Analysis
-
max time kernel
206s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 21:07
Behavioral task
behavioral1
Sample
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe
Resource
win10v2004-20221111-en
General
-
Target
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe
-
Size
255KB
-
MD5
89943527e8ca797d5669709673dea613
-
SHA1
9a0c1d4c1e04cd5302d02d475c77d5e75097454c
-
SHA256
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6
-
SHA512
9d52400b0c5c9163fc43bb9165d430091ee9265df6959dbcc041ca507c09b5f57eb7b756f9f6b5912417998d10125ae7ddf4758180f8c91da475eeabee693997
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJu:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mcrdzkachk.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mcrdzkachk.exe -
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" mcrdzkachk.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" mcrdzkachk.exe -
Executes dropped EXE 5 IoCs
Processes:
mcrdzkachk.exekqacdypcxbldwvl.exepjvcthep.exejazctmfiuzdkf.exepjvcthep.exepid process 4624 mcrdzkachk.exe 2876 kqacdypcxbldwvl.exe 3336 pjvcthep.exe 4120 jazctmfiuzdkf.exe 504 pjvcthep.exe -
Processes:
resource yara_rule behavioral2/memory/1084-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\mcrdzkachk.exe upx C:\Windows\SysWOW64\mcrdzkachk.exe upx C:\Windows\SysWOW64\kqacdypcxbldwvl.exe upx C:\Windows\SysWOW64\kqacdypcxbldwvl.exe upx C:\Windows\SysWOW64\pjvcthep.exe upx C:\Windows\SysWOW64\pjvcthep.exe upx C:\Windows\SysWOW64\jazctmfiuzdkf.exe upx C:\Windows\SysWOW64\jazctmfiuzdkf.exe upx behavioral2/memory/4624-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2876-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3336-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4120-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\pjvcthep.exe upx behavioral2/memory/504-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1084-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4624-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2876-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3336-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4120-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1084-158-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe -
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mcrdzkachk.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
kqacdypcxbldwvl.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run kqacdypcxbldwvl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yknflunv = "mcrdzkachk.exe" kqacdypcxbldwvl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nxenklfh = "kqacdypcxbldwvl.exe" kqacdypcxbldwvl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jazctmfiuzdkf.exe" kqacdypcxbldwvl.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
pjvcthep.exemcrdzkachk.exepjvcthep.exedescription ioc process File opened (read-only) \??\m: pjvcthep.exe File opened (read-only) \??\f: mcrdzkachk.exe File opened (read-only) \??\f: pjvcthep.exe File opened (read-only) \??\s: pjvcthep.exe File opened (read-only) \??\u: pjvcthep.exe File opened (read-only) \??\z: pjvcthep.exe File opened (read-only) \??\r: pjvcthep.exe File opened (read-only) \??\y: pjvcthep.exe File opened (read-only) \??\e: pjvcthep.exe File opened (read-only) \??\g: pjvcthep.exe File opened (read-only) \??\k: pjvcthep.exe File opened (read-only) \??\v: pjvcthep.exe File opened (read-only) \??\w: pjvcthep.exe File opened (read-only) \??\o: pjvcthep.exe File opened (read-only) \??\q: pjvcthep.exe File opened (read-only) \??\g: mcrdzkachk.exe File opened (read-only) \??\j: pjvcthep.exe File opened (read-only) \??\l: pjvcthep.exe File opened (read-only) \??\n: pjvcthep.exe File opened (read-only) \??\t: pjvcthep.exe File opened (read-only) \??\x: pjvcthep.exe File opened (read-only) \??\h: pjvcthep.exe File opened (read-only) \??\o: mcrdzkachk.exe File opened (read-only) \??\b: pjvcthep.exe File opened (read-only) \??\x: pjvcthep.exe File opened (read-only) \??\y: mcrdzkachk.exe File opened (read-only) \??\q: pjvcthep.exe File opened (read-only) \??