Analysis
-
max time kernel
192s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 22:39
Behavioral task
behavioral1
Sample
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe
Resource
win7-20220812-en
General
-
Target
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe
-
Size
255KB
-
MD5
dbc4b7e63d1dd76f2a4a43a2a4523969
-
SHA1
b9235597a54d8ddfb736fe20419eab5e30aee11c
-
SHA256
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280
-
SHA512
6aec3d29aa34f44b8bea5616bd1e9d4a15ad61dcef4d8111a8f49421c283f0e04f83497a98174467a6fc5831c0e0d183ce09c03c9a62ca8fa2bea8860fc8029d
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJR:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIa
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" likipptyny.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" likipptyny.exe -
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" likipptyny.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" likipptyny.exe -
Executes dropped EXE 5 IoCs
Processes:
likipptyny.exekqzxerhkafachau.exeslzjzrmm.exeofiimhyojbldo.exeslzjzrmm.exepid process 1048 likipptyny.exe 4172 kqzxerhkafachau.exe 1152 slzjzrmm.exe 1020 ofiimhyojbldo.exe 4124 slzjzrmm.exe -
Processes:
resource yara_rule behavioral2/memory/1084-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\likipptyny.exe upx C:\Windows\SysWOW64\likipptyny.exe upx C:\Windows\SysWOW64\kqzxerhkafachau.exe upx C:\Windows\SysWOW64\kqzxerhkafachau.exe upx C:\Windows\SysWOW64\slzjzrmm.exe upx C:\Windows\SysWOW64\slzjzrmm.exe upx C:\Windows\SysWOW64\ofiimhyojbldo.exe upx C:\Windows\SysWOW64\ofiimhyojbldo.exe upx behavioral2/memory/1048-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4172-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1152-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1020-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\slzjzrmm.exe upx behavioral2/memory/1084-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4124-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/1048-162-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4172-163-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1152-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1020-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4124-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Users\Admin\AppData\Roaming\ReceiveEnter.doc.exe upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" likipptyny.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
kqzxerhkafachau.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ofiimhyojbldo.exe" kqzxerhkafachau.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run kqzxerhkafachau.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wiklabxk = "likipptyny.exe" kqzxerhkafachau.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lvbhbjwj = "kqzxerhkafachau.exe" kqzxerhkafachau.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
slzjzrmm.exelikipptyny.exeslzjzrmm.exedescription ioc process File opened (read-only) \??\b: slzjzrmm.exe File opened (read-only) \??\k: likipptyny.exe File opened (read-only) \??\t: likipptyny.exe File opened (read-only) \??\j: likipptyny.exe File opened (read-only) \??\l: slzjzrmm.exe File opened (read-only) \??\v: slzjzrmm.exe File opened (read-only) \??\h: slzjzrmm.exe File opened (read-only) \??\j: slzjzrmm.exe File opened (read-only) \??\y: slzjzrmm.exe File opened (read-only) \??\h: slzjzrmm.exe File opened (read-only) \??\a: slzjzrmm.exe File opened (read-only) \??\a: likipptyny.exe File opened (read-only) \??\e: likipptyny.exe File opened (read-only) \??\m: likipptyny.exe File opened (read-only) \??\q: likipptyny.exe File opened (read-only) \??\r: slzjzrmm.exe File opened (read-only) \??\v: slzjzrmm.exe File opened (read-only) \??\m: slzjzrmm.exe File opened (read-only) \??\z: slzjzrmm.exe File opened (read-only) \??\z: slzjzrmm.exe File opened (read-only) \??\f: likipptyny.exe File opened (read-only) \??\u: likipptyny.exe File opened (read-only) \??\w: likipptyny.exe File opened (read-only) \??\i: slzjzrmm.exe File opened (read-only) \??\n: slzjzrmm.exe File opened (read-only) \??\t: slzjzrmm.exe File opened (read-only) \??\k: slzjzrmm.exe File opened (read-only) \??\n: likipptyny.exe File opened (read-only) \??\x: likipptyny.exe File opened (read-only) \??\b: slzjzrmm.exe File opened (read-only) \??\q: slzjzrmm.exe File opened (read-only) \??\g: likipptyny.exe File opened (read-only) \??\v: likipptyny.exe File opened (read-only) \??\y: slzjzrmm.exe File opened (read-only) \??\i: likipptyny.exe File opened (read-only) \??\s: likipptyny.exe File opened (read-only) \??\y: likipptyny.exe File opened (read-only) \??