Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:00
Static task
static1
Behavioral task
behavioral1
Sample
070b287ebdb9b7ee8134708a0ac21b3d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
070b287ebdb9b7ee8134708a0ac21b3d.exe
Resource
win10v2004-20231215-en
General
-
Target
070b287ebdb9b7ee8134708a0ac21b3d.exe
-
Size
512KB
-
MD5
070b287ebdb9b7ee8134708a0ac21b3d
-
SHA1
d588cfbea85c44c2ff033d2ec740c5ba0d4f5bb2
-
SHA256
2a0dcb5bcc1dd14bd1f4faef3664929de17de3501a4f5fd063a60573b20739a5
-
SHA512
b77ae944fa1eae643d661e971129c1903500cc31ff020c36a0f42fa359cb2dd48c10e2d4ebd1eccd4abb57f7587f58c38123a056c17ef6f9751d64fc5a9f9b3a
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6H:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5U
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bdvuchtcpv.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bdvuchtcpv.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bdvuchtcpv.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bdvuchtcpv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 070b287ebdb9b7ee8134708a0ac21b3d.exe -
Executes dropped EXE 5 IoCs
pid Process 3728 bdvuchtcpv.exe 1540 blgatmxkmhwsxpx.exe 3764 dpwqvrrs.exe 4036 vqjtgfwtinfih.exe 5004 dpwqvrrs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" bdvuchtcpv.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\poxgsski = "bdvuchtcpv.exe" blgatmxkmhwsxpx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lqeyjecg = "blgatmxkmhwsxpx.exe" blgatmxkmhwsxpx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "vqjtgfwtinfih.exe" blgatmxkmhwsxpx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: dpwqvrrs.exe File opened (read-only) \??\v: dpwqvrrs.exe File opened (read-only) \??\m: bdvuchtcpv.exe File opened (read-only) \??\w: dpwqvrrs.exe File opened (read-only) \??\h: dpwqvrrs.exe File opened (read-only) \??\k: dpwqvrrs.exe File opened (read-only) \??\n: bdvuchtcpv.exe File opened (read-only) \??\v: bdvuchtcpv.exe File opened (read-only) \??\b: dpwqvrrs.exe File opened (read-only) \??\x: dpwqvrrs.exe File opened (read-only) \??\s: dpwqvrrs.exe File opened (read-only) \??\u: dpwqvrrs.exe File opened (read-only) \??\r: bdvuchtcpv.exe File opened (read-only) \??\x: bdvuchtcpv.exe File opened (read-only) \??\v: dpwqvrrs.exe File opened (read-only) \??\q: bdvuchtcpv.exe File opened (read-only) \??\s: bdvuchtcpv.exe File opened (read-only) \??\u: dpwqvrrs.exe File opened (read-only) \??\a: dpwqvrrs.exe File opened (read-only) \??\e: dpwqvrrs.exe File opened (read-only) \??\i: bdvuchtcpv.exe File opened (read-only) \??\j: bdvuchtcpv.exe File opened (read-only) \??\l: bdvuchtcpv.exe File opened (read-only) \??\z: dpwqvrrs.exe File opened (read-only) \??\p: bdvuchtcpv.exe File opened (read-only) \??\e: dpwqvrrs.exe File opened (read-only) \??\i: dpwqvrrs.exe File opened (read-only) \??\o: bdvuchtcpv.exe File opened (read-only) \??\u: bdvuchtcpv.exe File opened (read-only) \??\a: dpwqvrrs.exe File opened (read-only) \??\s: dpwqvrrs.exe File opened (read-only) \??\p: dpwqvrrs.exe File opened (read-only) \??\b: dpwqvrrs.exe File opened (read-only) \??\r: dpwqvrrs.exe File opened (read-only) \??\w: dpwqvrrs.exe File opened (read-only) \??\h: bdvuchtcpv.exe File opened (read-only) \??\g: dpwqvrrs.exe File opened (read-only) \??\n: dpwqvrrs.exe File opened (read-only) \??\x: dpwqvrrs.exe File opened (read-only) \??\e: bdvuchtcpv.exe File opened (read-only) \??\z: bdvuchtcpv.exe File opened (read-only) \??