Overview
overview
9Static
static
9hyword/hyw...TS.dll
windows7-x64
1hyword/hyw...TS.dll
windows10-2004-x64
8hyword/hyw...ch.msi
windows7-x64
8hyword/hyw...ch.msi
windows10-2004-x64
8hyword/hyw...hm.dll
windows7-x64
6hyword/hyw...hm.dll
windows10-2004-x64
6hyword/hyw...HS.dll
windows7-x64
1hyword/hyw...HS.dll
windows10-2004-x64
1hyword/hyw...ce.dll
windows7-x64
1hyword/hyw...ce.dll
windows10-2004-x64
1hyword/hyw...lc.exe
windows7-x64
1hyword/hyw...lc.exe
windows10-2004-x64
1hyword/hyw...lc.exe
windows7-x64
1hyword/hyw...lc.exe
windows10-2004-x64
7hyword/hyw...ut.exe
windows7-x64
3hyword/hyw...ut.exe
windows10-2004-x64
7hyword/hyw...lk.chm
windows7-x64
1hyword/hyw...lk.chm
windows10-2004-x64
1hyword/hyw...lk.dll
windows7-x64
1hyword/hyw...lk.dll
windows10-2004-x64
1hyword/hyw...rd.exe
windows7-x64
3hyword/hyw...rd.exe
windows10-2004-x64
7hyword/hyword/lpk.dll
windows7-x64
8hyword/hyword/lpk.dll
windows10-2004-x64
8hyword/hyw...60.dll
windows7-x64
1hyword/hyw...60.dll
windows10-2004-x64
1hyword/hyw...fc.dll
windows7-x64
8hyword/hyw...fc.dll
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:31
Behavioral task
behavioral1
Sample
hyword/hyword/ChTTS.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hyword/hyword/ChTTS.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
hyword/hyword/CnSpeech.msi
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
hyword/hyword/CnSpeech.msi
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
hyword/hyword/Unchm.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
hyword/hyword/Unchm.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
hyword/hyword/VB6CHS.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
hyword/hyword/VB6CHS.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
hyword/hyword/appface.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
hyword/hyword/appface.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
hyword/hyword/cjcalc.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
hyword/hyword/cjcalc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
hyword/hyword/hycalc.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
hyword/hyword/hycalc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
hyword/hyword/hyinput.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
hyword/hyword/hyinput.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
hyword/hyword/hytalk.chm
Resource
win7-20221111-en
Behavioral task
behavioral18
Sample
hyword/hyword/hytalk.chm
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
hyword/hyword/hytalk.dll
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
hyword/hyword/hytalk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
hyword/hyword/hyword.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
hyword/hyword/hyword.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
hyword/hyword/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
hyword/hyword/lpk.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
hyword/hyword/msvbvm60.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
hyword/hyword/msvbvm60.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
hyword/hyword/wbfc.dll
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
hyword/hyword/wbfc.dll
Resource
win10v2004-20220901-en
General
-
Target
hyword/hyword/hyinput.exe
-
Size
76KB
-
MD5
d017597920e6db7e9e31296a8f654ed2
-
SHA1
9250c0aa7ee5da68a72f529da2455fdbb7874b80
-
SHA256
05ff92e5422b5a150bd254a8e9a917e0503ec11ca3219cff7f4c4c982f8e918b
-
SHA512
c3ef62e1e68ba00955f1e5de9828fd00dde332e0946d598cbd8ae6a31854bd78f79cb5a6395d4653e3d50652d2171319e10b643741d27edc77fd6bda3edf644b
-
SSDEEP
1536:oJNVrI2W3Oh4dDgFpTS+oD6LZlglddasJEZOC8TOPO5lp0Ustkznh489AaJEGV:oG2AOh3F1po8Tyd1JRC8QGltstEy8Oat
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
hyinput.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation hyinput.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 45 IoCs
Processes:
hyinput.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\0\win32 hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid32 hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\InprocServer32\ThreadingModel = "Apartment" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\VERSION\ = "4.0" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0 hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\FLAGS\ = "0" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hyword\\hyword\\wbfc.dll" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\HELPDIR hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\InprocServer32 hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\FLAGS hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid32 hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib\ = "{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\play78.GetCodeClass\Clsid hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\0 hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ = "GetCodeClass" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib\Version = "4.0" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\VERSION hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\play78.GetCodeClass hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\play78.GetCodeClass\Clsid\ = "{D228C3B7-781A-41D7-8E5A-9216CC1F9194}" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\play78.GetCodeClass\ = "play78.GetCodeClass" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\Programmable hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F} hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ = "_GetCodeClass" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib\ = "{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194} hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hyword\\hyword\\wbfc.dll" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\TypeLib\ = "{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\TypeLib hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D} hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hyword\\hyword" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\ = "_GetCodeClass" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\ = "play78.GetCodeClass" hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D9AC3251-B484-43EA-971B-E8BD8D6A8F7D}\4.0\ = "play78" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F} hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{78F9225D-4FDE-4CA4-B017-30E2304AED8F}\TypeLib\Version = "4.0" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\ProgID hyinput.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\ProgID\ = "play78.GetCodeClass" hyinput.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D228C3B7-781A-41D7-8E5A-9216CC1F9194}\Implemented Categories hyinput.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
hyinput.exepid process 1080 hyinput.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXESpeechUXWiz.exedescription pid process Token: 33 1268 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1268 AUDIODG.EXE Token: 33 4952 SpeechUXWiz.exe Token: SeIncBasePriorityPrivilege 4952 SpeechUXWiz.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
hyinput.exepid process 1080 hyinput.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
hyinput.exepid process 1080 hyinput.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
hyinput.exepid process 1080 hyinput.exe 1080 hyinput.exe 1080 hyinput.exe 1080 hyinput.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
hyinput.exesapisvr.exedescription pid process target process PID 1080 wrote to memory of 2200 1080 hyinput.exe sapisvr.exe PID 1080 wrote to memory of 2200 1080 hyinput.exe sapisvr.exe PID 2200 wrote to memory of 4952 2200 sapisvr.exe SpeechUXWiz.exe PID 2200 wrote to memory of 4952 2200 sapisvr.exe SpeechUXWiz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hyword\hyword\hyinput.exe"C:\Users\Admin\AppData\Local\Temp\hyword\hyword\hyinput.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\Speech\Common\sapisvr.exe"C:\Windows\Speech\Common\sapisvr.exe" -SpeechApp2⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\Speech\SpeechUX\SpeechUXWiz.exe"C:\Windows\system32\Speech\SpeechUX\SpeechUXWiz.exe" UserEnrollment,en-US,HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech\RecoProfiles\Tokens\{395F4005-F9F2-4B94-A9E2-ED7D869C0F0A},65552,0,""3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x41c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_4CC00D43FD14419A979CECD5D14A6CB7.dat
Filesize940B
MD54be166fd3b3d349bcea5d862adb30276
SHA16be64b67fb7ef52ef0c975ca9d3f6b2776885c63
SHA25698214431c606befde4b70aa88e07279193dd77879bd0be33f0999a84e5e5bb61
SHA51291f03fe3f01f9f4053bf11090705caf6fd82fc884d6c91bfa640daca72a094c717570fbbcfc9e85d09bbf78dfea7eb2db609f2cd3fd43ae3d361b1ed2308a1cb