Analysis
-
max time kernel
207s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:06
Behavioral task
behavioral1
Sample
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
Resource
win10v2004-20221111-en
General
-
Target
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
-
Size
255KB
-
MD5
fe0dd9cb32d051ea951039e26bb4caaa
-
SHA1
480ad468a290f7742f985ef8e7e7faa671ee8ac2
-
SHA256
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7
-
SHA512
730feb5233dd5e3ad1532d5fd179005e90c21dde18d6b3a289e6f696f14583f8557517bf8f84ac881adfb2fe298d8e7b137232b98d79183aa983382405c8aa77
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJh:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wcudyxjqra.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wcudyxjqra.exe -
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wcudyxjqra.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wcudyxjqra.exe -
Executes dropped EXE 5 IoCs
Processes:
wcudyxjqra.exeqfflbufrhiysssw.exekxabwtnp.exesaoykvmdawktp.exekxabwtnp.exepid process 3632 wcudyxjqra.exe 4568 qfflbufrhiysssw.exe 116 kxabwtnp.exe 1172 saoykvmdawktp.exe 4604 kxabwtnp.exe -
Processes:
resource yara_rule behavioral2/memory/3928-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3928-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\wcudyxjqra.exe upx C:\Windows\SysWOW64\wcudyxjqra.exe upx C:\Windows\SysWOW64\qfflbufrhiysssw.exe upx C:\Windows\SysWOW64\qfflbufrhiysssw.exe upx behavioral2/memory/3632-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4568-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\kxabwtnp.exe upx C:\Windows\SysWOW64\kxabwtnp.exe upx C:\Windows\SysWOW64\saoykvmdawktp.exe upx C:\Windows\SysWOW64\saoykvmdawktp.exe upx behavioral2/memory/116-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1172-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\kxabwtnp.exe upx behavioral2/memory/4604-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3928-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/3632-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4568-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/116-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1172-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4604-169-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe -
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wcudyxjqra.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
qfflbufrhiysssw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\soivnrin = "wcudyxjqra.exe" qfflbufrhiysssw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xsqsucxi = "qfflbufrhiysssw.exe" qfflbufrhiysssw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "saoykvmdawktp.exe" qfflbufrhiysssw.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run qfflbufrhiysssw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kxabwtnp.exewcudyxjqra.exekxabwtnp.exedescription ioc process File opened (read-only) \??\b: kxabwtnp.exe File opened (read-only) \??\i: kxabwtnp.exe File opened (read-only) \??\s: wcudyxjqra.exe File opened (read-only) \??\z: kxabwtnp.exe File opened (read-only) \??\n: kxabwtnp.exe File opened (read-only) \??\u: kxabwtnp.exe File opened (read-only) \??\z: kxabwtnp.exe File opened (read-only) \??\x: wcudyxjqra.exe File opened (read-only) \??\a: kxabwtnp.exe File opened (read-only) \??\e: kxabwtnp.exe File opened (read-only) \??\s: kxabwtnp.exe File opened (read-only) \??\g: wcudyxjqra.exe File opened (read-only) \??\o: wcudyxjqra.exe File opened (read-only) \??\z: wcudyxjqra.exe File opened (read-only) \??\y: kxabwtnp.exe File opened (read-only) \??\h: kxabwtnp.exe File opened (read-only) \??\r: kxabwtnp.exe File opened (read-only) \??\f: wcudyxjqra.exe File opened (read-only) \??\w: wcudyxjqra.exe File opened (read-only) \??\e: kxabwtnp.exe File opened (read-only) \??\h: kxabwtnp.exe File opened (read-only) \??\j: kxabwtnp.exe File opened (read-only) \??\q: kxabwtnp.exe File opened (read-only) \??\x: kxabwtnp.exe File opened (read-only) \??