\b: bdvuchtcpv.exe File opened (read-only) \??\y: bdvuchtcpv.exe File opened (read-only) \??\h: dpwqvrrs.exe File opened (read-only) \??\j: dpwqvrrs.exe File opened (read-only) \??\l: dpwqvrrs.exe File opened (read-only) \??\q: dpwqvrrs.exe File opened (read-only) \??\t: dpwqvrrs.exe File opened (read-only) \??\y: dpwqvrrs.exe File opened (read-only) \??\y: dpwqvrrs.exe File opened (read-only) \??\g: dpwqvrrs.exe File opened (read-only) \??\j: dpwqvrrs.exe File opened (read-only) \??\l: dpwqvrrs.exe File opened (read-only) \??\k: dpwqvrrs.exe File opened (read-only) \??\n: dpwqvrrs.exe File opened (read-only) \??\r: dpwqvrrs.exe File opened (read-only) \??\t: dpwqvrrs.exe File opened (read-only) \??\z: dpwqvrrs.exe File opened (read-only) \??\q: dpwqvrrs.exe File opened (read-only) \??\a: bdvuchtcpv.exe File opened (read-only) \??\k: bdvuchtcpv.exe File opened (read-only) \??\w: bdvuchtcpv.exe File opened (read-only) \??\m: dpwqvrrs.exe File opened (read-only) \??\o: dpwqvrrs.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" bdvuchtcpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" bdvuchtcpv.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/820-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x00070000000231fc-5.dat autoit_exe behavioral2/files/0x000d00000001e6f2-19.dat autoit_exe behavioral2/files/0x000d00000001e6f2-18.dat autoit_exe behavioral2/files/0x00070000000231ff-29.dat autoit_exe behavioral2/files/0x0006000000023203-32.dat autoit_exe behavioral2/files/0x0006000000023203-31.dat autoit_exe behavioral2/files/0x00070000000231fc-23.dat autoit_exe behavioral2/files/0x00070000000231ff-28.dat autoit_exe behavioral2/files/0x00070000000231fc-24.dat autoit_exe behavioral2/files/0x00070000000231ff-35.dat autoit_exe behavioral2/files/0x000600000002320f-70.dat autoit_exe behavioral2/files/0x000600000002320e-64.dat autoit_exe behavioral2/files/0x0007000000023218-88.dat autoit_exe behavioral2/files/0x000600000002322d-111.dat autoit_exe behavioral2/files/0x000600000002322d-118.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification C:\Windows\SysWOW64\bdvuchtcpv.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll bdvuchtcpv.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe dpwqvrrs.exe File created C:\Windows\SysWOW64\bdvuchtcpv.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification C:\Windows\SysWOW64\vqjtgfwtinfih.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File created C:\Windows\SysWOW64\dpwqvrrs.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification C:\Windows\SysWOW64\dpwqvrrs.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe dpwqvrrs.exe File created C:\Windows\SysWOW64\blgatmxkmhwsxpx.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification C:\Windows\SysWOW64\blgatmxkmhwsxpx.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File created C:\Windows\SysWOW64\vqjtgfwtinfih.exe 070b287ebdb9b7ee8134708a0ac21b3d.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe dpwqvrrs.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe dpwqvrrs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal dpwqvrrs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe dpwqvrrs.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe dpwqvrrs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe dpwqvrrs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal dpwqvrrs.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal dpwqvrrs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe dpwqvrrs.