Analysis
-
max time kernel
187s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:28
Behavioral task
behavioral1
Sample
e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe
Resource
win10v2004-20221111-en
General
-
Target
e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe
-
Size
255KB
-
MD5
ecfde23c75e33aad92c20b7fe535b92e
-
SHA1
630b48eb74a236cc895d2232964c76a31e5a4778
-
SHA256
e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368
-
SHA512
644f92ec1c7094afea1ebf98fe6870fbc63ec4964197e8a7460f394e5c01f02debc5b79ae51a4fac3bfd1087833ece99d2bf3c79827a91d75a3123da649fb706
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJf:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tohidvhzbr.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tohidvhzbr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tohidvhzbr.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tohidvhzbr.exe -
Executes dropped EXE 5 IoCs
pid Process 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 3884 ytnqiehb.exe -
resource yara_rule behavioral2/memory/2600-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x000a000000022e4b-134.dat upx behavioral2/files/0x000a000000022e4b-135.dat upx behavioral2/memory/208-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e50-139.dat upx behavioral2/files/0x0006000000022e50-138.dat upx behavioral2/files/0x0006000000022e51-141.dat upx behavioral2/files/0x0006000000022e51-142.dat upx behavioral2/files/0x0006000000022e52-145.dat upx behavioral2/files/0x0006000000022e52-144.dat upx behavioral2/memory/544-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5104-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3192-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e51-150.dat upx behavioral2/memory/3884-151-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2600-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e57-154.dat upx behavioral2/files/0x0006000000022e58-155.dat upx behavioral2/memory/208-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/544-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5104-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3192-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3884-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tohidvhzbr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "sujabnyfijlxt.exe" fgukgokeqlpukof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run fgukgokeqlpukof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ndvhoyck = "tohidvhzbr.exe" fgukgokeqlpukof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ydwgmifm = "fgukgokeqlpukof.exe" fgukgokeqlpukof.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: ytnqiehb.exe File opened (read-only) \??\x: ytnqiehb.exe File opened (read-only) \??\u: tohidvhzbr.exe File opened (read-only) \??\v: tohidvhzbr.exe File opened (read-only) \??\y: tohidvhzbr.exe File opened (read-only) \??\p: ytnqiehb.exe File opened (read-only) \??\t: ytnqiehb.exe File opened (read-only) \??\k: ytnqiehb.exe File opened (read-only) \??\u: ytnqiehb.exe File opened (read-only) \??\w: ytnqiehb.exe File opened (read-only) \??\a: ytnqiehb.exe File opened (read-only) \??\j: ytnqiehb.exe File opened (read-only) \??\l: ytnqiehb.exe File opened (read-only) \??\p: ytnqiehb.exe File opened (read-only) \??\q: tohidvhzbr.exe File opened (read-only) \??\e: ytnqiehb.exe File opened (read-only) \??\y: ytnqiehb.exe File opened (read-only) \??\f: tohidvhzbr.exe File opened (read-only) \??\b: ytnqiehb.exe File opened (read-only) \??\e: ytnqiehb.exe File opened (read-only) \??\f: ytnqiehb.exe File opened (read-only) \??\u: ytnqiehb.exe File opened (read-only) \??\r: ytnqiehb.exe File opened (read-only) \??\t: ytnqiehb.exe File opened (read-only) \??\v: ytnqiehb.exe File opened (read-only) \??\z: ytnqiehb.exe File opened (read-only) \??\a: ytnqiehb.exe File opened (read-only) \??\m: ytnqiehb.exe File opened (read-only) \??\b: ytnqiehb.exe File opened (read-only) \??\v: ytnqiehb.exe File opened (read-only) \??\l: ytnqiehb.exe File opened (read-only) \??\o: ytnqiehb.exe File opened (read-only) \??\g: ytnqiehb.exe File opened (read-only) \??\h: ytnqiehb.exe File opened (read-only) \??\a: tohidvhzbr.exe File opened (read-only) \??\o: tohidvhzbr.exe File opened (read-only) \??\z: tohidvhzbr.exe File opened (read-only) \??\r: ytnqiehb.exe File opened (read-only) \??\z: ytnqiehb.exe File opened (read-only) \??\e: tohidvhzbr.exe File opened (read-only) \??\h: tohidvhzbr.exe File opened (read-only) \??\s: tohidvhzbr.exe File opened (read-only) \??\t: tohidvhzbr.exe File opened (read-only) \??\i: ytnqiehb.exe File opened (read-only) \??\j: ytnqiehb.exe File opened (read-only) \??\p: tohidvhzbr.exe File opened (read-only) \??\r: tohidvhzbr.exe File opened (read-only) \??\g: ytnqiehb.exe File opened (read-only) \??\x: ytnqiehb.exe File opened (read-only) \??\n: ytnqiehb.exe File opened (read-only) \??\x: tohidvhzbr.exe File opened (read-only) \??\m: tohidvhzbr.exe File opened (read-only) \??\i: ytnqiehb.exe File opened (read-only) \??\m: ytnqiehb.exe File opened (read-only) \??