Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
0abebaa94a1f0f44fe74eea270fb3af6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0abebaa94a1f0f44fe74eea270fb3af6.exe
Resource
win10v2004-20231215-en
General
-
Target
0abebaa94a1f0f44fe74eea270fb3af6.exe
-
Size
512KB
-
MD5
0abebaa94a1f0f44fe74eea270fb3af6
-
SHA1
8d150d66d2480f57c37e5096149f9409e8167e14
-
SHA256
13abc0f9c9b5fec0dd81c566cfd062fd95ca63b9a751eaf0815adba689558d2e
-
SHA512
4932f86c24f962aef5df4ac7dc703c4612f9b6260b9e78eabbc25664263c70da588b6d6337f64cb27dae48b872e6e7dc437c0b87dd9861c40fd184b152cd36f3
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6A:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5b
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ceniraajpz.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ceniraajpz.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ceniraajpz.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ceniraajpz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 0abebaa94a1f0f44fe74eea270fb3af6.exe -
Executes dropped EXE 5 IoCs
pid Process 5108 ceniraajpz.exe 4624 gdgjzzknqgxpmmp.exe 3916 evwlooer.exe 556 gmlzqydgmetny.exe 368 evwlooer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ceniraajpz.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gskxgclf = "ceniraajpz.exe" gdgjzzknqgxpmmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lidyuqbh = "gdgjzzknqgxpmmp.exe" gdgjzzknqgxpmmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "gmlzqydgmetny.exe" gdgjzzknqgxpmmp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: evwlooer.exe File opened (read-only) \??\u: evwlooer.exe File opened (read-only) \??\x: evwlooer.exe File opened (read-only) \??\s: evwlooer.exe File opened (read-only) \??\p: evwlooer.exe File opened (read-only) \??\y: evwlooer.exe File opened (read-only) \??\m: ceniraajpz.exe File opened (read-only) \??\m: evwlooer.exe File opened (read-only) \??\p: ceniraajpz.exe File opened (read-only) \??\w: ceniraajpz.exe File opened (read-only) \??\i: evwlooer.exe File opened (read-only) \??\q: evwlooer.exe File opened (read-only) \??\x: evwlooer.exe File opened (read-only) \??\i: evwlooer.exe File opened (read-only) \??\p: evwlooer.exe File opened (read-only) \??\r: ceniraajpz.exe File opened (read-only) \??\s: ceniraajpz.exe File opened (read-only) \??\j: evwlooer.exe File opened (read-only) \??\b: evwlooer.exe File opened (read-only) \??\b: ceniraajpz.exe File opened (read-only) \??\i: ceniraajpz.exe File opened (read-only) \??\u: ceniraajpz.exe File opened (read-only) \??\z: ceniraajpz.exe File opened (read-only) \??\b: evwlooer.exe File opened (read-only) \??\n: evwlooer.exe File opened (read-only) \??\v: evwlooer.exe File opened (read-only) \??\n: evwlooer.exe File opened (read-only) \??\r: evwlooer.exe File opened (read-only) \??\t: evwlooer.exe File opened (read-only) \??\z: evwlooer.exe File opened (read-only) \??\g: ceniraajpz.exe File opened (read-only) \??\k: evwlooer.exe File opened (read-only) \??\g: evwlooer.exe File opened (read-only) \??\j: evwlooer.exe File opened (read-only) \??\a: ceniraajpz.exe File opened (read-only) \??\j: ceniraajpz.exe File opened (read-only) \??\k: ceniraajpz.exe File opened (read-only) \??\q: ceniraajpz.exe File opened (read-only) \??\a: evwlooer.exe File opened (read-only) \??\l: evwlooer.exe File opened (read-only) \??\e: ceniraajpz.exe File opened (read-only) \??\h: ceniraajpz.exe File opened (read-only) \??\n: ceniraajpz.exe File opened (read-only) \??\e: evwlooer.exe File opened (read-only) \??