Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
0ceaf65857d7abd3d0b19c8ed58b4d45.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ceaf65857d7abd3d0b19c8ed58b4d45.exe
Resource
win10v2004-20231222-en
General
-
Target
0ceaf65857d7abd3d0b19c8ed58b4d45.exe
-
Size
512KB
-
MD5
0ceaf65857d7abd3d0b19c8ed58b4d45
-
SHA1
f0e101c0dc5604fe0ac289894957ff53b753ff13
-
SHA256
0feaab70d04347b17ec2c5743826777c10a63ba589630456d0bfa2ea836a043a
-
SHA512
8f060a53b6140fdc9982cd8f8b4042554e01274118bf5a300bd1bff36c1049d630295b9d63c8931458ae84c3be376fffd3cbf46bb451c04114218987cd73ee54
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6J:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5w
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wmjllniuyj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wmjllniuyj.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmjllniuyj.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wmjllniuyj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 0ceaf65857d7abd3d0b19c8ed58b4d45.exe -
Executes dropped EXE 5 IoCs
pid Process 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 2452 xswltgox.exe 3948 lhspiqaepchcf.exe 4316 xswltgox.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" wmjllniuyj.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "lhspiqaepchcf.exe" jvtdiummrzhscow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygnssxty = "wmjllniuyj.exe" jvtdiummrzhscow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\trkrcgye = "jvtdiummrzhscow.exe" jvtdiummrzhscow.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: wmjllniuyj.exe File opened (read-only) \??\y: xswltgox.exe File opened (read-only) \??\j: xswltgox.exe File opened (read-only) \??\g: wmjllniuyj.exe File opened (read-only) \??\e: xswltgox.exe File opened (read-only) \??\u: xswltgox.exe File opened (read-only) \??\v: xswltgox.exe File opened (read-only) \??\o: xswltgox.exe File opened (read-only) \??\r: xswltgox.exe File opened (read-only) \??\u: wmjllniuyj.exe File opened (read-only) \??\w: wmjllniuyj.exe File opened (read-only) \??\b: xswltgox.exe File opened (read-only) \??\j: xswltgox.exe File opened (read-only) \??\t: xswltgox.exe File opened (read-only) \??\s: xswltgox.exe File opened (read-only) \??\t: xswltgox.exe File opened (read-only) \??\v: wmjllniuyj.exe File opened (read-only) \??\x: wmjllniuyj.exe File opened (read-only) \??\l: xswltgox.exe File opened (read-only) \??\w: xswltgox.exe File opened (read-only) \??\a: wmjllniuyj.exe File opened (read-only) \??\t: wmjllniuyj.exe File opened (read-only) \??\a: xswltgox.exe File opened (read-only) \??\e: xswltgox.exe File opened (read-only) \??\k: xswltgox.exe File opened (read-only) \??\r: xswltgox.exe File opened (read-only) \??\u: xswltgox.exe File opened (read-only) \??\y: xswltgox.exe File opened (read-only) \??\m: wmjllniuyj.exe File opened (read-only) \??\p: wmjllniuyj.exe File opened (read-only) \??\r: wmjllniuyj.exe File opened (read-only) \??\i: xswltgox.exe File opened (read-only) \??\x: xswltgox.exe File opened (read-only) \??\z: xswltgox.exe File opened (read-only) \??\h: xswltgox.exe File opened (read-only) \??\n: wmjllniuyj.exe File opened (read-only) \??\s: xswltgox.exe File opened (read-only) \??\v: xswltgox.exe File opened (read-only) \??\m: xswltgox.exe File opened (read-only) \??\l: wmjllniuyj.exe File opened (read-only) \??\s: wmjllniuyj.exe File opened (read-only) \??\y: wmjllniuyj.exe File opened (read-only) \??\g: xswltgox.exe File opened (read-only) \??\a: xswltgox.exe File opened (read-only) \??\z: xswltgox.exe File opened (read-only) \??\h: wmjllniuyj.exe File opened (read-only) \??\z: wmjllniuyj.exe File opened (read-only) \??\h: xswltgox.exe File opened (read-only) \??\q: xswltgox.exe File opened (read-only) \??\n: xswltgox.exe File opened (read-only) \??\p: xswltgox.exe File opened (read-only) \??\q: xswltgox.exe File opened (read-only) \??\e: wmjllniuyj.exe File opened (read-only) \??\k: wmjllniuyj.exe File opened (read-only) \??\o: wmjllniuyj.exe File opened (read-only) \??\m: xswltgox.exe File opened (read-only) \??\b: xswltgox.exe File opened (read-only) \??\x: xswltgox.exe File opened (read-only) \??\i: wmjllniuyj.exe File opened (read-only) \??\j: wmjllniuyj.exe File opened (read-only) \??\o: xswltgox.exe File opened (read-only) \??\w: xswltgox.exe File opened (read-only) \??\g: xswltgox.exe File opened (read-only) \??\i: xswltgox.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" wmjllniuyj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" wmjllniuyj.exe -