\a: pjvcthep.exe File opened (read-only) \??\i: mcrdzkachk.exe File opened (read-only) \??\t: mcrdzkachk.exe File opened (read-only) \??\p: pjvcthep.exe File opened (read-only) \??\w: pjvcthep.exe File opened (read-only) \??\a: mcrdzkachk.exe File opened (read-only) \??\q: mcrdzkachk.exe File opened (read-only) \??\u: mcrdzkachk.exe File opened (read-only) \??\w: mcrdzkachk.exe File opened (read-only) \??\h: mcrdzkachk.exe File opened (read-only) \??\z: mcrdzkachk.exe File opened (read-only) \??\a: pjvcthep.exe File opened (read-only) \??\i: pjvcthep.exe File opened (read-only) \??\m: pjvcthep.exe File opened (read-only) \??\b: pjvcthep.exe File opened (read-only) \??\z: pjvcthep.exe File opened (read-only) \??\j: mcrdzkachk.exe File opened (read-only) \??\r: pjvcthep.exe File opened (read-only) \??\l: pjvcthep.exe File opened (read-only) \??\n: pjvcthep.exe File opened (read-only) \??\v: pjvcthep.exe File opened (read-only) \??\k: mcrdzkachk.exe File opened (read-only) \??\l: mcrdzkachk.exe File opened (read-only) \??\m: mcrdzkachk.exe File opened (read-only) \??\s: mcrdzkachk.exe File opened (read-only) \??\i: pjvcthep.exe File opened (read-only) \??\p: mcrdzkachk.exe File opened (read-only) \??\r: mcrdzkachk.exe File opened (read-only) \??\v: mcrdzkachk.exe File opened (read-only) \??\g: pjvcthep.exe File opened (read-only) \??\h: pjvcthep.exe File opened (read-only) \??\y: pjvcthep.exe File opened (read-only) \??\e: pjvcthep.exe File opened (read-only) \??\j: pjvcthep.exe File opened (read-only) \??\k: pjvcthep.exe File opened (read-only) \??\s: pjvcthep.exe File opened (read-only) \??\t: pjvcthep.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
mcrdzkachk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" mcrdzkachk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" mcrdzkachk.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4624-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2876-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3336-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4120-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/504-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1084-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4624-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2876-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3336-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4120-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1084-158-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exedescription ioc process File opened for modification C:\Windows\SysWOW64\kqacdypcxbldwvl.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File created C:\Windows\SysWOW64\pjvcthep.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File created C:\Windows\SysWOW64\jazctmfiuzdkf.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll mcrdzkachk.exe File created C:\Windows\SysWOW64\kqacdypcxbldwvl.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File opened for modification C:\Windows\SysWOW64\mcrdzkachk.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File opened for modification C:\Windows\SysWOW64\pjvcthep.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File opened for modification C:\Windows\SysWOW64\jazctmfiuzdkf.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File created C:\Windows\SysWOW64\mcrdzkachk.exe 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe -
Drops file in Program Files directory 14 IoCs
Processes:
pjvcthep.exepjvcthep.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pjvcthep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pjvcthep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pjvcthep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal pjvcthep.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pjvcthep.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pjvcthep.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal pjvcthep.exe -