\v: wcudyxjqra.exe File opened (read-only) \??\a: kxabwtnp.exe File opened (read-only) \??\b: kxabwtnp.exe File opened (read-only) \??\m: kxabwtnp.exe File opened (read-only) \??\n: kxabwtnp.exe File opened (read-only) \??\g: kxabwtnp.exe File opened (read-only) \??\o: kxabwtnp.exe File opened (read-only) \??\w: kxabwtnp.exe File opened (read-only) \??\a: wcudyxjqra.exe File opened (read-only) \??\e: wcudyxjqra.exe File opened (read-only) \??\f: kxabwtnp.exe File opened (read-only) \??\l: kxabwtnp.exe File opened (read-only) \??\p: kxabwtnp.exe File opened (read-only) \??\t: kxabwtnp.exe File opened (read-only) \??\f: kxabwtnp.exe File opened (read-only) \??\h: wcudyxjqra.exe File opened (read-only) \??\k: kxabwtnp.exe File opened (read-only) \??\r: kxabwtnp.exe File opened (read-only) \??\j: kxabwtnp.exe File opened (read-only) \??\p: kxabwtnp.exe File opened (read-only) \??\n: wcudyxjqra.exe File opened (read-only) \??\t: wcudyxjqra.exe File opened (read-only) \??\x: kxabwtnp.exe File opened (read-only) \??\i: kxabwtnp.exe File opened (read-only) \??\v: kxabwtnp.exe File opened (read-only) \??\l: kxabwtnp.exe File opened (read-only) \??\t: kxabwtnp.exe File opened (read-only) \??\j: wcudyxjqra.exe File opened (read-only) \??\q: wcudyxjqra.exe File opened (read-only) \??\b: wcudyxjqra.exe File opened (read-only) \??\k: wcudyxjqra.exe File opened (read-only) \??\g: kxabwtnp.exe File opened (read-only) \??\i: wcudyxjqra.exe File opened (read-only) \??\l: wcudyxjqra.exe File opened (read-only) \??\m: wcudyxjqra.exe File opened (read-only) \??\r: wcudyxjqra.exe File opened (read-only) \??\o: kxabwtnp.exe File opened (read-only) \??\v: kxabwtnp.exe File opened (read-only) \??\u: wcudyxjqra.exe File opened (read-only) \??\q: kxabwtnp.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
wcudyxjqra.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" wcudyxjqra.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" wcudyxjqra.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/3928-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3632-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4568-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/116-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1172-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4604-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3928-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3632-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4568-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/116-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1172-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4604-169-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewcudyxjqra.exedescription ioc process File created C:\Windows\SysWOW64\wcudyxjqra.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\qfflbufrhiysssw.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\kxabwtnp.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\kxabwtnp.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\saoykvmdawktp.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\wcudyxjqra.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\qfflbufrhiysssw.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\saoykvmdawktp.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll wcudyxjqra.exe -
Drops file in Program Files directory 14 IoCs
Processes:
kxabwtnp.exekxabwtnp.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal kxabwtnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kxabwtnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kxabwtnp.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kxabwtnp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal kxabwtnp.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe kxabwtnp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal kxabwtnp.exe -