AutoIT Executable 19 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1332-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0007000000023221-5.dat autoit_exe behavioral2/files/0x0006000000023225-30.dat autoit_exe behavioral2/files/0x0006000000023225-32.dat autoit_exe behavioral2/files/0x0007000000023224-29.dat autoit_exe behavioral2/files/0x0007000000023224-38.dat autoit_exe behavioral2/files/0x0007000000023221-24.dat autoit_exe behavioral2/files/0x0007000000023221-23.dat autoit_exe behavioral2/files/0x0007000000023224-28.dat autoit_exe behavioral2/files/0x000700000002321e-19.dat autoit_exe behavioral2/files/0x000700000002321e-18.dat autoit_exe behavioral2/files/0x0006000000023230-68.dat autoit_exe behavioral2/files/0x0006000000023231-71.dat autoit_exe behavioral2/files/0x000800000002312a-95.dat autoit_exe behavioral2/files/0x0008000000023129-89.dat autoit_exe behavioral2/files/0x0008000000023127-83.dat autoit_exe behavioral2/files/0x0008000000023136-101.dat autoit_exe behavioral2/files/0x0008000000023136-117.dat autoit_exe behavioral2/files/0x0008000000023136-115.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\jvtdiummrzhscow.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File created C:\Windows\SysWOW64\xswltgox.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File opened for modification C:\Windows\SysWOW64\xswltgox.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File created C:\Windows\SysWOW64\lhspiqaepchcf.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification C:\Windows\SysWOW64\lhspiqaepchcf.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xswltgox.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xswltgox.exe File created C:\Windows\SysWOW64\jvtdiummrzhscow.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File created C:\Windows\SysWOW64\wmjllniuyj.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File opened for modification C:\Windows\SysWOW64\wmjllniuyj.exe 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll wmjllniuyj.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xswltgox.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xswltgox.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xswltgox.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xswltgox.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xswltgox.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xswltgox.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xswltgox.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xswltgox.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification C:\Windows\mydoc.rtf 0ceaf65857d7abd3d0b19c8ed58b4d45.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xswltgox.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xswltgox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wmjllniuyj.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0816BB2FE6A22DBD173D1A68B7D9063" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat wmjllniuyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc wmjllniuyj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1944C7081596DBC0B8BE7CE3EC9734CC" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf wmjllniuyj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" wmjllniuyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg wmjllniuyj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" wmjllniuyj.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32442C0C9C2383536A3076A5702F2DDB7C8764AA" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFF8F4F5A826A9131D65F7D94BD93E6325944674F6346D7E9" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wmjllniuyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh wmjllniuyj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wmjllniuyj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFF9C9FE10F1E283793A44869639E3B38D03FE4360023AE1CD42EF09D4" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B029449039EE52CABAD5329AD4CE" 0ceaf65857d7abd3d0b19c8ed58b4d45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" wmjllniuyj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs wmjllniuyj.