Analysis
-
max time kernel
187s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 19:26
Behavioral task
behavioral1
Sample
571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe
Resource
win7-20220812-en
General
-
Target
571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe
-
Size
255KB
-
MD5
b959e15aa4c84058d7d220fa6ef3a2a1
-
SHA1
4e31dc9e03ea4c77086c378d6640e54cbd04a215
-
SHA256
571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb
-
SHA512
7b12c813549a4661961e62e759abe8724a236d477619cb710d1f4157411eef422a772babf59b78fce6cab59116c19d98ffd60f55df3cb389d5945269a2151343
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJS:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hjdewcgnbm.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hjdewcgnbm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" hjdewcgnbm.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" hjdewcgnbm.exe -
Executes dropped EXE 5 IoCs
pid Process 2992 hjdewcgnbm.exe 3292 xfnlczxqiavoqhn.exe 1280 tbohyrms.exe 980 jfsybmnwthrxv.exe 4448 tbohyrms.exe -
resource yara_rule behavioral2/files/0x0006000000022e3a-134.dat upx behavioral2/files/0x0006000000022e3a-135.dat upx behavioral2/files/0x0006000000022e3b-137.dat upx behavioral2/files/0x0006000000022e3b-138.dat upx behavioral2/files/0x0006000000022e3c-141.dat upx behavioral2/files/0x0006000000022e3c-140.dat upx behavioral2/memory/4864-142-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3292-144-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2992-143-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1280-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0006000000022e3d-148.dat upx behavioral2/files/0x0006000000022e3d-147.dat upx behavioral2/files/0x0006000000022e3c-150.dat upx behavioral2/memory/980-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4864-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4448-154-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x000300000001e64d-162.dat upx behavioral2/files/0x000b00000002171d-163.dat upx behavioral2/memory/2992-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/3292-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1280-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/980-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4448-169-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0004000000000723-170.dat upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" hjdewcgnbm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jfsybmnwthrxv.exe" xfnlczxqiavoqhn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xfnlczxqiavoqhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\frncwgbl = "hjdewcgnbm.exe" xfnlczxqiavoqhn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\miisbqsw = "xfnlczxqiavoqhn.exe" xfnlczxqiavoqhn.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\i: tbohyrms.exe File opened (read-only) \??\l: tbohyrms.exe File opened (read-only) \??\k: hjdewcgnbm.exe File opened (read-only) \??\a: tbohyrms.exe File opened (read-only) \??\n: tbohyrms.exe File opened (read-only) \??\u: tbohyrms.exe File opened (read-only) \??\y: tbohyrms.exe File opened (read-only) \??\e: hjdewcgnbm.exe File opened (read-only) \??\f: hjdewcgnbm.exe File opened (read-only) \??\h: hjdewcgnbm.exe File opened (read-only) \??\r: tbohyrms.exe File opened (read-only) \??\w: hjdewcgnbm.exe File opened (read-only) \??\h: tbohyrms.exe File opened (read-only) \??\m: tbohyrms.exe File opened (read-only) \??\v: tbohyrms.exe File opened (read-only) \??\f: tbohyrms.exe File opened (read-only) \??\h: tbohyrms.exe File opened (read-only) \??\k: tbohyrms.exe File opened (read-only) \??\j: tbohyrms.exe File opened (read-only) \??\p: tbohyrms.exe File opened (read-only) \??\a: hjdewcgnbm.exe File opened (read-only) \??