\h: evwlooer.exe File opened (read-only) \??\m: evwlooer.exe File opened (read-only) \??\t: ceniraajpz.exe File opened (read-only) \??\x: ceniraajpz.exe File opened (read-only) \??\l: evwlooer.exe File opened (read-only) \??\s: evwlooer.exe File opened (read-only) \??\u: evwlooer.exe File opened (read-only) \??\o: evwlooer.exe File opened (read-only) \??\v: evwlooer.exe File opened (read-only) \??\y: evwlooer.exe File opened (read-only) \??\h: evwlooer.exe File opened (read-only) \??\w: evwlooer.exe File opened (read-only) \??\l: ceniraajpz.exe File opened (read-only) \??\r: evwlooer.exe File opened (read-only) \??\t: evwlooer.exe File opened (read-only) \??\z: evwlooer.exe File opened (read-only) \??\g: evwlooer.exe File opened (read-only) \??\q: evwlooer.exe File opened (read-only) \??\e: evwlooer.exe File opened (read-only) \??\o: ceniraajpz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ceniraajpz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ceniraajpz.exe -
AutoIT Executable 19 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5004-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000c000000023155-19.dat autoit_exe behavioral2/files/0x0006000000023210-31.dat autoit_exe behavioral2/files/0x000600000002320f-29.dat autoit_exe behavioral2/files/0x000600000002320f-28.dat autoit_exe behavioral2/files/0x0006000000023210-32.dat autoit_exe behavioral2/files/0x000800000002320a-24.dat autoit_exe behavioral2/files/0x000800000002320a-22.dat autoit_exe behavioral2/files/0x000600000002320f-36.dat autoit_exe behavioral2/files/0x0006000000023217-70.dat autoit_exe behavioral2/files/0x0006000000023218-76.dat autoit_exe behavioral2/files/0x000c000000023155-18.dat autoit_exe behavioral2/files/0x000800000002320a-5.dat autoit_exe behavioral2/files/0x0007000000023220-94.dat autoit_exe behavioral2/files/0x00090000000231c5-88.dat autoit_exe behavioral2/files/0x00090000000231c5-86.dat autoit_exe behavioral2/files/0x0006000000023224-100.dat autoit_exe behavioral2/files/0x0006000000023224-98.dat autoit_exe behavioral2/files/0x0006000000023224-105.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\evwlooer.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ceniraajpz.exe File opened for modification C:\Windows\SysWOW64\gdgjzzknqgxpmmp.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification C:\Windows\SysWOW64\ceniraajpz.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification C:\Windows\SysWOW64\evwlooer.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification C:\Windows\SysWOW64\gmlzqydgmetny.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe evwlooer.exe File created C:\Windows\SysWOW64\ceniraajpz.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File created C:\Windows\SysWOW64\gmlzqydgmetny.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe evwlooer.exe File created C:\Windows\SysWOW64\gdgjzzknqgxpmmp.exe 0abebaa94a1f0f44fe74eea270fb3af6.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe evwlooer.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe evwlooer.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal evwlooer.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal evwlooer.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal evwlooer.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal evwlooer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe evwlooer.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe evwlooer.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe evwlooer.