Analysis
-
max time kernel
368s -
max time network
386s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:05
Behavioral task
behavioral1
Sample
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe
Resource
win10v2004-20221111-en
General
-
Target
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe
-
Size
255KB
-
MD5
9166a8f9f0b8d5655ccd437bf6edbc98
-
SHA1
efc27cb3a6158409c9c9bdfb113049690e8d8687
-
SHA256
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd
-
SHA512
152dcfb08b943f63ffb2d92d29c6c660bbc56ddc51e148d711e14be54b164238302c1a36efcb581a239c20fb5a8f013ab425d16509e694ab90b96d13d0737be6
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ/:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tnkkbxkkwi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tnkkbxkkwi.exe -
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tnkkbxkkwi.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tnkkbxkkwi.exe -
Executes dropped EXE 5 IoCs
Processes:
tnkkbxkkwi.exepjkwvgpuzkevfab.exezdqkuexc.exefthnxpkdoeeuj.exezdqkuexc.exepid process 1212 tnkkbxkkwi.exe 4556 pjkwvgpuzkevfab.exe 3568 zdqkuexc.exe 4392 fthnxpkdoeeuj.exe 4964 zdqkuexc.exe -
Processes:
resource yara_rule behavioral2/memory/4692-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4692-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\tnkkbxkkwi.exe upx C:\Windows\SysWOW64\tnkkbxkkwi.exe upx C:\Windows\SysWOW64\pjkwvgpuzkevfab.exe upx C:\Windows\SysWOW64\pjkwvgpuzkevfab.exe upx behavioral2/memory/1212-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4556-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\zdqkuexc.exe upx C:\Windows\SysWOW64\zdqkuexc.exe upx C:\Windows\SysWOW64\fthnxpkdoeeuj.exe upx behavioral2/memory/3568-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\fthnxpkdoeeuj.exe upx C:\Windows\SysWOW64\zdqkuexc.exe upx behavioral2/memory/4692-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4964-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4964-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe -
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tnkkbxkkwi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
pjkwvgpuzkevfab.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run pjkwvgpuzkevfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\susdmpwz = "tnkkbxkkwi.exe" pjkwvgpuzkevfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xlzjhlwj = "pjkwvgpuzkevfab.exe" pjkwvgpuzkevfab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "fthnxpkdoeeuj.exe" pjkwvgpuzkevfab.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
zdqkuexc.exezdqkuexc.exetnkkbxkkwi.exedescription ioc process File opened (read-only) \??\y: zdqkuexc.exe File opened (read-only) \??\g: zdqkuexc.exe File opened (read-only) \??\l: zdqkuexc.exe File opened (read-only) \??\i: tnkkbxkkwi.exe File opened (read-only) \??\j: tnkkbxkkwi.exe File opened (read-only) \??\y: tnkkbxkkwi.exe File opened (read-only) \??\p: zdqkuexc.exe File opened (read-only) \??\t: zdqkuexc.exe File opened (read-only) \??\l: tnkkbxkkwi.exe File opened (read-only) \??\j: zdqkuexc.exe File opened (read-only) \??\e: zdqkuexc.exe File opened (read-only) \??\g: tnkkbxkkwi.exe File opened (read-only) \??\v: tnkkbxkkwi.exe File opened (read-only) \??\f: zdqkuexc.exe File opened (read-only) \??\v: zdqkuexc.exe File opened (read-only) \??\w: zdqkuexc.exe File opened (read-only) \??\h: tnkkbxkkwi.exe File opened (read-only) \??\o: zdqkuexc.exe File opened (read-only) \??\r: zdqkuexc.exe File opened (read-only) \??\r: zdqkuexc.exe File opened (read-only) \??\x: zdqkuexc.exe File opened (read-only) \??