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3060 WINWORD.EXE 3060 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 4316 xswltgox.exe 4316 xswltgox.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 2452 xswltgox.exe 3948 lhspiqaepchcf.exe 2452 xswltgox.exe 2452 xswltgox.exe 4316 xswltgox.exe 4316 xswltgox.exe 4316 xswltgox.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 1500 wmjllniuyj.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3928 jvtdiummrzhscow.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 3948 lhspiqaepchcf.exe 2452 xswltgox.exe 2452 xswltgox.exe 2452 xswltgox.exe 4316 xswltgox.exe 4316 xswltgox.exe 4316 xswltgox.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE 3060 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1500 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 26 PID 1332 wrote to memory of 1500 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 26 PID 1332 wrote to memory of 1500 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 26 PID 1332 wrote to memory of 3928 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 25 PID 1332 wrote to memory of 3928 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 25 PID 1332 wrote to memory of 3928 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 25 PID 1332 wrote to memory of 2452 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 23 PID 1332 wrote to memory of 2452 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 23 PID 1332 wrote to memory of 2452 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 23 PID 1332 wrote to memory of 3948 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 18 PID 1332 wrote to memory of 3948 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 18 PID 1332 wrote to memory of 3948 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 18 PID 1332 wrote to memory of 3060 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 19 PID 1332 wrote to memory of 3060 1332 0ceaf65857d7abd3d0b19c8ed58b4d45.exe 19 PID 1500 wrote to memory of 4316 1500 wmjllniuyj.exe 21 PID 1500 wrote to memory of 4316 1500 wmjllniuyj.exe 21 PID 1500 wrote to memory of 4316 1500 wmjllniuyj.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ceaf65857d7abd3d0b19c8ed58b4d45.exe"C:\Users\Admin\AppData\Local\Temp\0ceaf65857d7abd3d0b19c8ed58b4d45.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\lhspiqaepchcf.exelhspiqaepchcf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3948
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Windows\SysWOW64\xswltgox.exexswltgox.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2452
-
-
C:\Windows\SysWOW64\jvtdiummrzhscow.exejvtdiummrzhscow.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3928
-
-
C:\Windows\SysWOW64\wmjllniuyj.exewmjllniuyj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1500
-
-
C:\Windows\SysWOW64\xswltgox.exeC:\Windows\system32\xswltgox.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
461KB
MD58070260446043f8660b7599a0df23296
SHA122becaf5969504fd352dcd2d1df5c0f6b3843b53
SHA2563d81d0a11948652cb565038bd588ad910039224003ba884d81d5d76c0191daa2
SHA5129ab3c0d8bfc0afaf97b964fd6da051726819595b63d7004561ac9fa80c6ae2dcbbe2323ccb9e7f2994e58f53e041e21926243b370b050eba874eee49fb4448f6
-
Filesize
447KB
MD5015667467cb4c4ec965e527dc5ec7274
SHA179c1f8db05588d6a11e77c5f1c79c32011fbeb69
SHA256ec590b0a27e90dcc0dfb374ec59452d68e9f8e1eaefd5c97b5b2e54fed69c859
SHA512cccbd83799a73f580b737f2c6916c977921fa58697f35f58b44e716c7b200ea83fc0d9e3f82fbe603b32c5219c7aaa8740de4d29750e03887478f86001f6cad6
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5506014e5cddd2202b8f7ebe29cf91677
SHA139274ea14c8797c8bf3349b4c70b5f1b1eebcc8d
SHA25699786df150f87f071dc465d305fe2f675cf0c2d293590af9d70c4758a3a4674d
SHA512c67abc5f19766fdea4e97239e3b2535d37ff9865aaf7183c3361077c42d0d7720cd31b96a30e9a5f88d4fe3b37146a8fdaa54857177593cb30a34d7b61cc73b3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD55462cbce596b452c35c6cdc0be6c6e0a
SHA10e3b82b6fdeef34bbc74503fdad0eb7af1dcd33f
SHA256ff05736fc0f39f9f4a73ced9527dbbb16a293720ad711055a976425fd10a99ee
SHA512dce9520743059ed2632374710af32249ab7f53c54eb9818228bdf97a73ef6d62a3d1677c6d1f7d8ed956d229240e0fb025c1c294d15486923d77299e5d692953
-
Filesize