\o: ytnqiehb.exe File opened (read-only) \??\q: ytnqiehb.exe File opened (read-only) \??\b: tohidvhzbr.exe File opened (read-only) \??\g: tohidvhzbr.exe File opened (read-only) \??\l: tohidvhzbr.exe File opened (read-only) \??\w: tohidvhzbr.exe File opened (read-only) \??\h: ytnqiehb.exe File opened (read-only) \??\n: ytnqiehb.exe File opened (read-only) \??\y: ytnqiehb.exe File opened (read-only) \??\f: ytnqiehb.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tohidvhzbr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tohidvhzbr.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2600-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/208-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/544-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5104-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3192-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3884-151-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2600-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/208-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/544-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5104-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3192-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3884-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\sujabnyfijlxt.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\SysWOW64\sujabnyfijlxt.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tohidvhzbr.exe File created C:\Windows\SysWOW64\tohidvhzbr.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File created C:\Windows\SysWOW64\fgukgokeqlpukof.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File created C:\Windows\SysWOW64\ytnqiehb.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\SysWOW64\ytnqiehb.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\SysWOW64\tohidvhzbr.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\SysWOW64\fgukgokeqlpukof.exe e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ytnqiehb.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal ytnqiehb.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ytnqiehb.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ytnqiehb.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe ytnqiehb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal ytnqiehb.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472C779C2183566A4177D6702E2DAD7DF565DB" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat tohidvhzbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAFACAFE13F192830C3B3786E93994B38E02F84268023CE1C542EF08D3" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC2B02E47E038E353BEBAD7329DD7C4" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFC82482A85699141D7297E9CBD92E140593667346236D690" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tohidvhzbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tohidvhzbr.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7846BB1FF1D21D0D27FD1A78A7A9161" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1949C67514E5DAC7B8C97C92EDE334BD" e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tohidvhzbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tohidvhzbr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tohidvhzbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tohidvhzbr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 748 WINWORD.EXE 748 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 5104 ytnqiehb.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 5104 ytnqiehb.exe 5104 ytnqiehb.exe 5104 ytnqiehb.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 208 tohidvhzbr.exe 208 tohidvhzbr.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 208 tohidvhzbr.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 208 tohidvhzbr.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 208 tohidvhzbr.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 208 tohidvhzbr.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 3192 sujabnyfijlxt.exe 544 fgukgokeqlpukof.exe 544 fgukgokeqlpukof.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 3884 ytnqiehb.exe 3884 ytnqiehb.exe 3884 ytnqiehb.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 208 tohidvhzbr.exe 544 fgukgokeqlpukof.exe 5104 ytnqiehb.exe 3192 sujabnyfijlxt.exe 3884 ytnqiehb.exe 3884 ytnqiehb.exe 3884 ytnqiehb.