Drops file in Windows directory 3 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2ECBB1204493399A52CABAA132E9D4BF" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFFF94F2A8512903CD72A7D93BDE4E637583667436335D7E9" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" mcrdzkachk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc mcrdzkachk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" mcrdzkachk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2C7B9D5283206D3676A270272CDD7D8664AD" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABEF9CCF917F1E383743A31819B3992B3FE028F4364033DE2C945E608A6" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs mcrdzkachk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mcrdzkachk.exe Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh mcrdzkachk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf mcrdzkachk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat mcrdzkachk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mcrdzkachk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg mcrdzkachk.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0816BC5FE6A21DED27CD1D28A0C9017" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mcrdzkachk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184EC77915E7DAB5B8CF7CE8EDE334BA" 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" mcrdzkachk.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4984 WINWORD.EXE 4984 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exekqacdypcxbldwvl.exepjvcthep.exejazctmfiuzdkf.exepjvcthep.exepid process 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exekqacdypcxbldwvl.exepjvcthep.exejazctmfiuzdkf.exepjvcthep.exepid process 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exekqacdypcxbldwvl.exepjvcthep.exejazctmfiuzdkf.exepjvcthep.exepid process 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 4624 mcrdzkachk.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 2876 kqacdypcxbldwvl.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 3336 pjvcthep.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 4120 jazctmfiuzdkf.exe 504 pjvcthep.exe 504 pjvcthep.exe 504 pjvcthep.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exemcrdzkachk.exedescription pid process target process PID 1084 wrote to memory of 4624 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe mcrdzkachk.exe PID 1084 wrote to memory of 4624 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe mcrdzkachk.exe PID 1084 wrote to memory of 4624 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe mcrdzkachk.exe PID 1084 wrote to memory of 2876 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe kqacdypcxbldwvl.exe PID 1084 wrote to memory of 2876 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe kqacdypcxbldwvl.exe PID 1084 wrote to memory of 2876 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe kqacdypcxbldwvl.exe PID 1084 wrote to memory of 3336 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe pjvcthep.exe PID 1084 wrote to memory of 3336 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe pjvcthep.exe PID 1084 wrote to memory of 3336 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe pjvcthep.exe PID 1084 wrote to memory of 4120 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe jazctmfiuzdkf.exe PID 1084 wrote to memory of 4120 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe jazctmfiuzdkf.exe PID 1084 wrote to memory of 4120 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe jazctmfiuzdkf.exe PID 4624 wrote to memory of 504 4624 mcrdzkachk.exe pjvcthep.exe PID 4624 wrote to memory of 504 4624 mcrdzkachk.exe pjvcthep.exe PID 4624 wrote to memory of 504 4624 mcrdzkachk.exe pjvcthep.exe PID 1084 wrote to memory of 4984 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe WINWORD.EXE PID 1084 wrote to memory of 4984 1084 1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe"C:\Users\Admin\AppData\Local\Temp\1704c4d430de068a53f58f4f25b1910c7e38f4fbf901d8a4ed77749e01d358f6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\mcrdzkachk.exemcrdzkachk.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\pjvcthep.exeC:\Windows\system32\pjvcthep.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:504 -