\o: tnkkbxkkwi.exe File opened (read-only) \??\t: tnkkbxkkwi.exe File opened (read-only) \??\a: zdqkuexc.exe File opened (read-only) \??\m: zdqkuexc.exe File opened (read-only) \??\s: zdqkuexc.exe File opened (read-only) \??\x: zdqkuexc.exe File opened (read-only) \??\e: tnkkbxkkwi.exe File opened (read-only) \??\f: zdqkuexc.exe File opened (read-only) \??\q: zdqkuexc.exe File opened (read-only) \??\u: zdqkuexc.exe File opened (read-only) \??\z: zdqkuexc.exe File opened (read-only) \??\b: zdqkuexc.exe File opened (read-only) \??\y: zdqkuexc.exe File opened (read-only) \??\r: tnkkbxkkwi.exe File opened (read-only) \??\p: zdqkuexc.exe File opened (read-only) \??\w: zdqkuexc.exe File opened (read-only) \??\w: tnkkbxkkwi.exe File opened (read-only) \??\e: zdqkuexc.exe File opened (read-only) \??\o: zdqkuexc.exe File opened (read-only) \??\b: zdqkuexc.exe File opened (read-only) \??\j: zdqkuexc.exe File opened (read-only) \??\m: tnkkbxkkwi.exe File opened (read-only) \??\n: tnkkbxkkwi.exe File opened (read-only) \??\q: tnkkbxkkwi.exe File opened (read-only) \??\s: zdqkuexc.exe File opened (read-only) \??\a: tnkkbxkkwi.exe File opened (read-only) \??\n: zdqkuexc.exe File opened (read-only) \??\f: tnkkbxkkwi.exe File opened (read-only) \??\u: tnkkbxkkwi.exe File opened (read-only) \??\h: zdqkuexc.exe File opened (read-only) \??\m: zdqkuexc.exe File opened (read-only) \??\h: zdqkuexc.exe File opened (read-only) \??\x: tnkkbxkkwi.exe File opened (read-only) \??\z: tnkkbxkkwi.exe File opened (read-only) \??\k: zdqkuexc.exe File opened (read-only) \??\a: zdqkuexc.exe File opened (read-only) \??\g: zdqkuexc.exe File opened (read-only) \??\q: zdqkuexc.exe File opened (read-only) \??\z: zdqkuexc.exe File opened (read-only) \??\s: tnkkbxkkwi.exe File opened (read-only) \??\k: zdqkuexc.exe File opened (read-only) \??\i: zdqkuexc.exe File opened (read-only) \??\v: zdqkuexc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
tnkkbxkkwi.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tnkkbxkkwi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tnkkbxkkwi.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4692-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1212-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4556-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3568-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4692-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4964-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4964-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exetnkkbxkkwi.exedescription ioc process File created C:\Windows\SysWOW64\tnkkbxkkwi.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File opened for modification C:\Windows\SysWOW64\pjkwvgpuzkevfab.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File opened for modification C:\Windows\SysWOW64\zdqkuexc.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tnkkbxkkwi.exe File opened for modification C:\Windows\SysWOW64\tnkkbxkkwi.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File created C:\Windows\SysWOW64\pjkwvgpuzkevfab.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File created C:\Windows\SysWOW64\zdqkuexc.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File created C:\Windows\SysWOW64\fthnxpkdoeeuj.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe File opened for modification C:\Windows\SysWOW64\fthnxpkdoeeuj.exe 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe -
Drops file in Windows directory 1 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exetnkkbxkkwi.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472C769C2283546A3E77A770562CAE7CF264AB" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1948C67D1491DAB1B8CC7CE8ECE034BC" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tnkkbxkkwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf tnkkbxkkwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg tnkkbxkkwi.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB5FABEF966F2E7840F3B46819B3E94B3FC02FF4314023FE1C8429A08A8" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tnkkbxkkwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC1B12E44EF39E952CBBAD7339DD7C5" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tnkkbxkkwi.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8CFC834828851F9030D65C7DE5BD90E13D594267426244D79E" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F268B0FF6721DCD27DD1D58B7E9060" 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tnkkbxkkwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tnkkbxkkwi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exetnkkbxkkwi.exepjkwvgpuzkevfab.exezdqkuexc.exefthnxpkdoeeuj.exezdqkuexc.exepid process 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exetnkkbxkkwi.exepjkwvgpuzkevfab.exezdqkuexc.exefthnxpkdoeeuj.exezdqkuexc.exepid process 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exetnkkbxkkwi.exepjkwvgpuzkevfab.exezdqkuexc.exefthnxpkdoeeuj.exezdqkuexc.exepid process 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 1212 tnkkbxkkwi.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 4556 pjkwvgpuzkevfab.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 3568 zdqkuexc.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4392 fthnxpkdoeeuj.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe 4964 zdqkuexc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exepjkwvgpuzkevfab.exetnkkbxkkwi.exedescription pid process target process PID 4692 wrote to memory of 1212 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe tnkkbxkkwi.exe PID 4692 wrote to memory of 1212 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe tnkkbxkkwi.exe PID 4692 wrote to memory of 1212 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe tnkkbxkkwi.exe PID 4692 wrote to memory of 4556 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe pjkwvgpuzkevfab.exe PID 4692 wrote to memory of 4556 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe pjkwvgpuzkevfab.exe PID 4692 wrote to memory of 4556 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe pjkwvgpuzkevfab.exe PID 4692 wrote to memory of 3568 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe zdqkuexc.exe PID 4692 wrote to memory of 3568 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe zdqkuexc.exe PID 4692 wrote to memory of 3568 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe zdqkuexc.exe PID 4692 wrote to memory of 4392 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe fthnxpkdoeeuj.exe PID 4692 wrote to memory of 4392 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe fthnxpkdoeeuj.exe PID 4692 wrote to memory of 4392 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe fthnxpkdoeeuj.exe PID 4556 wrote to memory of 2936 4556 pjkwvgpuzkevfab.exe cmd.exe PID 4556 wrote to memory of 2936 4556 pjkwvgpuzkevfab.exe cmd.exe PID 4556 wrote to memory of 2936 4556 pjkwvgpuzkevfab.exe cmd.exe PID 1212 wrote to memory of 4964 1212 tnkkbxkkwi.exe zdqkuexc.exe PID 1212 wrote to memory of 4964 1212 tnkkbxkkwi.exe zdqkuexc.exe PID 1212 wrote to memory of 4964 1212 tnkkbxkkwi.exe zdqkuexc.exe PID 4692 wrote to memory of 4296 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe WINWORD.EXE PID 4692 wrote to memory of 4296 4692 36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe"C:\Users\Admin\AppData\Local\Temp\36576b591ec239f59a93342e9c6e4b0390abbca28e5044a3a51e5ad1028a94fd.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\tnkkbxkkwi.exetnkkbxkkwi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\zdqkuexc.exeC:\Windows\system32\zdqkuexc.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4964 -