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 748 WINWORD.EXE 748 WINWORD.EXE 748 WINWORD.EXE 748 WINWORD.EXE 748 WINWORD.EXE 748 WINWORD.EXE 748 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2600 wrote to memory of 208 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 85 PID 2600 wrote to memory of 208 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 85 PID 2600 wrote to memory of 208 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 85 PID 2600 wrote to memory of 544 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 86 PID 2600 wrote to memory of 544 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 86 PID 2600 wrote to memory of 544 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 86 PID 2600 wrote to memory of 5104 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 87 PID 2600 wrote to memory of 5104 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 87 PID 2600 wrote to memory of 5104 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 87 PID 2600 wrote to memory of 3192 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 88 PID 2600 wrote to memory of 3192 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 88 PID 2600 wrote to memory of 3192 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 88 PID 208 wrote to memory of 3884 208 tohidvhzbr.exe 89 PID 208 wrote to memory of 3884 208 tohidvhzbr.exe 89 PID 208 wrote to memory of 3884 208 tohidvhzbr.exe 89 PID 2600 wrote to memory of 748 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 90 PID 2600 wrote to memory of 748 2600 e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe"C:\Users\Admin\AppData\Local\Temp\e21184d50b8d40e1db2241bf12830005d30e683e8a543f0b4675e0249d412368.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\tohidvhzbr.exetohidvhzbr.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\ytnqiehb.exeC:\Windows\system32\ytnqiehb.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3884
-
-
-
C:\Windows\SysWOW64\fgukgokeqlpukof.exefgukgokeqlpukof.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:544
-
-
C:\Windows\SysWOW64\ytnqiehb.exeytnqiehb.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5104
-
-
C:\Windows\SysWOW64\sujabnyfijlxt.exesujabnyfijlxt.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3192
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:748
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD56bfdb38e79ff7a0ceac77886f70daa42
SHA1483833429364f2a32b4cf9799c3f1aaa28f36cff
SHA256f13b6d73e651515a902f74c59a98dabfde8f67783dbafd73f1dae4e6ae5ffe70
SHA512d25704ffd962260579566a415ccfd9b89734a3fe409be97136dd9ae48f411daf3127087eb08a681ba5166b0a62e5e9557a8cde6c769ab1d8b6209df6338d0539
-
Filesize
255KB
MD5d6d61b262aac62576009a1c41c1d6aca
SHA1821ef56ddf87ba8058a65e2a8005bb47fa8d1415
SHA256ddb9ac1fcda4afd439410833662d8ea6f43fdb428c18928e7ad64d786f7f365c
SHA5126a9091e7b295aafa60135930b773c410fb743fab6ed86247933ec07c3040bf0bf7885cf812644ade53adc9b5c9724262ec272d9d73969941ba68ae76590291e2
-
Filesize
255KB
MD5375fce0e19386ec7d34fe2c684ac8df2
SHA13f82ebd32e48789432313fc8085e1d8ee2db5e20
SHA25614f70a22c63e5f2fe69ca8df4802f431657742a365e59e4fb9c5e3a5451480a9
SHA51296236710706e9f4c1d500c97cc2003ade14de1bb42d63f82688dbea1b798570694c69857a97e829b29096ed30364752beec6ce4e0d11829e7d8907600e2ac0bd
-
Filesize
255KB
MD5375fce0e19386ec7d34fe2c684ac8df2
SHA13f82ebd32e48789432313fc8085e1d8ee2db5e20
SHA25614f70a22c63e5f2fe69ca8df4802f431657742a365e59e4fb9c5e3a5451480a9
SHA51296236710706e9f4c1d500c97cc2003ade14de1bb42d63f82688dbea1b798570694c69857a97e829b29096ed30364752beec6ce4e0d11829e7d8907600e2ac0bd
-
Filesize
255KB
MD59bf1a120a419f7a0e870cca67ab26159
SHA14c6db83e75e91e917f0bcd238403378f7f47b398
SHA256df962bab6cbd16faa1c4f3a63a2beed9dfc1c79da400fc8a0aa0b14d06f4041e
SHA5124c863d8c950f2f015f3efabdf5ae4bb6ff6c85827ada48f8c2ff6e25d11cad385963d314fe3fb1379267ba68f499aa15b27686230ed5d859a8d28cab1d93100a
-
Filesize
255KB
MD59bf1a120a419f7a0e870cca67ab26159
SHA14c6db83e75e91e917f0bcd238403378f7f47b398
SHA256df962bab6cbd16faa1c4f3a63a2beed9dfc1c79da400fc8a0aa0b14d06f4041e
SHA5124c863d8c950f2f015f3efabdf5ae4bb6ff6c85827ada48f8c2ff6e25d11cad385963d314fe3fb1379267ba68f499aa15b27686230ed5d859a8d28cab1d93100a
-
Filesize
255KB
MD5f062508ee0591b528b35dcbd351ca944
SHA11bd3a5ff80b6895f347eeecaa31e08015c4097ab
SHA2569c5bb430ed9abceaac7f70b52a41ab3a79444f649cf6dc54023acc7635e31738
SHA5123671167ac4188fc7c39583c31dfc88dfb0f91027592c7e7585a6f7d9902b24b89a681ce3c4dd6975253c08850f10e0ae85016da8b2e69df54fe0ae487abdec44
-
Filesize
255KB
MD5f062508ee0591b528b35dcbd351ca944
SHA11bd3a5ff80b6895f347eeecaa31e08015c4097ab
SHA2569c5bb430ed9abceaac7f70b52a41ab3a79444f649cf6dc54023acc7635e31738
SHA5123671167ac4188fc7c39583c31dfc88dfb0f91027592c7e7585a6f7d9902b24b89a681ce3c4dd6975253c08850f10e0ae85016da8b2e69df54fe0ae487abdec44
-
Filesize
255KB
MD505cb54db6584d4b859818ad4a5d6f804
SHA11f6f6ba15cb0dae52439448d0e1edb3ee6676dc5
SHA2567352abe40ebb69c9eb37d0823f995e56ec620f1be248c347cfc52a5e79798859
SHA512f87a375f87b00a35d9beaec6dcbc53f690a1c7c896f320f4b09cda541c0d4306a5149749269d2b499c052da67d3dcc231f67743eb0d8600a9db6dfacd8d374f0
-
Filesize
255KB
MD505cb54db6584d4b859818ad4a5d6f804
SHA11f6f6ba15cb0dae52439448d0e1edb3ee6676dc5
SHA2567352abe40ebb69c9eb37d0823f995e56ec620f1be248c347cfc52a5e79798859
SHA512f87a375f87b00a35d9beaec6dcbc53f690a1c7c896f320f4b09cda541c0d4306a5149749269d2b499c052da67d3dcc231f67743eb0d8600a9db6dfacd8d374f0
-
Filesize
255KB
MD505cb54db6584d4b859818ad4a5d6f804
SHA11f6f6ba15cb0dae52439448d0e1edb3ee6676dc5
SHA2567352abe40ebb69c9eb37d0823f995e56ec620f1be248c347cfc52a5e79798859
SHA512f87a375f87b00a35d9beaec6dcbc53f690a1c7c896f320f4b09cda541c0d4306a5149749269d2b499c052da67d3dcc231f67743eb0d8600a9db6dfacd8d374f0
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7