Analysis
-
max time kernel
361s -
max time network
370s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 01:01
Behavioral task
behavioral1
Sample
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe
Resource
win10v2004-20221111-en
General
-
Target
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe
-
Size
255KB
-
MD5
274110737585bd5300cdbe2b64361de1
-
SHA1
c9b9baa87260a23197a98c4b108272675a0cba1d
-
SHA256
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743
-
SHA512
020879b5da21669e5513e097b94880a6f1d70b7debcbae55f98bc54f56510f46b59dfa76e5a47d9b61e2e026a4bff1e2d3bfedbe0ad3644f31ba213587652a1c
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ8:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI5
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tbypgoksvf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tbypgoksvf.exe -
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tbypgoksvf.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tbypgoksvf.exe -
Executes dropped EXE 5 IoCs
Processes:
tbypgoksvf.exeyhjmzaycjjlnnti.exeskrmuzha.exempwwyfznljeby.exeskrmuzha.exepid process 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 1452 skrmuzha.exe -
Processes:
resource yara_rule behavioral2/memory/4680-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\tbypgoksvf.exe upx C:\Windows\SysWOW64\yhjmzaycjjlnnti.exe upx C:\Windows\SysWOW64\skrmuzha.exe upx C:\Windows\SysWOW64\mpwwyfznljeby.exe upx C:\Windows\SysWOW64\mpwwyfznljeby.exe upx C:\Windows\SysWOW64\skrmuzha.exe upx C:\Windows\SysWOW64\yhjmzaycjjlnnti.exe upx C:\Windows\SysWOW64\tbypgoksvf.exe upx behavioral2/memory/5012-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4804-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3540-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2220-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4804-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2220-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\skrmuzha.exe upx behavioral2/memory/1452-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1452-155-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4680-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe -
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tbypgoksvf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
yhjmzaycjjlnnti.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yhjmzaycjjlnnti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\peqlnpyf = "tbypgoksvf.exe" yhjmzaycjjlnnti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kjahpqss = "yhjmzaycjjlnnti.exe" yhjmzaycjjlnnti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mpwwyfznljeby.exe" yhjmzaycjjlnnti.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
skrmuzha.exeskrmuzha.exetbypgoksvf.exedescription ioc process File opened (read-only) \??\b: skrmuzha.exe File opened (read-only) \??\a: skrmuzha.exe File opened (read-only) \??\q: skrmuzha.exe File opened (read-only) \??\t: skrmuzha.exe File opened (read-only) \??\w: tbypgoksvf.exe File opened (read-only) \??\f: skrmuzha.exe File opened (read-only) \??\o: tbypgoksvf.exe File opened (read-only) \??\x: tbypgoksvf.exe File opened (read-only) \??\j: skrmuzha.exe File opened (read-only) \??\n: tbypgoksvf.exe File opened (read-only) \??\u: tbypgoksvf.exe File opened (read-only) \??\h: skrmuzha.exe File opened (read-only) \??\q: skrmuzha.exe File opened (read-only) \??\e: skrmuzha.exe File opened (read-only) \??\k: skrmuzha.exe File opened (read-only) \??\m: skrmuzha.exe File opened (read-only) \??\k: tbypgoksvf.exe File opened (read-only) \??\s: skrmuzha.exe File opened (read-only) \??\n: skrmuzha.exe File opened (read-only) \??\s: skrmuzha.exe File opened (read-only) \??\q: tbypgoksvf.exe File opened (read-only) \??\r: tbypgoksvf.exe File opened (read-only) \??\h: tbypgoksvf.exe File opened (read-only) \??\i: tbypgoksvf.exe File opened (read-only) \??\v: tbypgoksvf.exe File opened (read-only) \??\z: tbypgoksvf.exe File opened (read-only) \??\j: skrmuzha.exe File opened (read-only) \??\w: skrmuzha.exe File opened (read-only) \??\z: skrmuzha.exe File opened (read-only) \??\g: tbypgoksvf.exe File opened (read-only) \??\k: skrmuzha.exe File opened (read-only) \??\v: skrmuzha.exe File opened (read-only) \??\g: skrmuzha.exe File opened (read-only) \??\t: skrmuzha.exe File opened (read-only) \??\x: skrmuzha.exe File opened (read-only) \??\r: skrmuzha.exe File opened (read-only) \??\f: tbypgoksvf.exe File opened (read-only) \??\l: skrmuzha.exe File opened (read-only) \??\u: skrmuzha.exe File opened (read-only) \??\h: skrmuzha.exe File opened (read-only) \??\l: skrmuzha.exe File opened (read-only) \??\j: tbypgoksvf.exe File opened (read-only) \??\p: skrmuzha.exe File opened (read-only) \??\p: tbypgoksvf.exe File opened (read-only) \??\r: skrmuzha.exe File opened (read-only) \??\w: skrmuzha.exe File opened (read-only) \??\z: skrmuzha.exe File opened (read-only) \??