Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:32
Behavioral task
behavioral1
Sample
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe
Resource
win7-20220812-en
General
-
Target
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe
-
Size
255KB
-
MD5
e25e188a2b9b16f1b605be8cb694b3af
-
SHA1
98d4eaa48f286105158e2dae3169e6eec08a61d8
-
SHA256
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f
-
SHA512
c256dd916766dcb3020b4d3b0bd1cc581602ce0dbdfd9afb44bd441a70c70a5522480a30bf0256302beb5b40c70cf6a962b5466c8cbe521de7e093dd14bf8cff
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ/:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" yvayhaiqvp.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yvayhaiqvp.exe -
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yvayhaiqvp.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yvayhaiqvp.exe -
Executes dropped EXE 5 IoCs
Processes:
yvayhaiqvp.exetoopeqvgslztfkm.exeyjbahmim.exexvhjouzvqsdhx.exeyjbahmim.exepid process 3336 yvayhaiqvp.exe 4740 toopeqvgslztfkm.exe 4404 yjbahmim.exe 3496 xvhjouzvqsdhx.exe 4748 yjbahmim.exe -
Processes:
resource yara_rule behavioral2/memory/1632-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\yvayhaiqvp.exe upx C:\Windows\SysWOW64\toopeqvgslztfkm.exe upx C:\Windows\SysWOW64\toopeqvgslztfkm.exe upx C:\Windows\SysWOW64\yvayhaiqvp.exe upx C:\Windows\SysWOW64\yjbahmim.exe upx C:\Windows\SysWOW64\yjbahmim.exe upx C:\Windows\SysWOW64\xvhjouzvqsdhx.exe upx C:\Windows\SysWOW64\xvhjouzvqsdhx.exe upx behavioral2/memory/3336-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4740-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3496-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4404-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\yjbahmim.exe upx behavioral2/memory/1632-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4748-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/3336-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4740-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4404-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3496-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4748-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" yvayhaiqvp.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
toopeqvgslztfkm.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run toopeqvgslztfkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uxxiptng = "yvayhaiqvp.exe" toopeqvgslztfkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ilrittam = "toopeqvgslztfkm.exe" toopeqvgslztfkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xvhjouzvqsdhx.exe" toopeqvgslztfkm.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
yjbahmim.exeyvayhaiqvp.exeyjbahmim.exedescription ioc process File opened (read-only) \??\i: yjbahmim.exe File opened (read-only) \??\u: yjbahmim.exe File opened (read-only) \??\o: yvayhaiqvp.exe File opened (read-only) \??\r: yvayhaiqvp.exe File opened (read-only) \??\g: yjbahmim.exe File opened (read-only) \??\o: yjbahmim.exe File opened (read-only) \??\y: yjbahmim.exe File opened (read-only) \??\f: yjbahmim.exe File opened (read-only) \??\v: yjbahmim.exe File opened (read-only) \??\a: yvayhaiqvp.exe File opened (read-only) \??\i: yvayhaiqvp.exe File opened (read-only) \??\p: yvayhaiqvp.exe File opened (read-only) \??\s: yvayhaiqvp.exe File opened (read-only) \??\v: yvayhaiqvp.exe File opened (read-only) \??\k: yvayhaiqvp.exe File opened (read-only) \??\t: yvayhaiqvp.exe File opened (read-only) \??\u: yjbahmim.exe File opened (read-only) \??\q: yjbahmim.exe File opened (read-only) \??\z: yvayhaiqvp.exe File opened (read-only) \??\a: yjbahmim.exe File opened (read-only) \??\j: yvayhaiqvp.exe File opened (read-only) \??\q: yvayhaiqvp.exe File opened (read-only) \??\k: yjbahmim.exe File opened (read-only) \??\p: yjbahmim.exe File opened (read-only) \??\r: yjbahmim.exe File opened (read-only) \??\n: yvayhaiqvp.exe File opened (read-only) \??\f: yjbahmim.exe File opened (read-only) \??\l: yjbahmim.exe File opened (read-only) \??\s: yjbahmim.exe File opened (read-only) \??\t: yjbahmim.exe File opened (read-only) \??\e: yjbahmim.exe File opened (read-only) \??\y: yjbahmim.exe File opened (read-only) \??\m: yjbahmim.exe File opened (read-only) \??\v: yjbahmim.exe File opened (read-only) \??\a: yjbahmim.exe File opened (read-only) \??\j: yjbahmim.exe File opened (read-only) \??\x: yvayhaiqvp.exe File opened (read-only) \??\y: yvayhaiqvp.exe File opened (read-only) \??