\v: hjdewcgnbm.exe File opened (read-only) \??\o: tbohyrms.exe File opened (read-only) \??\w: tbohyrms.exe File opened (read-only) \??\w: tbohyrms.exe File opened (read-only) \??\s: hjdewcgnbm.exe File opened (read-only) \??\b: tbohyrms.exe File opened (read-only) \??\e: tbohyrms.exe File opened (read-only) \??\t: tbohyrms.exe File opened (read-only) \??\e: tbohyrms.exe File opened (read-only) \??\s: tbohyrms.exe File opened (read-only) \??\l: hjdewcgnbm.exe File opened (read-only) \??\g: tbohyrms.exe File opened (read-only) \??\z: tbohyrms.exe File opened (read-only) \??\g: hjdewcgnbm.exe File opened (read-only) \??\t: hjdewcgnbm.exe File opened (read-only) \??\q: tbohyrms.exe File opened (read-only) \??\j: tbohyrms.exe File opened (read-only) \??\n: tbohyrms.exe File opened (read-only) \??\q: hjdewcgnbm.exe File opened (read-only) \??\z: hjdewcgnbm.exe File opened (read-only) \??\p: tbohyrms.exe File opened (read-only) \??\y: tbohyrms.exe File opened (read-only) \??\b: hjdewcgnbm.exe File opened (read-only) \??\r: hjdewcgnbm.exe File opened (read-only) \??\a: tbohyrms.exe File opened (read-only) \??\r: tbohyrms.exe File opened (read-only) \??\u: hjdewcgnbm.exe File opened (read-only) \??\y: hjdewcgnbm.exe File opened (read-only) \??\f: tbohyrms.exe File opened (read-only) \??\k: tbohyrms.exe File opened (read-only) \??\l: tbohyrms.exe File opened (read-only) \??\u: tbohyrms.exe File opened (read-only) \??\o: hjdewcgnbm.exe File opened (read-only) \??\x: tbohyrms.exe File opened (read-only) \??\v: tbohyrms.exe File opened (read-only) \??\i: hjdewcgnbm.exe File opened (read-only) \??\i: tbohyrms.exe File opened (read-only) \??\q: tbohyrms.exe File opened (read-only) \??\t: tbohyrms.exe File opened (read-only) \??\z: tbohyrms.exe File opened (read-only) \??\p: hjdewcgnbm.exe File opened (read-only) \??\o: tbohyrms.exe File opened (read-only) \??\s: tbohyrms.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" hjdewcgnbm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" hjdewcgnbm.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4864-142-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3292-144-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2992-143-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1280-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/980-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4864-152-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4448-154-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2992-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/3292-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1280-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/980-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4448-169-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\xfnlczxqiavoqhn.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\SysWOW64\xfnlczxqiavoqhn.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File created C:\Windows\SysWOW64\tbohyrms.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\SysWOW64\tbohyrms.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\SysWOW64\jfsybmnwthrxv.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\SysWOW64\hjdewcgnbm.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File created C:\Windows\SysWOW64\jfsybmnwthrxv.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll hjdewcgnbm.exe File created C:\Windows\SysWOW64\hjdewcgnbm.exe 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal tbohyrms.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbohyrms.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal tbohyrms.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbohyrms.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbohyrms.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe tbohyrms.