Analysis
-
max time kernel
159s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:17
Behavioral task
behavioral1
Sample
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
Resource
win10v2004-20221111-en
General
-
Target
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
-
Size
255KB
-
MD5
024bbce4de7354cf6af71939cc5e3c13
-
SHA1
bc42a69243b37222f7c97695d0901d1c31ee3d31
-
SHA256
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df
-
SHA512
0331eda5e8f8bc42ffea38183c436c0adb64fbbce3f7e4c598b6f12b87ebe37dcecfc4ed36be56c70682b9968a7c000e9fe44bcfb251006ae55b950de2effc96
-
SSDEEP
6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv62:Plf5j6zCNa0xeE3mX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" vmnehfgnjt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vmnehfgnjt.exe -
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vmnehfgnjt.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vmnehfgnjt.exe -
Executes dropped EXE 5 IoCs
Processes:
vmnehfgnjt.exejctyxzdmonqodlh.execmmofizv.exebiqzotvdjnpgp.execmmofizv.exepid process 2804 vmnehfgnjt.exe 1400 jctyxzdmonqodlh.exe 5052 cmmofizv.exe 4176 biqzotvdjnpgp.exe 3636 cmmofizv.exe -
Processes:
resource yara_rule behavioral2/memory/1196-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\vmnehfgnjt.exe upx C:\Windows\SysWOW64\vmnehfgnjt.exe upx behavioral2/memory/2804-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\jctyxzdmonqodlh.exe upx C:\Windows\SysWOW64\jctyxzdmonqodlh.exe upx C:\Windows\SysWOW64\cmmofizv.exe upx C:\Windows\SysWOW64\cmmofizv.exe upx behavioral2/memory/1196-143-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1400-144-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5052-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\biqzotvdjnpgp.exe upx C:\Windows\SysWOW64\biqzotvdjnpgp.exe upx behavioral2/memory/4176-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\cmmofizv.exe upx behavioral2/memory/4176-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3636-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1196-156-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx behavioral2/memory/3636-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe -
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vmnehfgnjt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
jctyxzdmonqodlh.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run jctyxzdmonqodlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zmapahga = "vmnehfgnjt.exe" jctyxzdmonqodlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygusdtsb = "jctyxzdmonqodlh.exe" jctyxzdmonqodlh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "biqzotvdjnpgp.exe" jctyxzdmonqodlh.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmmofizv.execmmofizv.exevmnehfgnjt.exedescription ioc process File opened (read-only) \??\t: cmmofizv.exe File opened (read-only) \??\u: cmmofizv.exe File opened (read-only) \??\i: cmmofizv.exe File opened (read-only) \??\u: cmmofizv.exe File opened (read-only) \??\x: cmmofizv.exe File opened (read-only) \??\z: cmmofizv.exe File opened (read-only) \??\g: cmmofizv.exe File opened (read-only) \??\l: vmnehfgnjt.exe File opened (read-only) \??\o: vmnehfgnjt.exe File opened (read-only) \??\x: vmnehfgnjt.exe File opened (read-only) \??\l: cmmofizv.exe File opened (read-only) \??\j: vmnehfgnjt.exe File opened (read-only) \??\b: cmmofizv.exe File opened (read-only) \??\k: cmmofizv.exe File opened (read-only) \??\y: vmnehfgnjt.exe File opened (read-only) \??\p: cmmofizv.exe File opened (read-only) \??\e: cmmofizv.exe File opened (read-only) \??\b: vmnehfgnjt.exe File opened (read-only) \??\m: vmnehfgnjt.exe File opened (read-only) \??\v: vmnehfgnjt.exe File opened (read-only) \??\u: vmnehfgnjt.exe File opened (read-only) \??\w: vmnehfgnjt.exe File opened (read-only) \??\a: cmmofizv.exe File opened (read-only) \??\f: cmmofizv.exe File opened (read-only) \??\f: cmmofizv.exe File opened (read-only) \??\k: cmmofizv.exe File opened (read-only) \??