Drops file in Windows directory 3 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewcudyxjqra.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFFF9482F82189133D6217DE7BD90E133584067356243D6EB" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4FAC9F96BF195830B3A44869D3E93B0FE02FD4261023AE2CD459C09D4" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC0B05B47EF399952C9B9D6329BD4BF" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wcudyxjqra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc wcudyxjqra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32442C7B9D2C83206D3577A770552DDF7CF564D8" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F26BC1FE6D22DED27ED1D38A099164" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1948C70B14E3DBC3B9C17CE7EC9634B9" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat wcudyxjqra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh wcudyxjqra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" wcudyxjqra.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs wcudyxjqra.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wcudyxjqra.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1700 WINWORD.EXE 1700 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewcudyxjqra.exeqfflbufrhiysssw.exekxabwtnp.exesaoykvmdawktp.exepid process 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewcudyxjqra.exeqfflbufrhiysssw.exekxabwtnp.exesaoykvmdawktp.exekxabwtnp.exepid process 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 4604 kxabwtnp.exe 4604 kxabwtnp.exe 4604 kxabwtnp.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewcudyxjqra.exeqfflbufrhiysssw.exekxabwtnp.exesaoykvmdawktp.exekxabwtnp.exepid process 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 3632 wcudyxjqra.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 4568 qfflbufrhiysssw.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 116 kxabwtnp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 1172 saoykvmdawktp.exe 4604 kxabwtnp.exe 4604 kxabwtnp.exe 4604 kxabwtnp.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE 1700 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exeqfflbufrhiysssw.exewcudyxjqra.exedescription pid process target process PID 3928 wrote to memory of 3632 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wcudyxjqra.exe PID 3928 wrote to memory of 3632 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wcudyxjqra.exe PID 3928 wrote to memory of 3632 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wcudyxjqra.exe PID 3928 wrote to memory of 4568 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe qfflbufrhiysssw.exe PID 3928 wrote to memory of 4568 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe qfflbufrhiysssw.exe PID 3928 wrote to memory of 4568 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe qfflbufrhiysssw.exe PID 3928 wrote to memory of 116 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe kxabwtnp.exe PID 3928 wrote to memory of 116 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe kxabwtnp.exe PID 3928 wrote to memory of 116 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe kxabwtnp.exe PID 4568 wrote to memory of 4660 4568 qfflbufrhiysssw.exe cmd.exe PID 4568 wrote to memory of 4660 4568 qfflbufrhiysssw.exe cmd.exe PID 4568 wrote to memory of 4660 4568 qfflbufrhiysssw.exe cmd.exe PID 3928 wrote to memory of 1172 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe saoykvmdawktp.exe PID 3928 wrote to memory of 1172 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe saoykvmdawktp.exe PID 3928 wrote to memory of 1172 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe saoykvmdawktp.exe PID 3632 wrote to memory of 4604 3632 wcudyxjqra.exe kxabwtnp.exe PID 3632 wrote to memory of 4604 3632 wcudyxjqra.exe kxabwtnp.exe PID 3632 wrote to memory of 4604 3632 wcudyxjqra.exe kxabwtnp.exe PID 3928 wrote to memory of 1700 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE PID 3928 wrote to memory of 1700 3928 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe"C:\Users\Admin\AppData\Local\Temp\236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\wcudyxjqra.exewcudyxjqra.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\kxabwtnp.exeC:\Windows\system32\kxabwtnp.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4604