\g: slzjzrmm.exe File opened (read-only) \??\a: slzjzrmm.exe File opened (read-only) \??\n: slzjzrmm.exe File opened (read-only) \??\t: slzjzrmm.exe File opened (read-only) \??\w: slzjzrmm.exe File opened (read-only) \??\p: slzjzrmm.exe File opened (read-only) \??\g: slzjzrmm.exe File opened (read-only) \??\o: slzjzrmm.exe File opened (read-only) \??\p: slzjzrmm.exe File opened (read-only) \??\f: slzjzrmm.exe File opened (read-only) \??\j: slzjzrmm.exe File opened (read-only) \??\k: slzjzrmm.exe File opened (read-only) \??\u: slzjzrmm.exe File opened (read-only) \??\x: slzjzrmm.exe File opened (read-only) \??\e: slzjzrmm.exe File opened (read-only) \??\f: slzjzrmm.exe File opened (read-only) \??\l: slzjzrmm.exe File opened (read-only) \??\o: likipptyny.exe File opened (read-only) \??\p: likipptyny.exe File opened (read-only) \??\s: slzjzrmm.exe File opened (read-only) \??\q: slzjzrmm.exe File opened (read-only) \??\i: slzjzrmm.exe File opened (read-only) \??\x: slzjzrmm.exe File opened (read-only) \??\r: likipptyny.exe File opened (read-only) \??\o: slzjzrmm.exe File opened (read-only) \??\s: slzjzrmm.exe File opened (read-only) \??\u: slzjzrmm.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
likipptyny.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" likipptyny.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" likipptyny.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1048-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4172-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1152-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1020-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1084-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4124-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1048-162-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4172-163-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1152-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1020-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4124-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exelikipptyny.exedescription ioc process File opened for modification C:\Windows\SysWOW64\kqzxerhkafachau.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File opened for modification C:\Windows\SysWOW64\ofiimhyojbldo.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll likipptyny.exe File created C:\Windows\SysWOW64\likipptyny.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File opened for modification C:\Windows\SysWOW64\likipptyny.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File created C:\Windows\SysWOW64\kqzxerhkafachau.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File created C:\Windows\SysWOW64\slzjzrmm.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File opened for modification C:\Windows\SysWOW64\slzjzrmm.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe File created C:\Windows\SysWOW64\ofiimhyojbldo.exe 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe -
Drops file in Program Files directory 15 IoCs
Processes:
slzjzrmm.exeslzjzrmm.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe slzjzrmm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal slzjzrmm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal slzjzrmm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe slzjzrmm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe slzjzrmm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal slzjzrmm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe slzjzrmm.exe -
Drops file in Windows directory 3 IoCs
Processes:
WINWORD.EXE6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
likipptyny.exe6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" likipptyny.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2C089C2283566D4577D077222DD77D8065AB" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB1B15F44E439E852C4B9D03298D7CB" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC70C15E0DAB3B8BD7C97ECE034BC" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABEF9CCFE67F29183753A4386EC39E1B08E028B4369033AE1BD429A09D6" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFFF8482985189135D72F7E9CBDE2E141594567346343D79B" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" likipptyny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" likipptyny.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf likipptyny.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" likipptyny.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F66BC3FE6F21ABD208D0D38B0E9161" 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat likipptyny.