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 070b287ebdb9b7ee8134708a0ac21b3d.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe dpwqvrrs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe dpwqvrrs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe dpwqvrrs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB0B02A449038E352C8B9D033E8D4C5" 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8CFCF9482A826E9146D7217E92BC90E140593267416337D79C" 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F16BC1FF6C21DFD173D1D48A0B9163" 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC70915E7DBB2B8CE7CE1EDE434CE" 070b287ebdb9b7ee8134708a0ac21b3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc bdvuchtcpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs bdvuchtcpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg bdvuchtcpv.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 070b287ebdb9b7ee8134708a0ac21b3d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat bdvuchtcpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh bdvuchtcpv.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000_Classes\Local Settings 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33412C7C9D5682236A3F76A777222CDD7C8E65DF" 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bdvuchtcpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" bdvuchtcpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" bdvuchtcpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bdvuchtcpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACEFAB8F96AF19884743B3581EC39E1B0F902FC4216023AE2BD459909A2" 070b287ebdb9b7ee8134708a0ac21b3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" bdvuchtcpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bdvuchtcpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf bdvuchtcpv.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5076 WINWORD.EXE 5076 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 5004 dpwqvrrs.exe 5004 dpwqvrrs.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 5004 dpwqvrrs.exe 5004 dpwqvrrs.exe 5004 dpwqvrrs.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 1540 blgatmxkmhwsxpx.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3728 bdvuchtcpv.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 3764 dpwqvrrs.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 4036 vqjtgfwtinfih.exe 5004 dpwqvrrs.exe 5004 dpwqvrrs.exe 5004 dpwqvrrs.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5076 WINWORD.EXE 5076 WINWORD.EXE 5076 WINWORD.EXE 5076 WINWORD.EXE 5076 WINWORD.EXE 5076 WINWORD.EXE 5076 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 820 wrote to memory of 3728 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 88 PID 820 wrote to memory of 3728 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 88 PID 820 wrote to memory of 3728 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 88 PID 820 wrote to memory of 1540 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 91 PID 820 wrote to memory of 1540 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 91 PID 820 wrote to memory of 1540 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 91 PID 820 wrote to memory of 3764 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 89 PID 820 wrote to memory of 3764 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 89 PID 820 wrote to memory of 3764 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 