-
-
-
C:\Windows\SysWOW64\qfflbufrhiysssw.exeqfflbufrhiysssw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd.exe /c saoykvmdawktp.exe3⤵PID:4660
-
-
-
C:\Windows\SysWOW64\kxabwtnp.exekxabwtnp.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:116
-
-
C:\Windows\SysWOW64\saoykvmdawktp.exesaoykvmdawktp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1172
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5d599802a14821a87f968635a0546d3a4
SHA12b04cd0b178e59ea05b9e22d8507cfdeddbd1a37
SHA25602711fb034b2bf4b355b7d18f1a73bbba8a897901a057d61ec66ef1346bcaea8
SHA512bc5e5a53f3cc0baf60cd054c02b38f79a544c4af3f25245bec62f33f045f250254f1e88ca75a3bed073b714d77c309a0b43ce9f0a1a56592560c7d2cd2756730
-
Filesize
255KB
MD56a00e1d009faa3ab96cc63e61c026440
SHA147a77f0f4e2a6c785e978e2c5a2f3fddb319f099
SHA2563cd0539f21ea322c13c8ab5b88c58b618f7fb3543453de04bb9ff51b0817c630
SHA51297b64a2bf78a62ccd5c50b11ca2f7668d993a3b5e1414debe8205057a83b2edb55459018d841d582abf0785224e559224626aa3a2f0b116387f0d041b2afc9e6
-
Filesize
255KB
MD55f03a0faf382808f6e28c975cbb58cef
SHA1125b096c10c2c1993dda465611a935db122e6ed1
SHA2560df042a975d8cfd536cc53559e1b26cb04f22c421e051115956ebf45fc86352d
SHA512c8a723d74b282c03791350422a400e570dfbdb9199d208ef6ab5bae9954d7ac25efeda9240513e05e8b119dda825ec9f5a4cea7a6bdc979599d232da5678806a
-
Filesize
255KB
MD55f03a0faf382808f6e28c975cbb58cef
SHA1125b096c10c2c1993dda465611a935db122e6ed1
SHA2560df042a975d8cfd536cc53559e1b26cb04f22c421e051115956ebf45fc86352d
SHA512c8a723d74b282c03791350422a400e570dfbdb9199d208ef6ab5bae9954d7ac25efeda9240513e05e8b119dda825ec9f5a4cea7a6bdc979599d232da5678806a
-
Filesize
255KB
MD55f03a0faf382808f6e28c975cbb58cef
SHA1125b096c10c2c1993dda465611a935db122e6ed1
SHA2560df042a975d8cfd536cc53559e1b26cb04f22c421e051115956ebf45fc86352d
SHA512c8a723d74b282c03791350422a400e570dfbdb9199d208ef6ab5bae9954d7ac25efeda9240513e05e8b119dda825ec9f5a4cea7a6bdc979599d232da5678806a
-
Filesize
255KB
MD5295dfdfa9589a509a95f0d0204542e8f
SHA1bb8d5029dc44764e7849ec6eb09c73ae7356fac2
SHA256d8c54511eef8bd46cddca9481abf6f3ec8b01ff9278a57f53e938f772c40985c
SHA51243241ed4ba46aaaf61f55c706ecc648b6f21e40314361290024e6d982c2f4044716e4c49de90f1fc6591f6041f79b8b5ac19576fb233b71e1fcb8eba1e28ec17
-
Filesize
255KB
MD5295dfdfa9589a509a95f0d0204542e8f
SHA1bb8d5029dc44764e7849ec6eb09c73ae7356fac2
SHA256d8c54511eef8bd46cddca9481abf6f3ec8b01ff9278a57f53e938f772c40985c
SHA51243241ed4ba46aaaf61f55c706ecc648b6f21e40314361290024e6d982c2f4044716e4c49de90f1fc6591f6041f79b8b5ac19576fb233b71e1fcb8eba1e28ec17
-
Filesize
255KB
MD536bea45b6e7e063b0763c730bb3d04d4
SHA1454bbea782734b001ae1d73e88762eafde0dd60f
SHA25683e1629b7b35c620ed0d6291fc59d2f4dbe64e97a8956a367f5d20fa89516193
SHA512d5ad086e01fe6e7b23cee5ad3ec4915dc3bf3cc2478a94cbc908d2c246401fc62ce96ff44883e5a51d1b77e034958905514813dd1b4744c157418afc820cdff3
-
Filesize
255KB
MD536bea45b6e7e063b0763c730bb3d04d4
SHA1454bbea782734b001ae1d73e88762eafde0dd60f
SHA25683e1629b7b35c620ed0d6291fc59d2f4dbe64e97a8956a367f5d20fa89516193
SHA512d5ad086e01fe6e7b23cee5ad3ec4915dc3bf3cc2478a94cbc908d2c246401fc62ce96ff44883e5a51d1b77e034958905514813dd1b4744c157418afc820cdff3
-
Filesize
255KB
MD587affb14be6c07623dd81d4bfe72405e
SHA19acd5ea8d8dc022ae699151808bf78f32e7d692e
SHA25612d60023dd16e9f4cb765df0b153854c9f0d8fe9c222db9d02df05b8060455c8
SHA512f913eb7b0c34d90d7c55987ebe7eb3b22d42bcdcc71cf79db9eb342d5c76fa70fb30cd186d9535c1f3cf3e4186bdef12253b46f7208c96e3afd7b4f9f83f06c7
-
Filesize
255KB
MD587affb14be6c07623dd81d4bfe72405e
SHA19acd5ea8d8dc022ae699151808bf78f32e7d692e
SHA25612d60023dd16e9f4cb765df0b153854c9f0d8fe9c222db9d02df05b8060455c8
SHA512f913eb7b0c34d90d7c55987ebe7eb3b22d42bcdcc71cf79db9eb342d5c76fa70fb30cd186d9535c1f3cf3e4186bdef12253b46f7208c96e3afd7b4f9f83f06c7
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7