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2484 WINWORD.EXE 2484 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exelikipptyny.exekqzxerhkafachau.exeslzjzrmm.exeofiimhyojbldo.exeslzjzrmm.exepid process 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exelikipptyny.exekqzxerhkafachau.exeslzjzrmm.exeofiimhyojbldo.exeslzjzrmm.exepid process 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exelikipptyny.exekqzxerhkafachau.exeslzjzrmm.exeofiimhyojbldo.exeslzjzrmm.exepid process 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe 1048 likipptyny.exe 1048 likipptyny.exe 1048 likipptyny.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 4172 kqzxerhkafachau.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1152 slzjzrmm.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 1020 ofiimhyojbldo.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe 4124 slzjzrmm.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2484 WINWORD.EXE 2484 WINWORD.EXE 2484 WINWORD.EXE 2484 WINWORD.EXE 2484 WINWORD.EXE 2484 WINWORD.EXE 2484 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exelikipptyny.exedescription pid process target process PID 1084 wrote to memory of 1048 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe likipptyny.exe PID 1084 wrote to memory of 1048 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe likipptyny.exe PID 1084 wrote to memory of 1048 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe likipptyny.exe PID 1084 wrote to memory of 4172 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe kqzxerhkafachau.exe PID 1084 wrote to memory of 4172 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe kqzxerhkafachau.exe PID 1084 wrote to memory of 4172 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe kqzxerhkafachau.exe PID 1084 wrote to memory of 1152 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe slzjzrmm.exe PID 1084 wrote to memory of 1152 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe slzjzrmm.exe PID 1084 wrote to memory of 1152 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe slzjzrmm.exe PID 1084 wrote to memory of 1020 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe ofiimhyojbldo.exe PID 1084 wrote to memory of 1020 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe ofiimhyojbldo.exe PID 1084 wrote to memory of 1020 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe ofiimhyojbldo.exe PID 1048 wrote to memory of 4124 1048 likipptyny.exe slzjzrmm.exe PID 1048 wrote to memory of 4124 1048 likipptyny.exe slzjzrmm.exe PID 1048 wrote to memory of 4124 1048 likipptyny.exe slzjzrmm.exe PID 1084 wrote to memory of 2484 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe WINWORD.EXE PID 1084 wrote to memory of 2484 1084 6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe"C:\Users\Admin\AppData\Local\Temp\6696746e12bbfb3c99c8fa82cbacef621a64dd7f8575ef64a9ed2d18c7b16280.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\likipptyny.exelikipptyny.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\slzjzrmm.exeC:\Windows\system32\slzjzrmm.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\kqzxerhkafachau.exekqzxerhkafachau.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\slzjzrmm.exeslzjzrmm.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\ofiimhyojbldo.exeofiimhyojbldo.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hidden Files and Directories
2Modify Registry
6Disabling Security Tools
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exeFilesize
255KB
MD5fb6439bb779bde4be7fbbef314514ee1
SHA1db598163d4d24926ab79d7206312d97e1de51e42
SHA256e994d143e391cd6912546cd2af978f54cd103b545cc6166130fb79027d2398a4
SHA512f4f9cb9db64e69e3caaaca5b3f6f337ec6df2a82afe9aebff4a727bf879df78b89d9ccecee3cab030976bbafd309e2d13716a4119cdbb1eb086e9971ad0f5933
-
C:\Users\Admin\AppData\Roaming\ReceiveEnter.doc.exeFilesize
255KB
MD5054755ff5d5c059e955a339cb55aad7c
SHA19efb639a79418d18d81d283da648650f2a00ef8c
SHA256100b60313cbca893307ca69435cfc029a218589456c1d8200fdad665d01b2af4
SHA51284f09f258c9c7e9453938e6522a99b9c9d41a8709c7d4d7c0b71c6c0c83ce65ac992f7b0636669c2ae50495c86848fa3fce562db40b21b26f004297cc5c8a824
-
C:\Windows\SysWOW64\kqzxerhkafachau.exeFilesize
255KB
MD5db0f9c7e452fdf60a3f8ac715c8314c5
SHA146321e8341833862024ae847fda28fc1274555fa
SHA256c541b3fcaca9cd682679f481857548347d174524cf2322171069dc266d74ef55
SHA5124320f4956a46c6124f12d4ee64ce8b1e7604cb18ea405f106be011819eb68a644a3826de5a6c7d2ae9b5904da99bdd5a939fd538f7472323cfa5faa7b3092ff7
-
C:\Windows\SysWOW64\kqzxerhkafachau.exeFilesize
255KB
MD5db0f9c7e452fdf60a3f8ac715c8314c5
SHA146321e8341833862024ae847fda28fc1274555fa
SHA256c541b3fcaca9cd682679f481857548347d174524cf2322171069dc266d74ef55