\a: skrmuzha.exe File opened (read-only) \??\m: skrmuzha.exe File opened (read-only) \??\v: skrmuzha.exe File opened (read-only) \??\s: tbypgoksvf.exe File opened (read-only) \??\n: skrmuzha.exe File opened (read-only) \??\g: skrmuzha.exe File opened (read-only) \??\o: skrmuzha.exe File opened (read-only) \??\o: skrmuzha.exe File opened (read-only) \??\m: tbypgoksvf.exe File opened (read-only) \??\e: skrmuzha.exe File opened (read-only) \??\u: skrmuzha.exe File opened (read-only) \??\b: tbypgoksvf.exe File opened (read-only) \??\l: tbypgoksvf.exe File opened (read-only) \??\t: tbypgoksvf.exe File opened (read-only) \??\b: skrmuzha.exe File opened (read-only) \??\i: skrmuzha.exe File opened (read-only) \??\a: tbypgoksvf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
tbypgoksvf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tbypgoksvf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tbypgoksvf.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4680-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5012-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4804-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3540-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2220-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4804-149-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2220-150-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1452-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1452-155-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4680-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exetbypgoksvf.exedescription ioc process File created C:\Windows\SysWOW64\yhjmzaycjjlnnti.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File opened for modification C:\Windows\SysWOW64\skrmuzha.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File opened for modification C:\Windows\SysWOW64\mpwwyfznljeby.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tbypgoksvf.exe File created C:\Windows\SysWOW64\tbypgoksvf.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File opened for modification C:\Windows\SysWOW64\tbypgoksvf.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File opened for modification C:\Windows\SysWOW64\yhjmzaycjjlnnti.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File created C:\Windows\SysWOW64\skrmuzha.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe File created C:\Windows\SysWOW64\mpwwyfznljeby.exe 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe -
Drops file in Windows directory 1 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
Processes:
tbypgoksvf.exe6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB1B121449739EF52CBB9A7329DD7BC" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F16BB0FF1C21ABD27ED1D58B099117" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tbypgoksvf.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184BC67B15E3DAB3B9BB7FE5ECE437CA" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tbypgoksvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tbypgoksvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBCFABCF967F194847A3B4081EB3992B0FC02FE4364034EE1BF459D08A3" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat tbypgoksvf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tbypgoksvf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg tbypgoksvf.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472C7A9D2082246A4476A670562DDD7CF164DF" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFCFCFE4F27826F9031D7217EE6BDE3E147593667426345D69D" 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tbypgoksvf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exetbypgoksvf.exeyhjmzaycjjlnnti.exempwwyfznljeby.exeskrmuzha.exepid process 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 2220 mpwwyfznljeby.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exetbypgoksvf.exeyhjmzaycjjlnnti.exeskrmuzha.exempwwyfznljeby.exeskrmuzha.exepid process 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 1452 skrmuzha.exe 1452 skrmuzha.exe 1452 skrmuzha.exe -
Suspicious use of SendNotifyMessage 19 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exetbypgoksvf.exeyhjmzaycjjlnnti.exeskrmuzha.exempwwyfznljeby.exeskrmuzha.exepid process 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 5012 tbypgoksvf.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 4804 yhjmzaycjjlnnti.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 3540 skrmuzha.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 2220 mpwwyfznljeby.exe 1452 skrmuzha.exe 1452 skrmuzha.exe 1452 skrmuzha.