C:\Windows\SysWOW64\pjkwvgpuzkevfab.exepjkwvgpuzkevfab.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.execmd.exe /c fthnxpkdoeeuj.exe3⤵PID:2936
-
C:\Windows\SysWOW64\zdqkuexc.exezdqkuexc.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3568 -
C:\Windows\SysWOW64\fthnxpkdoeeuj.exefthnxpkdoeeuj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4392 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4296
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD512bef9229bc833ab8347f240da3b1e4c
SHA1c11a104a3f3bb851546eba2f6e4821cc5affa55c
SHA2568a06c7b714fcde04fb2c3eba3a00e0da232ed7ed026a813acae49637d7544f12
SHA512fc89b3437db762835bfec5d70d6c41a0a3b70b0abd514fc238f9913381d73048fa310e3c03b450c0570376f17788b24ff17a16e858cfbbee7ed5af934e6c5fd1
-
Filesize
255KB
MD512bef9229bc833ab8347f240da3b1e4c
SHA1c11a104a3f3bb851546eba2f6e4821cc5affa55c
SHA2568a06c7b714fcde04fb2c3eba3a00e0da232ed7ed026a813acae49637d7544f12
SHA512fc89b3437db762835bfec5d70d6c41a0a3b70b0abd514fc238f9913381d73048fa310e3c03b450c0570376f17788b24ff17a16e858cfbbee7ed5af934e6c5fd1
-
Filesize
255KB
MD576c61f65329a2a4c93fe7c2a0ba597b9
SHA1349cd17ecf34f1db8586d1b1f0280be2016a8458
SHA25611ebd5a336e48698e3279a785e27ecc7d1923704ef0bfc7f6e6dc77785b6b6ac
SHA512c28d9f87ddfa7fe92f0ae0f2e6be2943693fb4dc1a5e01d7092d89f025ec4543a23981fbe1d7b20a809c06728b3bd0773d210d4434c5b3fe3eab505b78792ece
-
Filesize
255KB
MD576c61f65329a2a4c93fe7c2a0ba597b9
SHA1349cd17ecf34f1db8586d1b1f0280be2016a8458
SHA25611ebd5a336e48698e3279a785e27ecc7d1923704ef0bfc7f6e6dc77785b6b6ac
SHA512c28d9f87ddfa7fe92f0ae0f2e6be2943693fb4dc1a5e01d7092d89f025ec4543a23981fbe1d7b20a809c06728b3bd0773d210d4434c5b3fe3eab505b78792ece
-
Filesize
255KB
MD59244826d00624999679e9314ee27ae75
SHA1cf993441350fb12ec91c1bf15e37d60a552ee1a2
SHA256405039a3ff9166798c240657e2edc20ac9eadfc4e3cd922f482471cbbbcf4dff
SHA51270392d43b6ffbaa7c1459804699a5489f34c409b9bfa74308abbca92d045d3d6b252225e290ffd0c35fb03747e22ee4a34d208d820a718b67511d7c65aa120f1
-
Filesize
255KB
MD59244826d00624999679e9314ee27ae75
SHA1cf993441350fb12ec91c1bf15e37d60a552ee1a2
SHA256405039a3ff9166798c240657e2edc20ac9eadfc4e3cd922f482471cbbbcf4dff
SHA51270392d43b6ffbaa7c1459804699a5489f34c409b9bfa74308abbca92d045d3d6b252225e290ffd0c35fb03747e22ee4a34d208d820a718b67511d7c65aa120f1
-
Filesize
255KB
MD548ad45beb0ca79af62d04b5ed45c6a91
SHA18f8c0ad2a6759a7ff49e624b36b5a94873cee113
SHA25629b4b56ec427d7d02afadb9e2da6d5c72baafa9c09afa2a93bc69bf83cfd613c
SHA5128e49620d9b051881cc59e2f1f6410cf755baab1bf151535768e4912880491bd646dff747bfdc80c9e23d77b0627b366d121abd7fcac7a19e1e0b0340c0753dbb
-
Filesize
255KB
MD548ad45beb0ca79af62d04b5ed45c6a91
SHA18f8c0ad2a6759a7ff49e624b36b5a94873cee113
SHA25629b4b56ec427d7d02afadb9e2da6d5c72baafa9c09afa2a93bc69bf83cfd613c
SHA5128e49620d9b051881cc59e2f1f6410cf755baab1bf151535768e4912880491bd646dff747bfdc80c9e23d77b0627b366d121abd7fcac7a19e1e0b0340c0753dbb
-
Filesize
255KB
MD548ad45beb0ca79af62d04b5ed45c6a91
SHA18f8c0ad2a6759a7ff49e624b36b5a94873cee113
SHA25629b4b56ec427d7d02afadb9e2da6d5c72baafa9c09afa2a93bc69bf83cfd613c
SHA5128e49620d9b051881cc59e2f1f6410cf755baab1bf151535768e4912880491bd646dff747bfdc80c9e23d77b0627b366d121abd7fcac7a19e1e0b0340c0753dbb