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal tbohyrms.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B12847E139EA52BEB9D03298D4C5" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat hjdewcgnbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf hjdewcgnbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33322C0D9C2D83236D4476D370212CA97DF564AF" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFFF84F5A82189141D72A7DE2BC95E636593066456236D6E9" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC6781590DBC3B8BD7FE5ECE437CE" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" hjdewcgnbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc hjdewcgnbm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBDFAC9F963F19583083A4B81EC3E90B0FD028A42150349E2CF42E808A4" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F768B7FE6A21DBD10ED0A98A7B9166" 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" hjdewcgnbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg hjdewcgnbm.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3376 WINWORD.EXE 3376 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 4448 tbohyrms.exe 4448 tbohyrms.exe 4448 tbohyrms.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 2992 hjdewcgnbm.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 3292 xfnlczxqiavoqhn.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 1280 tbohyrms.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 980 jfsybmnwthrxv.exe 4448 tbohyrms.exe 4448 tbohyrms.exe 4448 tbohyrms.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3376 WINWORD.EXE 3376 WINWORD.EXE 3376 WINWORD.EXE 3376 WINWORD.EXE 3376 WINWORD.EXE 3376 WINWORD.EXE 3376 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2992 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 81 PID 4864 wrote to memory of 2992 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 81 PID 4864 wrote to memory of 2992 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 81 PID 4864 wrote to memory of 3292 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 82 PID 4864 wrote to memory of 3292 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 82 PID 4864 wrote to memory of 3292 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 82 PID 4864 wrote to memory of 1280 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 83 PID 4864 wrote to memory of 1280 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 83 PID 4864 wrote to memory of 1280 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 83 PID 4864 wrote to memory of 980 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 84 PID 4864 wrote to memory of 980 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 84 PID 4864 wrote to memory of 980 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 84 PID 2992 wrote to memory of 4448 2992 hjdewcgnbm.exe 86 PID 2992 wrote to memory of 4448 2992 hjdewcgnbm.exe 86 PID 2992 wrote to memory of 4448 2992 hjdewcgnbm.exe 86 PID 4864 wrote to memory of 3376 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 87 PID 4864 wrote to memory of 3376 4864 571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe"C:\Users\Admin\AppData\Local\Temp\571e2519db3e6fcd3b7925c5c07c2730eb41a4e26c4adda853d6406a910211bb.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\hjdewcgnbm.exehjdewcgnbm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\tbohyrms.exeC:\Windows\system32\tbohyrms.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4448
-
-
-
C:\Windows\SysWOW64\xfnlczxqiavoqhn.exexfnlczxqiavoqhn.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3292
-
-
C:\Windows\SysWOW64\tbohyrms.exetbohyrms.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1280
-
-
C:\Windows\SysWOW64\jfsybmnwthrxv.exejfsybmnwthrxv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:980