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exetbypgoksvf.exedescription pid process target process PID 4680 wrote to memory of 5012 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe tbypgoksvf.exe PID 4680 wrote to memory of 5012 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe tbypgoksvf.exe PID 4680 wrote to memory of 5012 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe tbypgoksvf.exe PID 4680 wrote to memory of 4804 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe yhjmzaycjjlnnti.exe PID 4680 wrote to memory of 4804 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe yhjmzaycjjlnnti.exe PID 4680 wrote to memory of 4804 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe yhjmzaycjjlnnti.exe PID 4680 wrote to memory of 3540 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe skrmuzha.exe PID 4680 wrote to memory of 3540 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe skrmuzha.exe PID 4680 wrote to memory of 3540 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe skrmuzha.exe PID 4680 wrote to memory of 2220 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe mpwwyfznljeby.exe PID 4680 wrote to memory of 2220 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe mpwwyfznljeby.exe PID 4680 wrote to memory of 2220 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe mpwwyfznljeby.exe PID 5012 wrote to memory of 1452 5012 tbypgoksvf.exe skrmuzha.exe PID 5012 wrote to memory of 1452 5012 tbypgoksvf.exe skrmuzha.exe PID 5012 wrote to memory of 1452 5012 tbypgoksvf.exe skrmuzha.exe PID 4680 wrote to memory of 4252 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe WINWORD.EXE PID 4680 wrote to memory of 4252 4680 6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe"C:\Users\Admin\AppData\Local\Temp\6a2bef16e94b21793b461a1a87774dc0c647cbe561e029b4bc3bc0a8a7189743.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\tbypgoksvf.exetbypgoksvf.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\skrmuzha.exeC:\Windows\system32\skrmuzha.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1452 -
C:\Windows\SysWOW64\yhjmzaycjjlnnti.exeyhjmzaycjjlnnti.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4804 -
C:\Windows\SysWOW64\skrmuzha.exeskrmuzha.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3540 -
C:\Windows\SysWOW64\mpwwyfznljeby.exempwwyfznljeby.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2220 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4252
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD54c08ee058c6a864e66d44de39d5130fc
SHA1bc2999349e73931afb49bbc3b5aa7f6103f300aa
SHA2564186907320c6ce2d4855b5f97f4f5c19508a406c0761331018e5e28bdca62273
SHA512e98cc7537b3176aa9de6e22944d3c7105d50760068b1784f11f4edebb5a313064780a0243eab70b3d30092a3f93909a316e68d8709f126ab28269a5028eb8b09
-
Filesize
255KB
MD54c08ee058c6a864e66d44de39d5130fc
SHA1bc2999349e73931afb49bbc3b5aa7f6103f300aa
SHA2564186907320c6ce2d4855b5f97f4f5c19508a406c0761331018e5e28bdca62273
SHA512e98cc7537b3176aa9de6e22944d3c7105d50760068b1784f11f4edebb5a313064780a0243eab70b3d30092a3f93909a316e68d8709f126ab28269a5028eb8b09
-
Filesize
255KB
MD5170123e3bc8027ceff097fa2f382eb85
SHA1f1baa224f97faf3796dcb62e107c3aa3c0849da0
SHA256ca7152d1b9c36a9dec9aa802d7989715c1576b4a0e655784ab6b0dcc44248a8c
SHA512211b31c796a80af15d5a4aa31c9ec7f7b6a03643d4902a4a53317617c3be7f0857d990a126e58aa718bbfc17fdc2c1b6868a172b726bdac2d9c4d176800a7e0c
-
Filesize
255KB
MD5170123e3bc8027ceff097fa2f382eb85
SHA1f1baa224f97faf3796dcb62e107c3aa3c0849da0
SHA256ca7152d1b9c36a9dec9aa802d7989715c1576b4a0e655784ab6b0dcc44248a8c
SHA512211b31c796a80af15d5a4aa31c9ec7f7b6a03643d4902a4a53317617c3be7f0857d990a126e58aa718bbfc17fdc2c1b6868a172b726bdac2d9c4d176800a7e0c
-
Filesize
255KB
MD5170123e3bc8027ceff097fa2f382eb85
SHA1f1baa224f97faf3796dcb62e107c3aa3c0849da0
SHA256ca7152d1b9c36a9dec9aa802d7989715c1576b4a0e655784ab6b0dcc44248a8c
SHA512211b31c796a80af15d5a4aa31c9ec7f7b6a03643d4902a4a53317617c3be7f0857d990a126e58aa718bbfc17fdc2c1b6868a172b726bdac2d9c4d176800a7e0c
-
Filesize
255KB
MD5ef09e5c80a0221addeecd54361dbcc1a
SHA1c810fdce37fdb8aa76ef16235dd9e2b87ce337fa
SHA2569a5effc15a62b4d351a77758f207f122fb42fff38293e7d3fe3bef621010b47b
SHA51231c53c5e09581064965199f5ecffeba295a09d3aaf62a7c06252063eccb3beeba09631542b47f3942bd92cc8e049078564887f8d83fcff9f4ad6c093711bb001
-
Filesize
255KB
MD5ef09e5c80a0221addeecd54361dbcc1a
SHA1c810fdce37fdb8aa76ef16235dd9e2b87ce337fa
SHA2569a5effc15a62b4d351a77758f207f122fb42fff38293e7d3fe3bef621010b47b
SHA51231c53c5e09581064965199f5ecffeba295a09d3aaf62a7c06252063eccb3beeba09631542b47f3942bd92cc8e049078564887f8d83fcff9f4ad6c093711bb001
-
Filesize
255KB
MD5d3c7950214c7a77253dadfa0fbbadbc8
SHA193f41c99d165b5a2ed13d207eaa185b1deffcc58
SHA256e08afe8d71a7ed1cae1ca81e5f4620e1523b4eebaca2669e2ed80a7b17142b09
SHA5125b441dc7ab5b142e23b87725e34ba0169467325cea3b81207b69b10713fc9e26569340497901c5dee639ea11bb30e6e281e75a93d884e7a74c5292a7089da673
-
Filesize
255KB
MD5d3c7950214c7a77253dadfa0fbbadbc8
SHA193f41c99d165b5a2ed13d207eaa185b1deffcc58
SHA256e08afe8d71a7ed1cae1ca81e5f4620e1523b4eebaca2669e2ed80a7b17142b09
SHA5125b441dc7ab5b142e23b87725e34ba0169467325cea3b81207b69b10713fc9e26569340497901c5dee639ea11bb30e6e281e75a93d884e7a74c5292a7089da673