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification C:\Windows\mydoc.rtf 0abebaa94a1f0f44fe74eea270fb3af6.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe evwlooer.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe evwlooer.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe evwlooer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" ceniraajpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ceniraajpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33402C7D9C2783566D3E76D170272CAD7C8E65AA" 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ceniraajpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ceniraajpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ceniraajpz.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings 0abebaa94a1f0f44fe74eea270fb3af6.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F668B6FE6F22D0D20ED0D48A759117" 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC67815E6DBB2B9C17FE5EDE734BA" 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ceniraajpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ceniraajpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9FAB0F96AF193847A3A4B86E939E6B38E028842600239E1BA42ED09D1" 0abebaa94a1f0f44fe74eea270fb3af6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ceniraajpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ceniraajpz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ceniraajpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ceniraajpz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB7B02C449039EE53B8BADD32E9D4C4" 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8FFF8A482C821B9040D62E7D91BD95E144594266436330D69D" 0abebaa94a1f0f44fe74eea270fb3af6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ceniraajpz.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4564 WINWORD.EXE 4564 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 4624 gdgjzzknqgxpmmp.exe 3916 evwlooer.exe 3916 evwlooer.exe 3916 evwlooer.exe 5108 ceniraajpz.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 5108 ceniraajpz.exe 556 gmlzqydgmetny.exe 556 gmlzqydgmetny.exe 368 evwlooer.exe 368 evwlooer.exe 368 evwlooer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4564 WINWORD.EXE 4564 WINWORD.EXE 4564 WINWORD.EXE 4564 WINWORD.EXE 4564 WINWORD.EXE 4564 WINWORD.EXE 4564 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5004 wrote to memory of 5108 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 38 PID 5004 wrote to memory of 5108 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 38 PID 5004 wrote to memory of 5108 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 38 PID 5004 wrote to memory of 4624 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 36 PID 5004 wrote to memory of 4624 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 36 PID 5004 wrote to memory of 4624 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 36 PID 5004 wrote to memory of 3916 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 35 PID 5004 wrote to memory of 3916 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 35 PID 5004 wrote to memory of 3916 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 35 PID 5004 wrote to memory of 556 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 34 PID 5004 wrote to memory of 556 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 34 PID 5004 wrote to memory of 556 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 34 PID 5004 wrote to memory of 4564 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 29 PID 5004 wrote to memory of 4564 5004 0abebaa94a1f0f44fe74eea270fb3af6.exe 29 PID 5108 wrote to memory of 368 5108 ceniraajpz.exe 33 PID 5108 wrote to memory of 368 5108 ceniraajpz.exe 33 PID 5108 wrote to memory of 368 5108 ceniraajpz.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0abebaa94a1f0f44fe74eea270fb3af6.exe"C:\Users\Admin\AppData\Local\Temp\0abebaa94a1f0f44fe74eea270fb3af6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