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3376
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD552c32aa5ddc2a693fd398055b1d81ced
SHA158b8a8f5d35dd955b115813b0aaa47007ab2bffb
SHA2566b01d40853a811cae6df5ad1b94e4c04eef434d8d223a84c71a666f7b66cd9b7
SHA5121c14e52f4944bc4989934e17ac7929f167d6bbeaab5e76d86e97fab843f74d3a1793119bf978be1e27ea2637e0d521284cb9ee166ea4953fbe92cb438fd0c642
-
Filesize
255KB
MD5491529ce6c0a88be9be30c639e2d8c28
SHA17b0c91c3d10b6a9f292bb9aa5f358261360fb903
SHA2567bd347f301b02f3417d1d687cf489ea29391492316f68c7cea53746e7b76280a
SHA5125a52586ede2969d4d7c07fcc495787137b5254a4ece6c46ac47e6e9ebd85c5066421309e9ba6b473839e4fe6316584e4bcf7325ecf1c552e9e0dfb8569db9491
-
Filesize
255KB
MD5d366758b6a52b5f053b37a089c655bae
SHA1093687b56cb67aead2db0d5e31cb3e5ec37d692f
SHA256de5f7d8492231ee6a8b64c3b9bdf97e64d48e74228c8c837595cc00eb1de9281
SHA51234d495e25feb0cfdea9b1d273e358c1e71e7c1802a8109792ef4fe66a8d1bcd48ea7f7fa7b37e1b5edcd326c6aaa880de34a517adc421e87c3a65c6dbe5d0ff2
-
Filesize
255KB
MD50a704e821c76225823421f2450b01039
SHA135133aaf1e895fd81b01e53ea4d0223a87a23e37
SHA25696afba32cf51d877e2ab58221f420964e5d9246bdefab08e3cfb533ffa28e2c3
SHA51290d2fd2e876bfbe2b6e40bfc87550d4a38275daf1368c85ba2261a6b7e3701074872a754a91006079297048d4463d822d4bfc1f93c0d79203518f4459c27ded6
-
Filesize
255KB
MD50a704e821c76225823421f2450b01039
SHA135133aaf1e895fd81b01e53ea4d0223a87a23e37
SHA25696afba32cf51d877e2ab58221f420964e5d9246bdefab08e3cfb533ffa28e2c3
SHA51290d2fd2e876bfbe2b6e40bfc87550d4a38275daf1368c85ba2261a6b7e3701074872a754a91006079297048d4463d822d4bfc1f93c0d79203518f4459c27ded6
-
Filesize
255KB
MD57637f6e04f12343285b40b2a9bf47388
SHA14e4f18ea1eb1492c0dbe6d5edcbb01f3c74dadd7
SHA256684eaedcf404348b82595fba92d69de58de52208f97818395604ab63edea8558
SHA51250e1c9959ea5f7c0d16fdb0413018a0b21ef7676fcd47b4a0615e863d8403db3b84fc89e0a4ce4c427c201314aafc24124aee041f85ad899e8c1943295f5271f
-
Filesize
255KB
MD57637f6e04f12343285b40b2a9bf47388
SHA14e4f18ea1eb1492c0dbe6d5edcbb01f3c74dadd7
SHA256684eaedcf404348b82595fba92d69de58de52208f97818395604ab63edea8558
SHA51250e1c9959ea5f7c0d16fdb0413018a0b21ef7676fcd47b4a0615e863d8403db3b84fc89e0a4ce4c427c201314aafc24124aee041f85ad899e8c1943295f5271f
-
Filesize
255KB
MD59d0553cc3ce51837448caba802909316
SHA1dd3016a8e6d7733be3388996a29463c2a81329f4
SHA2562a9dc2682f52979b98096d8f83b976a099ed148a6fe2b49b4af8554bdfcf6eb7
SHA512700db87c6b08949fd2f7d13bf3c3a7a51cfe5f850c9c5170fc1a4c007a27ab3c0bb6ed2bded5ed00a0cf202fafb380fe6e80fa1f35c52c8a55fb04087508135d
-
Filesize
255KB
MD59d0553cc3ce51837448caba802909316
SHA1dd3016a8e6d7733be3388996a29463c2a81329f4
SHA2562a9dc2682f52979b98096d8f83b976a099ed148a6fe2b49b4af8554bdfcf6eb7
SHA512700db87c6b08949fd2f7d13bf3c3a7a51cfe5f850c9c5170fc1a4c007a27ab3c0bb6ed2bded5ed00a0cf202fafb380fe6e80fa1f35c52c8a55fb04087508135d
-
Filesize
255KB
MD59d0553cc3ce51837448caba802909316
SHA1dd3016a8e6d7733be3388996a29463c2a81329f4
SHA2562a9dc2682f52979b98096d8f83b976a099ed148a6fe2b49b4af8554bdfcf6eb7
SHA512700db87c6b08949fd2f7d13bf3c3a7a51cfe5f850c9c5170fc1a4c007a27ab3c0bb6ed2bded5ed00a0cf202fafb380fe6e80fa1f35c52c8a55fb04087508135d
-
Filesize
255KB
MD5f28d46081f222bcfc6af8758bdd78b23
SHA1f705ff7247461d979553cff3345305786afbcaa4
SHA25651c648efe48dfb844b054dcc41114bc5520e59449c6f97cd71c55c24c6367346
SHA512b62fb2cacfa49e1b1fa0c7aad3fd9f70bc58df9b7dacde9363a14a1ac4743f709cd9e5123b0a9bf9d233a6f1a4d7c2a1745a715af828220722b6e793ce94b473
-
Filesize
255KB
MD5f28d46081f222bcfc6af8758bdd78b23
SHA1f705ff7247461d979553cff3345305786afbcaa4
SHA25651c648efe48dfb844b054dcc41114bc5520e59449c6f97cd71c55c24c6367346
SHA512b62fb2cacfa49e1b1fa0c7aad3fd9f70bc58df9b7dacde9363a14a1ac4743f709cd9e5123b0a9bf9d233a6f1a4d7c2a1745a715af828220722b6e793ce94b473
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7