\r: cmmofizv.exe File opened (read-only) \??\n: vmnehfgnjt.exe File opened (read-only) \??\w: cmmofizv.exe File opened (read-only) \??\m: cmmofizv.exe File opened (read-only) \??\n: cmmofizv.exe File opened (read-only) \??\r: cmmofizv.exe File opened (read-only) \??\s: cmmofizv.exe File opened (read-only) \??\b: cmmofizv.exe File opened (read-only) \??\j: cmmofizv.exe File opened (read-only) \??\s: cmmofizv.exe File opened (read-only) \??\r: vmnehfgnjt.exe File opened (read-only) \??\s: vmnehfgnjt.exe File opened (read-only) \??\z: vmnehfgnjt.exe File opened (read-only) \??\v: cmmofizv.exe File opened (read-only) \??\w: cmmofizv.exe File opened (read-only) \??\h: vmnehfgnjt.exe File opened (read-only) \??\i: vmnehfgnjt.exe File opened (read-only) \??\k: vmnehfgnjt.exe File opened (read-only) \??\o: cmmofizv.exe File opened (read-only) \??\q: cmmofizv.exe File opened (read-only) \??\e: vmnehfgnjt.exe File opened (read-only) \??\p: vmnehfgnjt.exe File opened (read-only) \??\e: cmmofizv.exe File opened (read-only) \??\y: cmmofizv.exe File opened (read-only) \??\h: cmmofizv.exe File opened (read-only) \??\a: cmmofizv.exe File opened (read-only) \??\i: cmmofizv.exe File opened (read-only) \??\a: vmnehfgnjt.exe File opened (read-only) \??\l: cmmofizv.exe File opened (read-only) \??\n: cmmofizv.exe File opened (read-only) \??\x: cmmofizv.exe File opened (read-only) \??\g: vmnehfgnjt.exe File opened (read-only) \??\j: cmmofizv.exe File opened (read-only) \??\t: cmmofizv.exe File opened (read-only) \??\m: cmmofizv.exe File opened (read-only) \??\p: cmmofizv.exe File opened (read-only) \??\v: cmmofizv.exe File opened (read-only) \??\t: vmnehfgnjt.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
vmnehfgnjt.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" vmnehfgnjt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" vmnehfgnjt.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1196-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2804-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1196-143-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1400-144-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/5052-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4176-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3636-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1196-156-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3636-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exevmnehfgnjt.exedescription ioc process File opened for modification C:\Windows\SysWOW64\vmnehfgnjt.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\jctyxzdmonqodlh.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\cmmofizv.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\biqzotvdjnpgp.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\biqzotvdjnpgp.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\vmnehfgnjt.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\jctyxzdmonqodlh.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\cmmofizv.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll vmnehfgnjt.exe -
Drops file in Program Files directory 14 IoCs
Processes:
cmmofizv.execmmofizv.exedescription ioc process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cmmofizv.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal cmmofizv.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cmmofizv.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cmmofizv.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe cmmofizv.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe cmmofizv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal cmmofizv.exe -
Drops file in Windows directory 3 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