89 PID 820 wrote to memory of 4036 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 90 PID 820 wrote to memory of 4036 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 90 PID 820 wrote to memory of 4036 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 90 PID 820 wrote to memory of 5076 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 92 PID 820 wrote to memory of 5076 820 070b287ebdb9b7ee8134708a0ac21b3d.exe 92 PID 3728 wrote to memory of 5004 3728 bdvuchtcpv.exe 93 PID 3728 wrote to memory of 5004 3728 bdvuchtcpv.exe 93 PID 3728 wrote to memory of 5004 3728 bdvuchtcpv.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\070b287ebdb9b7ee8134708a0ac21b3d.exe"C:\Users\Admin\AppData\Local\Temp\070b287ebdb9b7ee8134708a0ac21b3d.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\bdvuchtcpv.exebdvuchtcpv.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\dpwqvrrs.exeC:\Windows\system32\dpwqvrrs.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5004
-
-
-
C:\Windows\SysWOW64\dpwqvrrs.exedpwqvrrs.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3764
-
-
C:\Windows\SysWOW64\vqjtgfwtinfih.exevqjtgfwtinfih.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4036
-
-
C:\Windows\SysWOW64\blgatmxkmhwsxpx.exeblgatmxkmhwsxpx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1540
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f6c0328108d87a8ccd526926fc78af96
SHA15bd5f2d4a332eb90fc0536747c4088f66a4a6bdf
SHA2560d6baa2757917b8614c4c5987a0bbf7cd218ecf0cd68b9e894dc12ef6ed99d29
SHA51272fa0f6b469e389501d3ee33233cf4e7f0375efed93b72c47b98d64dccf225df38009ef87e014e490f889066a4dad948b6d1e9dbb9ad34812bf1f0fd3b0fc709
-
Filesize
398KB
MD5098e759e9ab0bc5c1b2605bca8ad1834
SHA1ca05bda31601a022c49bed5dd4a14641e8740e2c
SHA25629f969ec8091a30bc3107e2e446c8fbd761bd0002371a039cc04644039b906e4
SHA512677ebe445c1cb139bb5a5ad59b976e6d21b5753b226b3d3fa58b003905f65231f3182012cf79b832d33bd5c694e04bc21ce9427a714cc0c69a3429533ff02e72
-
Filesize
239B
MD57b89423871a8b3429c0db4483f1e3044
SHA1d305d32237a5792a9b46be8dff420942db6c6def
SHA2564e7c195e29839c46e13df90229a2c801432861f9b5f478cc7b439e0b21cf1217
SHA512b6d83fb39d30af7c75a2569085438fb21f27a1d132646daeebeeae0d15498b4eeaae2c5cfd9f520b329086952803f1da2c932154c198d68a4d5022a34941acf9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5cd700d56891c8c997ec9f04d7306a5f5
SHA13bacdeb7fcdd13ea835697ba89a966aba94ed179
SHA2560394e27e13cdbe6d55e54e9fc594cc6f4dbfa95789074230b3b9b5461e0949c2
SHA512016b55cc1ec16c9a55c0d53f287559ada07107b9612935ce85e5265f502b5c0ad70876fb79e085fe03173e4fc90e3b892f8ba4e5e34aad7bb3c6ef857c935e56
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD52290701a8ef80074c61d4d77c2624535
SHA1c6f51b4a3f6bef578559060ccc1d77c9309302a1
SHA2568c26272a9c2039f75669a05a9cecfb711ce6af0756d14b48e3d3440251a2851e
SHA512bc2ecb00e865dfdbd36b37f3fa43452f7a90900bb32df07e96305ff3cb2f0e5b0d0f5ee307260d73989d6011ff45534ed2aa6c49593bfe609810a1c02d6af145
-
Filesize
219KB
MD567adb10e3b55d1b3983661da5681d17b
SHA1fec8f33c7dff3cac2bdfc249758118d362cf0ae0
SHA25678ef0c7df814f6104a6e58a569a1f5306eefe115acb55c98b621af2b7420f9ef
SHA512597dd239395084a7ba5fdcfcc7acaa4cc55aadab6a5771b19c845b2610e9f288f7a265c418e8fdec689d2b649c2984638a2cab9f66ff2309a55890c092bd55db
-
Filesize
200KB
MD5dfb9a7c7b37423ab81ee31324dda032b
SHA14fdbd56478713cfaec13da6b4c728cdb9ce9c069
SHA25607a93948bd7706a031929ce0dd69910044518fd4876a7455f9e9fed7ce6dbd30
SHA5125ec6097f344fa2fdc6e2bbcd64a27e3e39f0122670a924802966fd6310c074c56a39aea9065ff178cb23df71f6e6755f3e3f0fcba713f6b6105a880a10ef1ec2
-
Filesize
349KB
MD546daf3c248a8770a432c15693549fccf
SHA1ee8d51996042f728f36d2c621246c3e995316bad
SHA2567913c964ee8a7d0b9cd4b8f8efbfabda13d9c70a07808c743a00fd063dbec68c
SHA512182d83ece074cc78ab5d703b3b4e045aeed087b3ecefc7aa55b3c5002fc9de33fbc1e320d7de1bb9397351441084c8908f59b676335bbc3091a565d9fb92e26f
-
Filesize
386KB
MD5dba0cd29001f0cfcd4e8f1e012d2659a
SHA1b5993a48a16098010bd5153b9ae66ff690080059
SHA256cd9ee3f8ef1260b63c403311d556323c9f37aafc903d83d9f25fd05ab3a872d5
SHA5121a2a4bd100dc334f56e0ec3607465f20da270f2de416380e9737afe4a2787f9a723f488a35bf99fac6e6555889700fdb07a4fedffcf37f9c8a79c16a0ae5cfe0
-
Filesize
177KB
MD5b6f1ecf819cdc1b9931b22c569dc7c34
SHA17c899eba20c25683232bdd2caffe35df904e40f4
SHA2563f0b42fe70160b106bbaed02f647cf2e3f4269e2fac7a2ed69f904b04d2f5d4c
SHA512d3c9d89cbdc81ac6843a1a7b9e9a396b00b68d64b15506440573214aa2366a1581afe4a1e22ad229d37ce538aa0f07737826ed6c3bae429f23d2dd506679d532
-
Filesize
512KB
MD582800b01333f3534e12611eac8d87e3a
SHA15a656b14dbe6075a5f84c9b25622d3439e9537ff
SHA256022e7b326750a709dded6d4ea680c7648bf9db58b32c23d7ddc9a3fc0dc4c995
SHA5125582db7df0a7d85de74e2d2c3ffe1b9c2e4be671af29585d113a339277be22bd12340cf2748251b02c9d67959d636155b3e9dd3881e07fcd464d33c44a836318
-
Filesize
424KB
MD55ab68364bf603692ba3120cf058c26d0
SHA1595890399182e53c6037933f4f7b85fe1b8647d5
SHA256ada5c267d2fe199680646e102c3b9ccb63937769e1779e2a3ea046c093c990b0
SHA512785fecf58d27dc0a7b10f728bdad87230955103728d23208743be5695432abab79369f23f1b4fc3f1f05bc1e7ddc216ad3b6c26d6759f34cea014e5605e12d92
-
Filesize
320KB
MD5ee7559043f4b666e0c62a3031c75194c
SHA1b7822c74e059d1afc30cdb836b1dee056e9a69d2
SHA256d24316b24208005cdb910a49bda7d18ebc86317037cb0b8f8efa82a3cb901d1c
SHA512eb13b8f0dacab37d7175acd65837ed325743e9e7baee397e884c4a6fe6f9601eb667c0e5a20935dde1bfec28097cdc090d1420f63b708ab256859f5767be1c22
-
Filesize
193KB
MD5f8b27ed254ec5480c86a716978878ad3
SHA1dde81b810b66c3fbb847b083c8faa20ba0732287
SHA256d6dcbb318b17f015565cef440f88f94e60303a8631455180f0b754e889f8e467
SHA5124960f649cd5206d058b4a43dd9d5144fbe3bad0be2a20ae676a706d1713a214ecdb1d040011ab06a4b380f75e18434681b92c2c44bc611f33c5be938220a39d7
-
Filesize
289KB
MD5a8c2b2cbe953ee612c23ccb31a01acb3
SHA15ed611a1a2071ad8232bc1dcc473544f129cdaf2
SHA256a69c0a26e8f1932e8d28b2899f03d616fbf08ba4af2ec9885dc76a50e3c42360
SHA512a4e890515fb2482d624235d3c069065cdb7fa66383638f13efc54e804566dad94c23371179f06be6670e13f5aad58150d2821762dd2e12153c67c2b7d2a384b2
-
Filesize
354KB
MD5a1387c5c50e056f4024c698690053189
SHA1cdd7dd9ec645e36dfe935cc32e98df5c329a8e88
SHA256cb5e46d9085210b510bf8d1d8dfb6844b8e7a8c6c737cf7e5b04979860faf691
SHA5121b5547330b3c895bd8ee45c6a1ba8977902d5beee2e24a55dfe06f82cadf8c272bf7d74da48be71ea5733742d61dd1ef441042048b11ab7e6b7e6bb0eec21443
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD50bb9b2b9c1b5dfd76a9b436e47f3d7e1
SHA18627794b79e2a150e6ae5c78f1b60d88aeef4d5a
SHA2562f8a843492af0f8f87c9f1597ae43ba7cc88befd3002a2d696cd7394243e4b02
SHA512a8da62fc3447be1988d3012a3c08368b8765de4663b3fc871fab739a5ba0010881eb8fdda3bff5d6881fdf6072ed4c0d683b738a2fac4a0816bfb8a3693ec975
-
Filesize
512KB
MD5a31fb86f7beddd384c3ba9b52e33953e
SHA1514b32df1cf5df63d22fd59f6943210e56a01eab
SHA25676eb5bbfb6fe7e77ad7c6c2f3fd7d7c05a18090957cae140d1ff5e8350fdfc7f
SHA51240280fca0e5bc6f60b4637e72b2d7f554d1605ae4b7a3d7db81f1fb62bae7513568c187ad118be6491769062808269ffbc51b2ba0126f9e63a78586f58ced459