
Filesize
255KB
MD59f4ea1e58b7fa002b71e47e5f58aafec
SHA1670f8e912165612bfdc4d58e5302d43ccbd8dd41
SHA2565239cdadb51c5a568d98203c27c4705fd996bdd17cc7bf90eb5b3cdd41e73c12
SHA5128fa306aac019d2e74cd62cf695f2320d5ea9e48d1b298d8eaeac8a0e905271c2f99aa23e540583bd25facad7bb7546952ade2ab8dbabaa13df978e474e3e5b7f
-
Filesize
255KB
MD59f4ea1e58b7fa002b71e47e5f58aafec
SHA1670f8e912165612bfdc4d58e5302d43ccbd8dd41
SHA2565239cdadb51c5a568d98203c27c4705fd996bdd17cc7bf90eb5b3cdd41e73c12
SHA5128fa306aac019d2e74cd62cf695f2320d5ea9e48d1b298d8eaeac8a0e905271c2f99aa23e540583bd25facad7bb7546952ade2ab8dbabaa13df978e474e3e5b7f
-
Filesize
255KB
MD59f4ea1e58b7fa002b71e47e5f58aafec
SHA1670f8e912165612bfdc4d58e5302d43ccbd8dd41
SHA2565239cdadb51c5a568d98203c27c4705fd996bdd17cc7bf90eb5b3cdd41e73c12
SHA5128fa306aac019d2e74cd62cf695f2320d5ea9e48d1b298d8eaeac8a0e905271c2f99aa23e540583bd25facad7bb7546952ade2ab8dbabaa13df978e474e3e5b7f
-
Filesize
255KB
MD5fe3b2095748c99b6e6c03d2d5e54423e
SHA106f304269699899f3db3b01a2e4fc9bde1f9ef77
SHA25698aa7709c2cee0265ac215ff10bd4e24477269287cdfd76d6e8d887fe44243ba
SHA512050275caf54b974b605f525223fcd9cd4e05710f686338a216ce9314ccd65b09b4685291880105e19226750b59fb1da0e11873495e4f92b27f0019b61c78946b
-
Filesize
255KB
MD5fe3b2095748c99b6e6c03d2d5e54423e
SHA106f304269699899f3db3b01a2e4fc9bde1f9ef77
SHA25698aa7709c2cee0265ac215ff10bd4e24477269287cdfd76d6e8d887fe44243ba
SHA512050275caf54b974b605f525223fcd9cd4e05710f686338a216ce9314ccd65b09b4685291880105e19226750b59fb1da0e11873495e4f92b27f0019b61c78946b
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7