C:\Windows\SysWOW64\gmlzqydgmetny.exegmlzqydgmetny.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:556
-
-
C:\Windows\SysWOW64\evwlooer.exeevwlooer.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3916
-
-
C:\Windows\SysWOW64\gdgjzzknqgxpmmp.exegdgjzzknqgxpmmp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4624
-
-
C:\Windows\SysWOW64\ceniraajpz.execeniraajpz.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5108
-
-
C:\Windows\SysWOW64\evwlooer.exeC:\Windows\system32\evwlooer.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5807949dc892f2257a045323d6ca92d3a
SHA1e15e8919bf16e60d336fa8ea5f1dd2bc495d69e4
SHA256211dfcafb4d702fdbbbe16fb8b72fb04c352455bdecc5781dae74e2a52d5eadd
SHA51293a9185f517066c16e87ebb5cff06eadf00879b98cf1c3bc9c4a1c365ed113b8f2040dfbf28ddbb2e814df0f614b53042a9ae138e388cd2abefa74d9af258da3
-
Filesize
97KB
MD58f089972d9c306f0de280ae3ff8f02ee
SHA1c3482f57ac303cf78a0bdfb1e4fd4505d2ac7d87
SHA2568c2f042873d0226a685ad5e826b9db8d4efaa43b8815357e623ab8ffdfe29a5f
SHA512d522fd713a86e058100a4bce162ce809fba89ebd3e412b46188b41063625736b20cb84c6fca849f1e99c721648de79b0231c31be333e0ee22bde9ef5845e7019
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD56395bf8e1df36c4fe4d396b520c5db94
SHA1e4de4beef2dc344b76b8f207287b5bc45550133e
SHA256400c2be030211db932b94db3ea4aba291e70e38c8f2db742990c15ac5ce90934
SHA51275eddaea676c50493d10bfca5d6f3184f209db2e9bcd3c2c4e4c40b43ad273f4ffe786a4d116a858a43255ac0e900ff609eec9d0bd56c599a6e5fd882e2a5207
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59fe03410e32e8e32b04e123a12bc0af0
SHA1531b6c7d245e7d7171fad25d29b08ed31f736154
SHA256b774fe693b56759798b1b89bddef7dccdbe1beff7ca7162a7c2ead8c311fb459
SHA5120c0e04f9aa7566a7e28ab339894a1447d8ea39ccfc6d54ba68986109ab5bd9f0f4b2c754239edec86ab9fea46c92bb466dcbf136185ad9df2fd79affffd46eb5
-
Filesize
19KB
MD5dcbaaad5d502099df175beb73b35559b
SHA168a3282c8fd02bbd2ae9ae6d2a9b6601bd8dc8f7
SHA2567eb988d023543e01c8cdd679ff92663efa1631e7e025723564a7241d6218d04f
SHA512efe8167f6f25dd993c2086c79c92cdc64ef5d429550398a29bd1c97b378ebc91f8a63248d36048cf67f14cc590745628440bee1bcabed8a9c5662f30fd9afeeb
-
Filesize
11KB
MD5320d06fdc1e0af4beda5702197223307
SHA10632ada48834cc2a2b7c7e0f6ae99d55b9fc0856
SHA256d07aac8b0c68b1ca9f798ec180923686262c4f08d911feaa3d184d1a7b0484c9
SHA5124c32368dcbfada781076d2b45a60c9b10f8b9d7eea9ea6be3ed8754db01f3ac625153cde0f059423fb60b939f786bd2433ba8a796cda5c88a8f681750c53b1c7
-
Filesize
254KB
MD59afe178da3402f614a600f1211dc96f6
SHA1305ac96253b38dbd017094f09ba7f4e288b243b2
SHA2565192e4a4efa0882f69cf1ff310df00e513d542eece9879d0dbb2ecac24b51bf0
SHA5126386569830097962a734448c901cf1157b4bb7b9b4d46825045165f2ca769bc75f2b2ec12c4309e27504babc01bab4c3f784bf1e656eb8afd806d1da7679c3e4
-
Filesize
83KB
MD5322641f8f82d44239ab09a98975aeba0
SHA155d5e7f4d9957cbeb3c5b7495ce209cffe4b6511
SHA25633bfcb00c262ff8a804de06a2791762e18b7fa16fd105b45839213e245ff85b4
SHA51259a761e874bb66fc4fa2f4ad92ad696ca27e5d0c2226a8f8fdedf0283450345d9297300c20ae20dba1accbea5e7faaac1503b28da4440097a39f521fee64d911
-
Filesize
180KB
MD52a9088750beab2edaa37da61e424dc27
SHA13b74e472ab6fbb0433b3380b4858b2ac4bbef4eb
SHA25601597cc18ac55e4a95820e93fc53c2a7184a99b5f1c97ad0d72956112a59b499