vmnehfgnjt.exed71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs vmnehfgnjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" vmnehfgnjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" vmnehfgnjt.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vmnehfgnjt.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0806BB8FE1C22D8D208D0A68A7E916B" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" vmnehfgnjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc vmnehfgnjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1949C60F14E7DBC3B8C07FE0ECE434CB" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" vmnehfgnjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32452C0C9C2783236A3476D670212CA97D8465DD" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFFACEFE10F29084783A4B869F39E3B08002FA42690349E1CA42EC08A2" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB1B15C47E339ED53C8BAA2339FD4B9" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E88FF8E4F58821B9137D6587E93BD90E141593266476342D6EB" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3560 WINWORD.EXE 3560 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exevmnehfgnjt.exejctyxzdmonqodlh.execmmofizv.exebiqzotvdjnpgp.exepid process 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exevmnehfgnjt.exejctyxzdmonqodlh.execmmofizv.exebiqzotvdjnpgp.execmmofizv.exepid process 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 3636 cmmofizv.exe 3636 cmmofizv.exe 3636 cmmofizv.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exevmnehfgnjt.exejctyxzdmonqodlh.execmmofizv.exebiqzotvdjnpgp.execmmofizv.exepid process 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 2804 vmnehfgnjt.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 1400 jctyxzdmonqodlh.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 5052 cmmofizv.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 4176 biqzotvdjnpgp.exe 3636 cmmofizv.exe 3636 cmmofizv.exe 3636 cmmofizv.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3560 WINWORD.EXE 3560 WINWORD.EXE 3560 WINWORD.EXE 3560 WINWORD.EXE 3560 WINWORD.EXE 3560 WINWORD.EXE 3560 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exejctyxzdmonqodlh.exevmnehfgnjt.exedescription pid process target process PID 1196 wrote to memory of 2804 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe vmnehfgnjt.exe PID 1196 wrote to memory of 2804 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe vmnehfgnjt.exe PID 1196 wrote to memory of 2804 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe vmnehfgnjt.exe PID 1196 wrote to memory of 1400 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jctyxzdmonqodlh.exe PID 1196 wrote to memory of 1400 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jctyxzdmonqodlh.exe PID 1196 wrote to memory of 1400 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jctyxzdmonqodlh.exe PID 1196 wrote to memory of 5052 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe cmmofizv.exe PID 1196 wrote to memory of 5052 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe cmmofizv.exe PID 1196 wrote to memory of 5052 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe cmmofizv.exe PID 1196 wrote to memory of 4176 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe biqzotvdjnpgp.exe PID 1196 wrote to memory of 4176 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe biqzotvdjnpgp.exe PID 1196 wrote to memory of 4176 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe biqzotvdjnpgp.exe PID 1400 wrote to memory of 1380 1400 jctyxzdmonqodlh.exe cmd.exe PID 1400 wrote to memory of 1380 1400 jctyxzdmonqodlh.exe cmd.exe PID 1400 wrote to memory of 1380 1400 jctyxzdmonqodlh.exe cmd.exe PID 2804 wrote to memory of 3636 2804 vmnehfgnjt.exe cmmofizv.exe PID 2804 wrote to memory of 3636 2804 vmnehfgnjt.exe cmmofizv.exe PID 2804 wrote to memory of 3636 2804 vmnehfgnjt.exe cmmofizv.exe PID 1196 wrote to memory of 3560 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE PID 1196 wrote to memory of 3560 1196 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe"C:\Users\Admin\AppData\Local\Temp\d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\vmnehfgnjt.exevmnehfgnjt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmmofizv.exeC:\Windows\system32\cmmofizv.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3636