C:\Windows\SysWOW64\kqacdypcxbldwvl.exekqacdypcxbldwvl.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2876 -
C:\Windows\SysWOW64\pjvcthep.exepjvcthep.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3336 -
C:\Windows\SysWOW64\jazctmfiuzdkf.exejazctmfiuzdkf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4120 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4984
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5617b5adf17d6713bf0b513d2a53a31ef
SHA1b5a300e98720d6420553f3b10ad2a699ee487105
SHA2560d458242e8e77cabd1da0389cc09374f7c3c0672c75370d5384d8bad431081dc
SHA5127acc6fef88c2789cc388915a21e0d654ebe0ef3a36bbbd3a36c90c4dcf8f1eb891ab95466142e1aa20f42144c90bdedc1f2d51858a2c1b9f9e9313d00a2138d0
-
Filesize
255KB
MD50fcc7c849ec145749453b18f55e2804e
SHA19b9dd9e0d81e642b7231c2559b18cf803a20d018
SHA256aa049a4fb8f0f22200fcc01bb33c75bcf0669cc8d960d7fcdd512b4c34423c46
SHA512cff0f2ce6126b35c9027646c367413f04b7ab6e722e168e05d2ddf7dc6d548b8b70a7a22bdac7b63b743f3155e69ce096ad6adee37da5ee801841d02d040258f
-
Filesize
255KB
MD54f0c2cb1da5b7a98206f302890deff58
SHA1e28e13e13c3f6bccbc88ce99d25f836fef38f906
SHA2562827c2912a092050d0a47fd8853ab13a4621c34da874ecf754bc1a3974174d02
SHA512beee620af38762f93c3af50a9f129463bc2fc31593a7fc4ee9300a1894e70356a0d078becebe779f7b0771762e8d1680662884afebc8c1d0dd2358bab88d1d46
-
Filesize
255KB
MD58833ae089a00fe374b16c1120be86ed0
SHA1c220f9904d22009bb81fab30252136af34af3fb6
SHA25676e402d7f5556a0e4ad6bdb439db4a7f80d5944777d859c6407cb7a3a08a8b05
SHA5128d33b45251e50b22fdb0ce9f076a9c10cefba63f91b00e037028f18984cf583c6c7509e2309bccb67375641c940910faf847f2eba86c40e1cb5ccd32338b6484
-
Filesize
255KB
MD58833ae089a00fe374b16c1120be86ed0
SHA1c220f9904d22009bb81fab30252136af34af3fb6
SHA25676e402d7f5556a0e4ad6bdb439db4a7f80d5944777d859c6407cb7a3a08a8b05
SHA5128d33b45251e50b22fdb0ce9f076a9c10cefba63f91b00e037028f18984cf583c6c7509e2309bccb67375641c940910faf847f2eba86c40e1cb5ccd32338b6484
-
Filesize
255KB
MD511a1edc279e1564f75dfbedd7111fcf0
SHA1585adf8f921ccee166cbe236c33e0c3704e8c0c9
SHA2562b1e9240d4b82ca0394fd108f215f41287ca2d1c694c49203c8ce50b0d2d2333
SHA512ffcda404cfeadc29c76c9189bae70a4cbc9ea9cd44dbb123d1c5190352a9425421f0cadf28ab2d649ce4e885160fc5f1973fa86e7195315a7234e15575edd7e0
-
Filesize
255KB
MD511a1edc279e1564f75dfbedd7111fcf0
SHA1585adf8f921ccee166cbe236c33e0c3704e8c0c9
SHA2562b1e9240d4b82ca0394fd108f215f41287ca2d1c694c49203c8ce50b0d2d2333
SHA512ffcda404cfeadc29c76c9189bae70a4cbc9ea9cd44dbb123d1c5190352a9425421f0cadf28ab2d649ce4e885160fc5f1973fa86e7195315a7234e15575edd7e0
-
Filesize
255KB
MD514ef03e50badca45640125b1555e2b0a
SHA1070c70f39da6023b19fc6dde47cb7b4a105db215
SHA256076a7293845c6eb4b3599b82b77768f53a1212050dd4ffe74e895e57325d678d
SHA51243a24f198bdcf5c5db1313d6c98c9c1932b04036de39ef3bb7ed646e841ccb0722a95e76b92b6aa27c524e3db2d5a08e4843c396b7d5a5004ebbe2f8e486cc08
-
Filesize
255KB
MD514ef03e50badca45640125b1555e2b0a
SHA1070c70f39da6023b19fc6dde47cb7b4a105db215
SHA256076a7293845c6eb4b3599b82b77768f53a1212050dd4ffe74e895e57325d678d
SHA51243a24f198bdcf5c5db1313d6c98c9c1932b04036de39ef3bb7ed646e841ccb0722a95e76b92b6aa27c524e3db2d5a08e4843c396b7d5a5004ebbe2f8e486cc08
-
Filesize
255KB
MD503c932be64f78a1ed1c015aa99c3643f
SHA18de069e9a108ef04f0755835472b214d5b8cd263
SHA2561b2ec15d4c0f527ae0c1cb0dcf3d1bbb0bbd5632828403d6bedf21f8b18e7343
SHA512f2ff82748bf5629d764801a2e7d76afa5be03bbe78fdc4282fb6f619a0f43c30295aed7d08d889af9df63fff9e2e33747faa56f425f37d01c9f40a5d7b03cc82
-
Filesize
255KB
MD503c932be64f78a1ed1c015aa99c3643f
SHA18de069e9a108ef04f0755835472b214d5b8cd263
SHA2561b2ec15d4c0f527ae0c1cb0dcf3d1bbb0bbd5632828403d6bedf21f8b18e7343
SHA512f2ff82748bf5629d764801a2e7d76afa5be03bbe78fdc4282fb6f619a0f43c30295aed7d08d889af9df63fff9e2e33747faa56f425f37d01c9f40a5d7b03cc82
-
Filesize
255KB
MD503c932be64f78a1ed1c015aa99c3643f
SHA18de069e9a108ef04f0755835472b214d5b8cd263
SHA2561b2ec15d4c0f527ae0c1cb0dcf3d1bbb0bbd5632828403d6bedf21f8b18e7343
SHA512f2ff82748bf5629d764801a2e7d76afa5be03bbe78fdc4282fb6f619a0f43c30295aed7d08d889af9df63fff9e2e33747faa56f425f37d01c9f40a5d7b03cc82
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7