\p: yjbahmim.exe File opened (read-only) \??\q: yjbahmim.exe File opened (read-only) \??\e: yjbahmim.exe File opened (read-only) \??\h: yjbahmim.exe File opened (read-only) \??\o: yjbahmim.exe File opened (read-only) \??\g: yvayhaiqvp.exe File opened (read-only) \??\u: yvayhaiqvp.exe File opened (read-only) \??\i: yjbahmim.exe File opened (read-only) \??\l: yjbahmim.exe File opened (read-only) \??\m: yjbahmim.exe File opened (read-only) \??\b: yvayhaiqvp.exe File opened (read-only) \??\e: yvayhaiqvp.exe File opened (read-only) \??\k: yjbahmim.exe File opened (read-only) \??\n: yjbahmim.exe File opened (read-only) \??\t: yjbahmim.exe File opened (read-only) \??\g: yjbahmim.exe File opened (read-only) \??\s: yjbahmim.exe File opened (read-only) \??\w: yjbahmim.exe File opened (read-only) \??\w: yvayhaiqvp.exe File opened (read-only) \??\r: yjbahmim.exe File opened (read-only) \??\x: yjbahmim.exe File opened (read-only) \??\z: yjbahmim.exe File opened (read-only) \??\b: yjbahmim.exe File opened (read-only) \??\l: yvayhaiqvp.exe File opened (read-only) \??\m: yvayhaiqvp.exe File opened (read-only) \??\b: yjbahmim.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
yvayhaiqvp.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" yvayhaiqvp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" yvayhaiqvp.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1632-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3336-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4740-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3496-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4404-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1632-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4748-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3336-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4740-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4404-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3496-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4748-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exeyjbahmim.exeyjbahmim.exeyvayhaiqvp.exedescription ioc process File opened for modification C:\Windows\SysWOW64\xvhjouzvqsdhx.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe yjbahmim.exe File created C:\Windows\SysWOW64\yvayhaiqvp.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File opened for modification C:\Windows\SysWOW64\yvayhaiqvp.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File created C:\Windows\SysWOW64\toopeqvgslztfkm.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File opened for modification C:\Windows\SysWOW64\toopeqvgslztfkm.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File created C:\Windows\SysWOW64\yjbahmim.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File created C:\Windows\SysWOW64\xvhjouzvqsdhx.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification C:\Windows\SysWOW64\yjbahmim.exe 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll yvayhaiqvp.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe yjbahmim.exe -
Drops file in Program Files directory 18 IoCs
Processes:
yjbahmim.exeyjbahmim.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe yjbahmim.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe yjbahmim.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe yjbahmim.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe yjbahmim.exe File opened for modification \??\c:\Program Files\ExportUnpublish.doc.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal yjbahmim.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal yjbahmim.exe File created \??\c:\Program Files\ExportUnpublish.doc.exe yjbahmim.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal yjbahmim.exe File opened for modification C:\Program Files\ExportUnpublish.nal yjbahmim.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe yjbahmim.exe File opened for modification C:\Program Files\ExportUnpublish.doc.exe yjbahmim.exe -
Drops file in Windows directory 11 IoCs
Processes:
yjbahmim.exeWINWORD.EXEyjbahmim.exe5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exedescription ioc process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe yjbahmim.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe yjbahmim.exe File opened for modification C:\Windows\mydoc.rtf 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe yjbahmim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