SHA512597541c18618df28c8a010cadd26c327c17a8c7596bd4632f35e32e034e0b7cbd0ca33393726b81fe1bd23bfaf54fb331508541778e882344bf4f1175edafba0
-
Filesize
328KB
MD580f4949da3a4d412190886578e06bd21
SHA167a12ff4e760da60f7ec6374253d95aeece59198
SHA256d0b6eb50800c3ab519413cf7eac61df4b3ee2944be3d06435f8ca2ce1bc590d9
SHA512f521f9e434521e76143afef9f9a76989f1a17e298f6e2795d061cfc887e2fb841c1f36ed5c4e888684109d09a40544715d356c6c39b1be278c0d994c707d5eec
-
Filesize
113KB
MD5d61516032384660828dc2ac8bf4bc0ef
SHA1c77bf022b7d77ed25a26f41da6203accb4847a0d
SHA2561c45c55097275f00931188297e8b2d2e04cc056049529be3c9ba960f83a0bb66
SHA512cbad5fe87ec5897ed84cca00425aec52b0d6a6f81e704383eca2177947684f860e8c447111902a148e76fdbf4369056573f9ad090017b1124747c486874af9cd
-
Filesize
171KB
MD50565da3545ea6981d8369d2e1d4c9db2
SHA1d5a3493b3bdcdf79a27106a2195fab44c32a3318
SHA256438e177bfdfcee140077c3d70145f7a95d21d6e3731120c18c1c2dcfc7914c05
SHA512aca0bfeebf942fa0f61b62cab7fcdfed1f66b9117bf759173f73958686b43f3fc79a2cc18d9098c72e1dc26164156e308e6bc765ffdd6d9d9bbfeeff1506bc4b
-
Filesize
170KB
MD5c70c054c5261e2297ee2068efeaaff73
SHA139f2c2711fbf81734fb0e1395126d390f242ed7a
SHA2563470ec62cf26152c4bcf37f9396613142b897073eee5025f03ea851bee591ab4
SHA51292481342b65deaccc8afda87d4966a0ffa7aa74a4a6cd391c2922534ba24f27116442a69433e062b84c432f3ff9efebd034054ef8977ad97e2cdf1cb2423dca2
-
Filesize
179KB
MD5510f5d6cdb9d1bd153ebe5372698bf87
SHA1f325cda43ba2fb4069e0da94be7af3759c47a6ed
SHA256049672938a05434229523915c138bf65e6aae087ebc1695091bd200b309fba06
SHA512c853bb3a8d6329d2a1d0c9d357157584818c1288aae7c5ef193f53f5d9e3f7a7a92154a7f301e7899a123ffeb2c51c902df830c5a0967669cc0c657441acd9e5
-
Filesize
64KB
MD56de31e4935f0a909cb933fb5a034f0d9
SHA11040daf7326ba765b55bcb302ad4aef745c24c2f
SHA2567abe4417dd69434527d10ab6a1e56bdf2894965813edadb51dba0ad28df9823f
SHA512fae4630a0540e0d27471fc2a7ef36ba0639f43375e037ac0702b15d7d62782db28d9682d61cf08d808e9020eb340ab17234a7257c32c2936bac1a0e7f87f9ede
-
Filesize
242KB
MD53a33e7dc381a9bd5b30c772da39818fc
SHA14748d07995028882907c53f25c32adbe3c67b381
SHA256b891aeaad99ff76f793e62c24d28737a207583ee75fdb032357642dec5870569
SHA5121a174c5ea2f3e63c4602b6ae1dcba942833d876a3082aef34824b61fc6fbf2cf5fdf8f7f11a0230695b6169b65040b42d0e8b6824f3605c1c9dd35111e53c507
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
23KB
MD53cdfd37ab66e3d18187f1f6116feeece
SHA1429d65ee508732d33711c13752b0600eed1b649c
SHA256031386d9217ef61af9691c8daa206efb3574e2759015e5108d089eafdc5398e6
SHA512e5652e8348948087879241c3db69816aab788a6775c009e363f67bf8acbeaa3a84cb2709cec0f2b0de2eb67cb9e40f78ac58e588fdce2601484313bd195bf6a2
-
Filesize
23KB
MD53a3d8373d569f8ee15c93ec7c23cd27c
SHA1997a196c8c0b48ada241863207ff85a9f6c54289
SHA2563ac74cacb787c5752ec1c4944217508546110e301bdae9a735da420319eae0ff
SHA512b9d67cdcd613e9c5962ca2d16f1974dd24be82e0a12ac40cc2d202368220283ba3f300af52ce904daf288e73efd50fe1985c1cab1e65b7b08e9abcb22df40151
-
Filesize
12KB
MD50a8a2ea90b8022254ca8b4b2ea80d1a0
SHA1443b98d0fb63bca4b6acc9cb11c2dfa4cf7fd678
SHA256fc0a9422d6d11bdce9809e0ec2b726f2d95bda668ff999161e9f730cfd059bfa
SHA51246b8e0c9859720a77484475382219779c57df3c9c506c0b1ab6c47e6396adf2648161d52b356c83d8ae71129c0ae76e90bc2a100ffca1592f5e36adc9edba7c2
-
Filesize
24KB
MD5f9713892f71a3e604e89765fe3c15928
SHA16c12ed6cad79157d560bf1afbfd5ff3a8cd7aa6f
SHA256132b3af42ee8c700c10587543e048e470bd2d5fb3755a549da3cefd07eca44ee
SHA512c6f936809dcd41a61df40dec7cfaadd826e9dda29d78f5d74e03263929a8ae9d77b4a4a382555156a55738d1bad46d31be8bf39f72c9bbfa9400a60246b63c86