-
-
-
C:\Windows\SysWOW64\jctyxzdmonqodlh.exejctyxzdmonqodlh.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.execmd.exe /c biqzotvdjnpgp.exe3⤵PID:1380
-
-
-
C:\Windows\SysWOW64\cmmofizv.execmmofizv.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5052
-
-
C:\Windows\SysWOW64\biqzotvdjnpgp.exebiqzotvdjnpgp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4176
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3560
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD522a36e0a46db41d3e476ec7116218689
SHA183a119fb755fcf4c9ec5be6461c8e3a4c406b720
SHA256d00480cbfd3de38a25c0f38c825304d0f9f78c48ffbe66eb8278cc2bcea34af8
SHA512e204f67865f46dede3f29f4fdca5c815237f24b9749ca33c92291e9ee3b8fad667c9ec3cb41b5fb508ac3e17a32da11c03c08a205129c7cd1e7cf8c5de71de1b
-
Filesize
255KB
MD5f8828c0dafd55f56468ce915522f19da
SHA1fd34ffc665b6030c7abf5790762f83776dc545ef
SHA256536211d4c45bc0db06d5a0ef32550000ba00b245e1608db84d849eb55203103d
SHA5128a707e99697481c71d570f4eb59ec4c2a0c79f17fac037f05f93ec2f08c1903068ce530ea66e8f207236c75ecabca744d09f8d3876477f977f698fa11a27bea2
-
Filesize
255KB
MD56fb85a2ba161f8a019e66552bba94e4f
SHA1aebf0abbb94c09343f25f13eed4bf954eb0033c4
SHA256cc0fbdc098061496ba608115379a274ae0f51a05995a97f2edfa38cd3d559b54
SHA512f75067de5ed519819e36d646cdaf5f5687524a614fbc37c3e974bb3c9ee085f4efdb29331eb90d37d7d5315a2a00075b7606996ec0c00dd4e88a4655d5716588
-
Filesize
255KB
MD56fb85a2ba161f8a019e66552bba94e4f
SHA1aebf0abbb94c09343f25f13eed4bf954eb0033c4
SHA256cc0fbdc098061496ba608115379a274ae0f51a05995a97f2edfa38cd3d559b54
SHA512f75067de5ed519819e36d646cdaf5f5687524a614fbc37c3e974bb3c9ee085f4efdb29331eb90d37d7d5315a2a00075b7606996ec0c00dd4e88a4655d5716588
-
Filesize
255KB
MD5195e12eeb7e34e26d3247d52282113c5
SHA1acc8d211732187ac823322e7bc329c3c90c93cdb
SHA256980819de5d28dba94d537b6a813785c510ccffaaf2f1ddc2bd04a2045555ec14
SHA5128e70332394a446da1bc190a9a712d3a5e0705fb86b5b81e07092922a9151e4161402324eeff9bcbd6d8617e5760d131de8c462ba3f15d8eecd4180dc59885148
-
Filesize
255KB
MD5195e12eeb7e34e26d3247d52282113c5
SHA1acc8d211732187ac823322e7bc329c3c90c93cdb
SHA256980819de5d28dba94d537b6a813785c510ccffaaf2f1ddc2bd04a2045555ec14
SHA5128e70332394a446da1bc190a9a712d3a5e0705fb86b5b81e07092922a9151e4161402324eeff9bcbd6d8617e5760d131de8c462ba3f15d8eecd4180dc59885148
-
Filesize
255KB
MD5195e12eeb7e34e26d3247d52282113c5
SHA1acc8d211732187ac823322e7bc329c3c90c93cdb
SHA256980819de5d28dba94d537b6a813785c510ccffaaf2f1ddc2bd04a2045555ec14
SHA5128e70332394a446da1bc190a9a712d3a5e0705fb86b5b81e07092922a9151e4161402324eeff9bcbd6d8617e5760d131de8c462ba3f15d8eecd4180dc59885148
-
Filesize
255KB
MD51267ca70cd861f9f127d73f16002b868
SHA12a8cee4c69fcb31a92da4fe779512259e51976c6
SHA2562bd12baa3179b1e4ccf45a26ab45a26c72f8f93a8948df8e5bfea0e46954803e
SHA512f2dcdfbcbd373f5444d3e4eea5eb60558fa73aa28513279a1247eb314e938e384d7f36658def0a2a0afbf876872fc6f64393757349c40e4cea5c02ed43f8b698
-
Filesize
255KB
MD51267ca70cd861f9f127d73f16002b868
SHA12a8cee4c69fcb31a92da4fe779512259e51976c6
SHA2562bd12baa3179b1e4ccf45a26ab45a26c72f8f93a8948df8e5bfea0e46954803e
SHA512f2dcdfbcbd373f5444d3e4eea5eb60558fa73aa28513279a1247eb314e938e384d7f36658def0a2a0afbf876872fc6f64393757349c40e4cea5c02ed43f8b698
-
Filesize
255KB
MD594a502251320bda8d7cd2cad60c81a7e
SHA155f46619161eb85dcd9c6e15ce95dccbd2bad2ec
SHA2566f366fbf3173ab1c17cda45909c03e53c832679b6526f8fd42c2f2d40ba9ca67
SHA512beb380a3e3241de889bed5c4a23df7968ce75ed245371611978e637aa053ebabc1894ceda23cdfb0437b60eba49f3098aacdf7b746e180ea8675cdf7642c219a
-
Filesize
255KB
MD594a502251320bda8d7cd2cad60c81a7e
SHA155f46619161eb85dcd9c6e15ce95dccbd2bad2ec
SHA2566f366fbf3173ab1c17cda45909c03e53c832679b6526f8fd42c2f2d40ba9ca67
SHA512beb380a3e3241de889bed5c4a23df7968ce75ed245371611978e637aa053ebabc1894ceda23cdfb0437b60eba49f3098aacdf7b746e180ea8675cdf7642c219a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7