yvayhaiqvp.exe5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg yvayhaiqvp.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32352D7E9C5782566A3476D1702F2DDF7CF165D9" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yvayhaiqvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh yvayhaiqvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yvayhaiqvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" yvayhaiqvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC2B120479739E353BDBAA6329CD7CB" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FCF84828851B9137D65B7EE6BC92E633584467436336D69C" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat yvayhaiqvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc yvayhaiqvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" yvayhaiqvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" yvayhaiqvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf yvayhaiqvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs yvayhaiqvp.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC8FABBF962F29983753A40819D3996B38C02F84262023DE1C842EB08A7" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F468C4FF6C21D1D10BD1D18A0C9114" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1849C67D14E0DAB2B9C07FE0ED9F34BD" 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yvayhaiqvp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4812 WINWORD.EXE 4812 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exetoopeqvgslztfkm.exeyvayhaiqvp.exeyjbahmim.exexvhjouzvqsdhx.exeyjbahmim.exepid process 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3336 yvayhaiqvp.exe 3336 yvayhaiqvp.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exeyvayhaiqvp.exetoopeqvgslztfkm.exeyjbahmim.exexvhjouzvqsdhx.exeyjbahmim.exepid process 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 3336 yvayhaiqvp.exe 4740 toopeqvgslztfkm.exe 3336 yvayhaiqvp.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 3336 yvayhaiqvp.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exeyvayhaiqvp.exetoopeqvgslztfkm.exeyjbahmim.exexvhjouzvqsdhx.exeyjbahmim.exepid process 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe 3336 yvayhaiqvp.exe 4740 toopeqvgslztfkm.exe 4740 toopeqvgslztfkm.exe 3336 yvayhaiqvp.exe 4740 toopeqvgslztfkm.exe 3336 yvayhaiqvp.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 4404 yjbahmim.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 3496 xvhjouzvqsdhx.exe 4748 yjbahmim.exe 4748 yjbahmim.exe 4748 yjbahmim.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE 4812 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exeyvayhaiqvp.exedescription pid process target process PID 1632 wrote to memory of 3336 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yvayhaiqvp.exe PID 1632 wrote to memory of 3336 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yvayhaiqvp.exe PID 1632 wrote to memory of 3336 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yvayhaiqvp.exe PID 1632 wrote to memory of 4740 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe toopeqvgslztfkm.exe PID 1632 wrote to memory of 4740 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe toopeqvgslztfkm.exe PID 1632 wrote to memory of 4740 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe toopeqvgslztfkm.exe PID 1632 wrote to memory of 4404 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yjbahmim.exe PID 1632 wrote to memory of 4404 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yjbahmim.exe PID 1632 wrote to memory of 4404 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe yjbahmim.exe PID 1632 wrote to memory of 3496 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe xvhjouzvqsdhx.exe PID 1632 wrote to memory of 3496 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe xvhjouzvqsdhx.exe PID 1632 wrote to memory of 3496 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe xvhjouzvqsdhx.exe PID 3336 wrote to memory of 4748 3336 yvayhaiqvp.exe yjbahmim.exe PID 3336 wrote to memory of 4748 3336 yvayhaiqvp.exe yjbahmim.exe PID 3336 wrote to memory of 4748 3336 yvayhaiqvp.exe yjbahmim.exe PID 1632 wrote to memory of 4812 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe WINWORD.EXE PID 1632 wrote to memory of 4812 1632 5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe"C:\Users\Admin\AppData\Local\Temp\5c63e77a75bd9264970edae63a5657e27f93d214cbea78fd90e0dd8317bbf35f.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\yvayhaiqvp.exeyvayhaiqvp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\yjbahmim.exeC:\Windows\system32\yjbahmim.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4748 -