SHA5124320f4956a46c6124f12d4ee64ce8b1e7604cb18ea405f106be011819eb68a644a3826de5a6c7d2ae9b5904da99bdd5a939fd538f7472323cfa5faa7b3092ff7
-
C:\Windows\SysWOW64\likipptyny.exeFilesize
255KB
MD5420c5b7aac9fdb13ca5dc78945fc7813
SHA11886e3cb1ba5e5318ce9e6377e1b46f165c5b4c7
SHA25655597eaa98a26baf3691737bad0847e95d8a24d8d156580e0650e7a664250d20
SHA5120614331b3e19b25a0d93ee6302c207a20012991239acddfc007fdcee4e145758c8889a2990212c488137cef41d5dcec765bb71aeb5d2b80227495533aa9dcf5a
-
C:\Windows\SysWOW64\likipptyny.exeFilesize
255KB
MD5420c5b7aac9fdb13ca5dc78945fc7813
SHA11886e3cb1ba5e5318ce9e6377e1b46f165c5b4c7
SHA25655597eaa98a26baf3691737bad0847e95d8a24d8d156580e0650e7a664250d20
SHA5120614331b3e19b25a0d93ee6302c207a20012991239acddfc007fdcee4e145758c8889a2990212c488137cef41d5dcec765bb71aeb5d2b80227495533aa9dcf5a
-
C:\Windows\SysWOW64\ofiimhyojbldo.exeFilesize
255KB
MD5559c5518511f9935ded85c65f79aebac
SHA12d3c4a7a7b2339a49fba3b26d413d4c9c04bc94c
SHA256c1cd6910e92e66712ade4a472c8f1e776d0185f48afa6977e23ef64082f8dbaa
SHA512a03f30f780a0a94c0ffed6d1c8b72791c38402dc84ed413c61050f27f09a495ddcb96e649262ecf185eae176ad386f205b16d348befb871bd73ffd6894af85cf
-
C:\Windows\SysWOW64\ofiimhyojbldo.exeFilesize
255KB
MD5559c5518511f9935ded85c65f79aebac
SHA12d3c4a7a7b2339a49fba3b26d413d4c9c04bc94c
SHA256c1cd6910e92e66712ade4a472c8f1e776d0185f48afa6977e23ef64082f8dbaa
SHA512a03f30f780a0a94c0ffed6d1c8b72791c38402dc84ed413c61050f27f09a495ddcb96e649262ecf185eae176ad386f205b16d348befb871bd73ffd6894af85cf
-
C:\Windows\SysWOW64\slzjzrmm.exeFilesize
255KB
MD5b6ab10fea4805dcc136b6f6a726323d1
SHA1bcd685aaa4f4a34addfe3bbe99ed23f3f9c2b665
SHA256c50687464c31ddb4f2ea78b55f5d36d8da9b084edddd3847d38c17af926c85f1
SHA512224f05cbe70c1ed90fb2e733d7dd2a6fea1409d1f590448abec058f7d1412ef0cc625607fcecaec14030565e5384ec382e08c15ca0255babeceded0aae1cba81
-
C:\Windows\SysWOW64\slzjzrmm.exeFilesize
255KB
MD5b6ab10fea4805dcc136b6f6a726323d1
SHA1bcd685aaa4f4a34addfe3bbe99ed23f3f9c2b665
SHA256c50687464c31ddb4f2ea78b55f5d36d8da9b084edddd3847d38c17af926c85f1
SHA512224f05cbe70c1ed90fb2e733d7dd2a6fea1409d1f590448abec058f7d1412ef0cc625607fcecaec14030565e5384ec382e08c15ca0255babeceded0aae1cba81
-
C:\Windows\SysWOW64\slzjzrmm.exeFilesize
255KB
MD5b6ab10fea4805dcc136b6f6a726323d1
SHA1bcd685aaa4f4a34addfe3bbe99ed23f3f9c2b665
SHA256c50687464c31ddb4f2ea78b55f5d36d8da9b084edddd3847d38c17af926c85f1
SHA512224f05cbe70c1ed90fb2e733d7dd2a6fea1409d1f590448abec058f7d1412ef0cc625607fcecaec14030565e5384ec382e08c15ca0255babeceded0aae1cba81
-
C:\Windows\mydoc.rtfFilesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
\??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exeFilesize
255KB
MD52ce742ee26d45974ca2fda4c5d933a9f
SHA19de55c996cc96c9bae271fdc04e985436bf33f09
SHA25624c9c4cccc22fd7c22a8aa2def9c7157a3fb6e42830c9bd22277e95179d74325
SHA51253f1012c04dc401c9b90ba8fb25c353b8f104762aaca5dcc1d33b58306e271fab509abda24b942e1eea673baf2ec991946c594da2d17b507ff3bb12f731c9933
-
memory/1020-142-0x0000000000000000-mapping.dmp
-
memory/1020-148-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1020-165-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1048-162-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1048-133-0x0000000000000000-mapping.dmp
-
memory/1048-145-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1084-152-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1084-132-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1152-147-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1152-139-0x0000000000000000-mapping.dmp
-
memory/1152-164-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/2484-161-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmpFilesize
64KB
-
memory/2484-151-0x0000000000000000-mapping.dmp
-
memory/2484-158-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-159-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-160-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-156-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-174-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-173-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-172-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-157-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-171-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmpFilesize
64KB
-
memory/2484-167-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmpFilesize
64KB
-
memory/4124-149-0x0000000000000000-mapping.dmp
-
memory/4124-166-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4124-153-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4172-136-0x0000000000000000-mapping.dmp
-
memory/4172-163-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/4172-146-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB