Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
091f600fd48ae9602d1bb72d1f001796.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
091f600fd48ae9602d1bb72d1f001796.exe
Resource
win10v2004-20231215-en
General
-
Target
091f600fd48ae9602d1bb72d1f001796.exe
-
Size
512KB
-
MD5
091f600fd48ae9602d1bb72d1f001796
-
SHA1
2b676b583b9bacf57a6364aa38832ac8b92f1ce9
-
SHA256
27054ea6539792fda245ba1442d854124426aaddd75bd789b7be36de41078553
-
SHA512
2b9900328aa47d5182f453662afa5c091426df0f46fc4a2ac96dd37978d69d09a587c9726a06f034baa4f5d37bafecbe9e0a71ba342dc77e812729305460b053
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5n
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" izahzclzui.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" izahzclzui.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" izahzclzui.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" izahzclzui.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 091f600fd48ae9602d1bb72d1f001796.exe -
Executes dropped EXE 5 IoCs
pid Process 4940 izahzclzui.exe 684 utxazorxmjhqsqi.exe 1600 rqddbsxm.exe 5048 sgapkaufyqlum.exe 3616 rqddbsxm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" izahzclzui.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\khjjxnqe = "izahzclzui.exe" utxazorxmjhqsqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qtimwhdw = "utxazorxmjhqsqi.exe" utxazorxmjhqsqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "sgapkaufyqlum.exe" utxazorxmjhqsqi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: rqddbsxm.exe File opened (read-only) \??\v: rqddbsxm.exe File opened (read-only) \??\g: izahzclzui.exe File opened (read-only) \??\j: izahzclzui.exe File opened (read-only) \??\o: rqddbsxm.exe File opened (read-only) \??\b: rqddbsxm.exe File opened (read-only) \??\j: rqddbsxm.exe File opened (read-only) \??\k: rqddbsxm.exe File opened (read-only) \??\k: izahzclzui.exe File opened (read-only) \??\l: rqddbsxm.exe File opened (read-only) \??\e: rqddbsxm.exe File opened (read-only) \??\h: rqddbsxm.exe File opened (read-only) \??\n: rqddbsxm.exe File opened (read-only) \??\s: rqddbsxm.exe File opened (read-only) \??\w: rqddbsxm.exe File opened (read-only) \??\l: rqddbsxm.exe File opened (read-only) \??\e: izahzclzui.exe File opened (read-only) \??\o: izahzclzui.exe File opened (read-only) \??\y: rqddbsxm.exe File opened (read-only) \??\b: izahzclzui.exe File opened (read-only) \??\t: izahzclzui.exe File opened (read-only) \??\x: izahzclzui.exe File opened (read-only) \??\x: rqddbsxm.exe File opened (read-only) \??\h: rqddbsxm.exe File opened (read-only) \??\j: rqddbsxm.exe File opened (read-only) \??\n: rqddbsxm.exe File opened (read-only) \??\r: izahzclzui.exe File opened (read-only) \??\p: rqddbsxm.exe File opened (read-only) \??\e: rqddbsxm.exe File opened (read-only) \??\m: rqddbsxm.exe File opened (read-only) \??\p: rqddbsxm.exe File opened (read-only) \??\w: rqddbsxm.exe File opened (read-only) \??\i: izahzclzui.exe File opened (read-only) \??\m: izahzclzui.exe File opened (read-only) \??\a: rqddbsxm.exe File opened (read-only) \??\s: rqddbsxm.exe File opened (read-only) \??\t: rqddbsxm.exe File opened (read-only) \??\g: rqddbsxm.exe File opened (read-only) \??\y: rqddbsxm.exe File opened (read-only) \??\s: izahzclzui.exe File opened (read-only) \??\y: izahzclzui.exe File opened (read-only) \??\a: rqddbsxm.exe File opened (read-only) \??\m: rqddbsxm.exe File opened (read-only) \??\i: rqddbsxm.exe File opened (read-only) \??\v: rqddbsxm.exe File opened (read-only) \??\l: izahzclzui.exe File opened (read-only) \??\p: izahzclzui.exe File opened (read-only) \??\u: izahzclzui.exe File opened (read-only) \??\t: rqddbsxm.exe File opened (read-only) \??\o: rqddbsxm.exe File opened (read-only) \??\z: izahzclzui.exe File opened (read-only) \??\k: rqddbsxm.exe File opened (read-only) \??\h: izahzclzui.exe File opened (read-only) \??\q: izahzclzui.exe File opened (read-only) \??\v: izahzclzui.exe File opened (read-only) \??\z: rqddbsxm.exe File opened (read-only) \??\n: izahzclzui.exe File opened (read-only) \??\r: rqddbsxm.exe File opened (read-only) \??\b: rqddbsxm.exe File opened (read-only) \??\g: rqddbsxm.exe File opened (read-only) \??\x: rqddbsxm.exe File opened (read-only) \??\i: rqddbsxm.exe File opened (read-only) \??\q: rqddbsxm.exe File opened (read-only) \??\u: rqddbsxm.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" izahzclzui.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" izahzclzui.exe -
AutoIT Executable 20 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4332-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0006000000023215-28.dat autoit_exe behavioral2/files/0x0006000000023216-32.dat autoit_exe behavioral2/files/0x0006000000023216-31.dat autoit_exe behavioral2/files/0x0006000000023215-29.dat autoit_exe behavioral2/files/0x000800000002320f-24.dat autoit_exe behavioral2/files/0x000800000002320f-23.dat autoit_exe behavioral2/files/0x000f000000023164-19.dat autoit_exe behavioral2/files/0x0006000000023215-39.dat autoit_exe behavioral2/files/0x000f000000023164-18.dat autoit_exe behavioral2/files/0x000800000002320f-5.dat autoit_exe behavioral2/files/0x0006000000023222-78.dat autoit_exe behavioral2/files/0x0006000000023221-72.dat autoit_exe behavioral2/files/0x0009000000023143-87.dat autoit_exe behavioral2/files/0x000a000000023140-83.dat autoit_exe behavioral2/files/0x000a000000023140-82.dat autoit_exe behavioral2/files/0x0008000000023156-98.dat autoit_exe behavioral2/files/0x0008000000023156-96.dat autoit_exe behavioral2/files/0x0008000000023156-105.dat autoit_exe behavioral2/files/0x0008000000023156-103.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\izahzclzui.exe 091f600fd48ae9602d1bb72d1f001796.exe File opened for modification C:\Windows\SysWOW64\utxazorxmjhqsqi.exe 091f600fd48ae9602d1bb72d1f001796.exe File created C:\Windows\SysWOW64\rqddbsxm.exe 091f600fd48ae9602d1bb72d1f001796.exe File opened for modification C:\Windows\SysWOW64\rqddbsxm.exe 091f600fd48ae9602d1bb72d1f001796.exe File opened for modification C:\Windows\SysWOW64\izahzclzui.exe 091f600fd48ae9602d1bb72d1f001796.exe File created C:\Windows\SysWOW64\utxazorxmjhqsqi.exe 091f600fd48ae9602d1bb72d1f001796.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rqddbsxm.exe File created C:\Windows\SysWOW64\sgapkaufyqlum.exe 091f600fd48ae9602d1bb72d1f001796.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll izahzclzui.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification C:\Windows\SysWOW64\sgapkaufyqlum.exe 091f600fd48ae9602d1bb72d1f001796.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe rqddbsxm.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal rqddbsxm.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rqddbsxm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal rqddbsxm.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe rqddbsxm.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal rqddbsxm.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification C:\Windows\mydoc.rtf 091f600fd48ae9602d1bb72d1f001796.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe rqddbsxm.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rqddbsxm.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rqddbsxm.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe rqddbsxm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFFFB4858826A9133D75F7E90BD92E640584667346244D799" 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1938C7751590DAB6B9BA7C95EDE537CE" 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" izahzclzui.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33352D0D9C5783576D3676D370532DAD7CF464AB" 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCFF9B0FE65F198847A3B3781993E99B0F902FE43600238E2CD459A08A3" 091f600fd48ae9602d1bb72d1f001796.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs izahzclzui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" izahzclzui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg izahzclzui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" izahzclzui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc izahzclzui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" izahzclzui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf izahzclzui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat izahzclzui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh izahzclzui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" izahzclzui.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB2B02B4795399F53CCB9D1339DD7CB" 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7836BC4FE6E21A9D178D0A08B789116" 091f600fd48ae9602d1bb72d1f001796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" izahzclzui.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 852 WINWORD.EXE 852 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 1600 rqddbsxm.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 5048 sgapkaufyqlum.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4332 091f600fd48ae9602d1bb72d1f001796.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 4940 izahzclzui.exe 1600 rqddbsxm.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 684 utxazorxmjhqsqi.exe 5048 sgapkaufyqlum.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe 3616 rqddbsxm.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE 852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4940 4332 091f600fd48ae9602d1bb72d1f001796.exe 22 PID 4332 wrote to memory of 4940 4332 091f600fd48ae9602d1bb72d1f001796.exe 22 PID 4332 wrote to memory of 4940 4332 091f600fd48ae9602d1bb72d1f001796.exe 22 PID 4332 wrote to memory of 684 4332 091f600fd48ae9602d1bb72d1f001796.exe 30 PID 4332 wrote to memory of 684 4332 091f600fd48ae9602d1bb72d1f001796.exe 30 PID 4332 wrote to memory of 684 4332 091f600fd48ae9602d1bb72d1f001796.exe 30 PID 4332 wrote to memory of 1600 4332 091f600fd48ae9602d1bb72d1f001796.exe 26 PID 4332 wrote to memory of 1600 4332 091f600fd48ae9602d1bb72d1f001796.exe 26 PID 4332 wrote to memory of 1600 4332 091f600fd48ae9602d1bb72d1f001796.exe 26 PID 4332 wrote to memory of 5048 4332 091f600fd48ae9602d1bb72d1f001796.exe 23 PID 4332 wrote to memory of 5048 4332 091f600fd48ae9602d1bb72d1f001796.exe 23 PID 4332 wrote to memory of 5048 4332 091f600fd48ae9602d1bb72d1f001796.exe 23 PID 4332 wrote to memory of 852 4332 091f600fd48ae9602d1bb72d1f001796.exe 25 PID 4332 wrote to memory of 852 4332 091f600fd48ae9602d1bb72d1f001796.exe 25 PID 4940 wrote to memory of 3616 4940 izahzclzui.exe 29 PID 4940 wrote to memory of 3616 4940 izahzclzui.exe 29 PID 4940 wrote to memory of 3616 4940 izahzclzui.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\091f600fd48ae9602d1bb72d1f001796.exe"C:\Users\Admin\AppData\Local\Temp\091f600fd48ae9602d1bb72d1f001796.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\izahzclzui.exeizahzclzui.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\rqddbsxm.exeC:\Windows\system32\rqddbsxm.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3616
-
-
-
C:\Windows\SysWOW64\sgapkaufyqlum.exesgapkaufyqlum.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5048
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Windows\SysWOW64\rqddbsxm.exerqddbsxm.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1600
-
-
C:\Windows\SysWOW64\utxazorxmjhqsqi.exeutxazorxmjhqsqi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:684
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD574e704fd05485b98276940d2e17342f1
SHA1b82a549416f11c42444cb722e1cc81b08e4c3f64
SHA2569413853930f8670aa6df532e0ef6cd36f274fbc6de39d875130c2f6ee000c08f
SHA512ed5d3d85fe8e8a3ca9ce4f19145b99e2d523d658d850a1eaa6be5cefc84b6a9631862c145f445eec6829cd30cd444758149c45915be5981e5b35416de46c6740
-
Filesize
17KB
MD552bf4cf395f40b18ede12b9afbce5e1d
SHA1a0b6a992f6a64895bf33218fe3ceee17d5f3719d
SHA256026b1bb566eb8de3a9bc2a902b4e1a2931dc4f162d64776ee80361ecefc9aa23
SHA5125fbd3adf8d55d0c2e9cec057cca2d7e4258ac3dff499a2df3619dbdc4050b7d61e3ff9e2268a48f1d7b26ee7d5f53160d751831c9944ff3761ddd85044b824bc
-
Filesize
239B
MD55f2e5865881c5a30da07fc292ec6af93
SHA1f330b08c3e6da6c92db77979789e5385101fe843
SHA256eb2afa425636d43e37c9de0dc51e01da4330e907d40dcbd95d3d8c93f2ace2de
SHA5123ce8a58c1045be6f2e1b2b728b9d4949826b919c3b3f5faecfaf64cfcd3b49aeebe47d29946050ffa1a690ff83822d260d2d9cd170f41e57ddd6c44236cf7621
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD57ed0ea6a37c7de32ff6c238023d074ea
SHA18f951a6d6f9d75b85a6497db5084053475b69978
SHA2561780fabd480296814880ec82be111d52ce8ab7465b61d7258d2e1144d4ae174a
SHA512fcb605b5bccb14fbe745e1ae6ef4dd122af066ad05d6fdc70443ef5c4b7ab42576c50fcebca359708232ef734f416310233bacecc78922fbd52cc0d627dfde58
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5161972bb5d600dedf46e35dc9ce0db29
SHA1862517bb1a0e841e268a7f44fd1d6b85e0027009
SHA2562848bfd6fe0ccad12b1d2c0e6aea5220c2f054fd3dc97c7e2afc7101d6773677
SHA512164e8c20b944aabde404c37c86f5ae3ec797ea1c4d6faaff7116bdbbd974023c2f9671352ac03ae3ffdddda4a525a71ce4cdfa8997354fb4f3d8f05dcabb122c
-
Filesize
38KB
MD51fec2aa9dffe7dd316af140f57e14b6d
SHA14c1fa4d0759676451dcf47f0795f59ace3d3043b
SHA2564dfff6d5aa37b3d2d99ada4aee8b5f59719c4aab47a684d6af9c315d26b452cc
SHA5121a1314b49573c7f45b75a56c29af0f267723fb86c3d538f29a2b3f46de2b5797b8a147ae6ee908433587912cde0d99f7b8982b4069ab6a08c6d4be396cb003f4
-
Filesize
71KB
MD5a995f697b6ebf0321796097739451f27
SHA1893add72947768c840abbdbd09aa4f8bad4d6acf
SHA2560a8f0447bc88c0aa83e24d3544d7f39e69d5c98f2424a77d1fed2a48ef159b21
SHA512418a7f2943d7f3141f88af2aa1a69bf9ba6ccf10f903aa1a712af758e0c654635ec44cb1b1f1746d72e762d5305afcefc4d0f08101d2b3295986fea6a330f174
-
Filesize
231KB
MD5d6951e960a5fe8d286e27fc7e8dd0dde
SHA1955968a206fd796fbf4d7b134c94d3905b5e0943
SHA25672fea9af7010af598fa903a84efbc258a55328dc6a99708b6363d4bc397d6f48
SHA512f3bfee2eb50d9ec50544f4aabdb8737adb1b717b9c5b4c59601ef6d5ea6cce555235dd06322edd754f111b5db04af806bc3980bfc20173824af6ad729b272e1e
-
Filesize
90KB
MD5f446ede37ac06f513c23839e9bbdb332
SHA1996b15a40521e279da14ec927ad2c2b6f1eeeb44
SHA2565cad4c5363d53a3b9fd4083e0afe278aa84b965893de36cb08dcd78ca1a4911c
SHA5122cb48a136d00cf36e155ca5f7f0d9a3377e94a3bf5407ada220a81f191b5061cefdd8105a77f499c908fc41e100d65c270e76a616b9d2469b353cdfedc9223b5
-
Filesize
41KB
MD5a560cbac1c6554f81aec7168b5df77dd
SHA18256749e2db3deaef0892dc0cd4a1f5eab26ca02
SHA256dec74204620ba14c63fb51636469d8ae7adfcaba6f6f8abdb74de771ec5e6891
SHA5121df45ba5e159342068e7205c697a4fb37794f66b1782741953875d514ce93f14e25c4a14b2dde1f939eaebf96919b986b01488f41faeb1ec6a7825f63aa93ae0
-
Filesize
99KB
MD57fc6cf931da79ecd4267f22c6a1aefa8
SHA1913682b9a75a4089cc18ec25b28e082916a6b314
SHA2562672445b36639d26c7bcf277704d7f634ea7a6f4eac634027b98fb3f94062487
SHA512272947751145ba29cbfecc6fe73cf5e20cf017c8c436a8af45198499e8b34c5f70215c3d5f21676a2a5de87616e85aa12b5cf0e263d57042e4221f7e12d81eaf
-
Filesize
9KB
MD5baf7217cd7ad931cde1e471d357324d7
SHA125ef24f8746485b62d65e8be8b3ff9b79ab9b37d
SHA256dc7864fe9d0c873197fef55155e1b40b3a829d87d488d4fa9f1b450bb79b8009
SHA512532088d411a73d736d06818e901cfe9e4caae77fa714ab4d30de63d5eb529170976a0af171ab05a9db1add7c06e200cbcda0353b73bbb7497e69ab77c0920556
-
Filesize
92KB
MD57b010a20484df37a906ca2b5621ce10d
SHA1f3417b8a0c12bdfefbac6df3a3d15cada831783e
SHA25692a6f06ce96a40d24e5255b0aaf62483a21f647e7d52dc403ea53ff7956d32da
SHA512bb4bdfe408451441bd53272b8a4b1b7afa41dc9cc68813a1b61f0f3c0f053fafbe20ce8033e6367b39872c54f1cab35899fd4aa8c2b8aa6a93a699e4e2ff218f
-
Filesize
57KB
MD53a81bb7f89fff51fd80d1e9e1e60471f
SHA17c04e73b47855108f7cb0f1f8e76b71078d74158
SHA2567afee2b09ec479879bca80da134ceff2df40ad8eff99ed5b1461e6b64e3c474e
SHA512d8500626b99b14b8e441c88b9a8431db9188b5dea17610b1d5ff35a199195026f6c9961281e7c3a4babe8c88b1a949a03a42c6872e2eb0ec1761f65095f777cc
-
Filesize
121KB
MD5f6992ba5f3ba3842c3227c1565e953ee
SHA1812fdcc6f02079589bbd59bb103eb7c5be340a31
SHA256329544802fd95d2dda3931a0a28c761dc5edb171ded19b26c111e3e6f915a1bb
SHA512c34796daa861765ca57db4a793ec45d0b083d36433b8594a1a37e713805888427c479215abee370bbc0fe62ae9fa718bdd6f9879def6ea8e4fdb8bab8fb475b9
-
Filesize
53KB
MD51205e0dce7ea1dc4cfd33c74d1f9454b
SHA1f0d1e21b6e2fe37fa75e572b472788af5a8a71e0
SHA2561f2571b4baf68b0fcb7f067c03ef6cbf93bc0874c7a0a4927511cb787a79fe1f
SHA5120eb78657ce902544808c7e1f1e280c43be82025a7706f2cd32371a754262fbb523370917785bd11c80790c780dedca425049e1d82dd6226d3b9f4015fb16e555
-
Filesize
273KB
MD553b48333883eb6db83aa6000fc44a40d
SHA155d0582ab8c4a0d0054a0d1a213f1644df6461b3
SHA25672f9c1a7b648db3a3d22393db10c81d87cad819a2a3c8453c5ddd9684a6fb548
SHA5122d9bfcef809b4b00469f1af7536c588fbbd20787966f07a7c81b5c2c5357dc222fe3f3fc83b131d19630124119545e151e19209751e61dd6a24a66711724dbf5
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
84KB
MD563ba89f402ce4ef981fcff2a6a31b163
SHA1e097cc2d0f25595c80ed241cd97cb2a2ecedaae4
SHA2564632ad4c93e30c50fc4bc2885dcaf85cbd31dd46726cad44975538e779c8ba77
SHA512e6832cf5ce0f2e4fadaad9c3da11a06d61ae0800701f98f4ed87d185fccc98f38f06b6852f509fcf2a6de34e8edee20f06b0d577ec47ab7ea5e823b467cfbb79
-
Filesize
12KB
MD55bf17f42f11f297cb648b00e6d40e81c
SHA1c6599e31e76a0b1a1d1552e9145ef5e6354949ee
SHA2560b22d2dc13a0e936236ec85957a9d4e023e14f9b41017f7bc121456e601d2ef5
SHA512f85651fa1b27619b3692dd6c2ecdcdcdcf32bbe662924180fc0af4c7ad329f3d072e787bc01041b01ecc531f7dff633f87c644379176ae87dc12397d4c4b0cff
-
Filesize
40KB
MD5ead50e07039d55d66d77dc1fe2581dfd
SHA1c5f3a3b362cd4188996f928d4f68b5c8f9cebe49
SHA2565ee0ba85e7af8867768a68bd8e54131d3eaa77b850c2373542ff4d97208be12e
SHA512ae5694d92612cfdadd93924a65c2773e9d75d1f86e8a22212ec3a0687d0406551d4115ddfaa131bc73ca37d4000b466ddede01fd691b29d8b1c61b811060db75
-
Filesize
63KB
MD5df3f07722c3146a10b433be180468910
SHA18848678edd82447d0d9340c519b6a0a2b6ee6fde
SHA25689f01775aecd9bde06c54cc6be7388f1b8206c2eb2243617f8d870d711261647
SHA512d65948f41771a99602665f9734a9bbcd9adace60752d055becba3d20c8fa49344041759cd0bd968a7aed86ec198c3aa667de21c5c331282a0b5ca974810858b7
-
Filesize
5KB
MD58b75f548f625f5bcdefd8a002b413126
SHA1cb30cad9b1eaab56528f063957982cd90c824589
SHA256c8aedcde02051e1e93dda61a7e73daafdaf8ea9ff0458bc7ba8674a8bea7058b
SHA51220212c80e77f458f4593d3b550a5b9a63dd0a34c6cb10dd0d450c0499da530baaee1839f5ae328313fc416ccf0b51d11205a90e576f43794f18af895b08be1b8