C:\Windows\SysWOW64\toopeqvgslztfkm.exetoopeqvgslztfkm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4740 -
C:\Windows\SysWOW64\yjbahmim.exeyjbahmim.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4404 -
C:\Windows\SysWOW64\xvhjouzvqsdhx.exexvhjouzvqsdhx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3496 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4812
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5573197f138b06690eca588d235d167fc
SHA1e028c1434eccaf3efd2ef5201f96a331ab48c637
SHA2562bc761e0e9da6bc26b5fb1f7b11a9823d1a72dec97eb9eef72053d8d3e6700b2
SHA512df1c7a72972dcc4a9182ef56c929639bda8a8e40ce380b9f52350d30c96363cf1a7d843710cb914f1ea56278f0a681f65e4cb22a1647fc39448efcac1d3fa31c
-
Filesize
255KB
MD5a9107c75fd10ba64868c7ce8791c1d44
SHA189baaf7d94f54441ef558cf81596280a4b5a686d
SHA256a6d30e7cf933c84ddc2b2f2360cda3bde755b99fe6b2d5e6f3b28d3b9c7211ac
SHA512bba6c30f38096a319b70a19c92b12ca853d941d50c9b5dc9e667058569c55700d400e811b2cc30e47097875cf661bff8061123798d18d729c512eb05ac1d2785
-
Filesize
255KB
MD5c55bbca8617c73627fb57f6d286ef3dc
SHA1421015e0739a9617c099defbb9c90a652f9841d2
SHA256069d8242f7225e229189a18ce757fc4046e9267db676df7ccb98965a36114f2a
SHA5128ca5cbe9baf2823957ea7cdb0c3f371e0ce216b169bca211597236d518ba43238f597278c5173576da92ad459bc74f0b0e15add4aea8a46faf1f02ca9b3ed00d
-
Filesize
255KB
MD5c55bbca8617c73627fb57f6d286ef3dc
SHA1421015e0739a9617c099defbb9c90a652f9841d2
SHA256069d8242f7225e229189a18ce757fc4046e9267db676df7ccb98965a36114f2a
SHA5128ca5cbe9baf2823957ea7cdb0c3f371e0ce216b169bca211597236d518ba43238f597278c5173576da92ad459bc74f0b0e15add4aea8a46faf1f02ca9b3ed00d
-
Filesize
255KB
MD58866c0f7fc9edf63c57f1ea1b7ff4474
SHA178fc337e4b3d4a17575e9b0f8ac838a46622a280
SHA256dfc9babcb2ccbe22131e9eb94625bad686154d12dd8093426fc0791cc57f4056
SHA512d71ead3d8259d8c0b67da6b0f24b7e481e64dfd7284dd86f819448e5074296a3f9c5329613eec9f6b796f7c15a0361eae340d7abf5102feab6de028450b1edb4
-
Filesize
255KB
MD58866c0f7fc9edf63c57f1ea1b7ff4474
SHA178fc337e4b3d4a17575e9b0f8ac838a46622a280
SHA256dfc9babcb2ccbe22131e9eb94625bad686154d12dd8093426fc0791cc57f4056
SHA512d71ead3d8259d8c0b67da6b0f24b7e481e64dfd7284dd86f819448e5074296a3f9c5329613eec9f6b796f7c15a0361eae340d7abf5102feab6de028450b1edb4
-
Filesize
255KB
MD5cdb0e3f8eacadce1253e945bd683be4e
SHA11bbfe398df72fe2801112e62a22df32985095a58
SHA25630a9b38293305cee05948c51646a89f627b148b4db581f25a0bacea133098db2
SHA5123e0723389b1770263753f354c6bbe5c61087e0373b20bc257a02208b4f4599e0698ccb7a61de6889a3de6f8c4017123baf9b4d51ca1a2c8943b5cfd3c6314c78
-
Filesize
255KB
MD5cdb0e3f8eacadce1253e945bd683be4e
SHA11bbfe398df72fe2801112e62a22df32985095a58
SHA25630a9b38293305cee05948c51646a89f627b148b4db581f25a0bacea133098db2
SHA5123e0723389b1770263753f354c6bbe5c61087e0373b20bc257a02208b4f4599e0698ccb7a61de6889a3de6f8c4017123baf9b4d51ca1a2c8943b5cfd3c6314c78
-
Filesize
255KB
MD5cdb0e3f8eacadce1253e945bd683be4e
SHA11bbfe398df72fe2801112e62a22df32985095a58
SHA25630a9b38293305cee05948c51646a89f627b148b4db581f25a0bacea133098db2
SHA5123e0723389b1770263753f354c6bbe5c61087e0373b20bc257a02208b4f4599e0698ccb7a61de6889a3de6f8c4017123baf9b4d51ca1a2c8943b5cfd3c6314c78
-
Filesize
255KB
MD58184f8577835ce0283b7f688313bf55b
SHA16f131abba357737e2c6395fed864fa94462b120a
SHA25635e7c12d9b6054b034b9c1c90894ca05c506363b05c7a8a51f6fe834caa69132
SHA512f5a9cf290ab4d2431f17c96d9bfe671ca8074359b1738130bdc1752d55a8528337bc10d84b55e06bdabb7d038ed2606f0fbc37592330c9079dd13ce8511521c3
-
Filesize
255KB
MD58184f8577835ce0283b7f688313bf55b
SHA16f131abba357737e2c6395fed864fa94462b120a
SHA25635e7c12d9b6054b034b9c1c90894ca05c506363b05c7a8a51f6fe834caa69132
SHA512f5a9cf290ab4d2431f17c96d9bfe671ca8074359b1738130bdc1752d55a8528337bc10d84b55e06bdabb7d038ed2606f0fbc37592330c9079dd13ce8511521c3
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD545708c093b7abe67572d4e5ea8a22822
SHA151042ead178bab2e193642c6c014769f5d3107cb
SHA2566f572cf6da50154b5ea03a2a25548430f9ec48240c7756c5455b5f771fdcac10
SHA51218f5409ab96c97e5aa381a980676e3e6eb9f6dab69631fb78a73fcaeadc7a5f49ae3ac338c598e45b5ff63dd46244d5b335225ebc36b52311a2f8a9eaaa0a7ee
-
Filesize
255KB
MD5fdd7d98d5acf9dbf74646c11b2f050a3
SHA1c47c4b50a7224356bdc0bdc5873795bd419956ce
SHA25624271d91b25903f688789f0fd4d174aa58f28dab63f7227d94bb6b72415d4c8f
SHA512915b0b62302bc0ebdce0bb59cf006aea292536830f9d2af8278d82c2647b02b89eeb14b21610498394b91283bf23b7b2a27729a3788251e6f1e4ba7e1ba1d87a