12KB
MD563e92bda69237f813e01f6c659e9ffe5
SHA1f093fc21d532e51b4ac8ac19646a7693a5973331
SHA256227463fb9b915c509106507cdf8afc0b105f2117a7c9c867beb3efca71ba35d8
SHA512b95d684c808f9e9383428c3f9e360e40c637ee2920346280ecdeaead5f744a2d7373d9c79e3121fb2525d9a579d782046c9f0d090ce1b464e765f4b31a0705b9
-
Filesize
87KB
MD5987548ddedc3154b3db3e10adab07d53
SHA1c81c62958d31f05a34f262581de31e13ed178370
SHA256f14aeb2b7592fef5c4eb1f4a5687175a9b9271c0f2b5db8cbe96f0142708431d
SHA5125362253151708f80aa06f40441acf46073392104e630a1d169dfe68760fcef43ddd555a339a995935d5dfa4b1292b391d6351419cf340a6e8e1fb3678f5c22b8
-
Filesize
3KB
MD5ccaefe72fccd2bcef5c3767af5175d5b
SHA1bc20e0801c1f1fea2410c86b9c00a9d8c96acdc7
SHA256b6983674c0c33edc1bebb073635857da4eef2cfce8a908ed835626c7cd34286e
SHA512f36e84ef287a03a0df857fe152b2cfe456f3d7d5f31dd8c9f1f7fb889f2af2539b11703f991530bb3dd5dbf67261eee46e7e51acaa3ab4e887395e75d309089a
-
Filesize
33KB
MD5abab6f3a2a63876087d12e46b110a235
SHA19c4447c132160202f7edf99c8d166b9094901ff0
SHA256fa29736ab998ec1f48e32ae24de9d63d9a700033fe3a05c2a3a6650680cf8778
SHA512a35d6e106890abbe411ae4a6c1d1d01d6e72189d4a6dfe1e95112b3974bcbab3c95276c7a18163098edd053a99d5980961aeaf25ac3cdc2e61adcca35259972a
-
Filesize
9KB
MD54fc938d977a5c28db85103a49f51992e
SHA11aa5fe5328e9f71152b6172c5245ecd3fb352ca2
SHA2560fdc90765506cfc5d04162173f157d2944ea279090dc2f94b2a378bba2feeb3c
SHA5120f704b04173d1dc9bdec8e8e5d6d745b29e2fb067b9f38e0eedea03201ffa6645dd0ae6b1a747ba56b09b733d76ef96e7d584e16ebdd197910b6b4bc28c2d81e
-
Filesize
4KB
MD5803b224565d303017e5832f92b7b4ce8
SHA178a33ddd089d5265dd91be951deebc8e19f992a3
SHA256a9fdb72dba1e2c28457fd8df3956015cb2eb7149d62eb164e14c278c8246a41e
SHA51283141b7dbc9388e43f3239195fd03c2f0fa8386424f29db9810fb4d24831adfed7b6e9137cade95ab052d3bb7e1ea6ce4100b1c06558390131baed6dbc4097c4
-
Filesize
10KB
MD5a75d6f6bc86cce841a484a0711b4acf3
SHA1296b1be36950696f856af0841e3ba62bd7f18f6b
SHA256ff452d604a214fcde37b1e9fec6ca5a78cdd4dd8b34beb3e5684c263d4dc474c
SHA5127f68633706db339b6ba2eb9eef2d6a5fccd57b750d4bf30530283f03142899d127043d7b60895c648171c745a6ae0428d06174ab21737413e9887743be27a8c9
-
Filesize
1KB
MD5ec89629d437c17787acc7061c89e753c
SHA1c65089b32eba1cf75d3546335718073460c971f9
SHA25687b17909878537f2c3d3bc046f54b9eb382e312fa75d2b177457a978dcc7d83c
SHA51265f02cc30b64e2c33d7287c135bc0bb20abe1e35c7176a03e47403db3e21da28f7e7ec7a13ef748aeb76ac06e5e159a9b4e62196692c3411459a4ae235a1bec9
-
Filesize
13KB
MD5075ac05d5e883e704c7c7e7230c4b083
SHA1b3d3d9e424988b350af1652b81421b8e3688144b
SHA2561c7153973465f9a4a16a88e73e9c6243640646aa3267a2d8b352c6d375a708a1
SHA5125f400658adebd50503ef1608393cd5a1d5d4812f84395e70f2318a7c61f74c2d7545c5adae60f9c94d8e7585909aa7b351ba6161eae87cead4bddae7551c0fc0
-
Filesize
48KB
MD500258d80e6b81a30b695a6a0bd50bb98
SHA182cb186d3b70e990a56e7d4b479752084ea5a539
SHA2569873af51fe291accc91772eabb1210a3fe2a6f17818aaf4c75561d9f13599f79
SHA51296b315f031ed4f82ea00d53cee25a4643225efd09877d7380dc86ff24719a50e62267c9e4f60797e22ed672e314a9ff497c31ee164c0537262c71e52a09a9afd
-
Filesize
17KB
MD59908decb035bc4391319c4e223eecda4
SHA124222d9fbe4a2cd90cc8bd4902c28fd15c3136cb
SHA25632f929c476bae1aee0e917e84704e1bf005e4a84af5d93d837481c5da6eeffda
SHA512d91afbcbd72ebb038ed9411d2a9c983f798cba4f1470c47b33c6af5f89b12b5dbaaf887d0f3ede21e8914b512dde4ebab09f9ea54b7e54d451d800e7dc94f224
-
Filesize
19KB
MD5139b7d5bbec18f5ba616ac291baa3ca4
SHA121584c82cdbdc4f74b27a7147fb8b788d4e14510
SHA256f45cbf7beec1789dd46784ac7c029d78b948ebecff4bba8ebe77d91d48aa1c0a
SHA5128748034af4b690e5e2f4331bf77a1136386b159545bc72d97a6c9e6374c06ef9d7511532c827ba7286ff6526f1f8376055f9cf292ac5db96011bf29969b37738
-
Filesize
7KB
MD547195ee9b17c37a4a199cc22336361e1
SHA15432117f3e6e80d866decc62cf56ba107199cf37
SHA2562daafda15ab03b0b50d27be7b2f3ecce934310e031aa9d3e0b6df0309d6c2654
SHA51259a637a2ca5825a9bda3a322311bfb8507616e875065daa4a52a5d453dffdfc4e5f554ecd5548f0a153a02083e985d15e92986fb37eeaca45be0f7bacb638a50
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
42KB
MD5d308290087571879044718368bcfb262
SHA128e8531efd9f1c9a7f31f0ce2db1a9b97834777f
SHA256d2d8d61dd1d50b1130025079206813a07563dc376c710ec95311a3a251d8e9bb
SHA512e49cc87dff457c336aa214ab343883109eb381dc2c8f680bbcb0dfb000a1bf6154ec9e83ca2b9e5722b3a7f89c90d19574a9f2d527a662b252b4bb25728edfb9
-
Filesize
33KB
MD5f8567df817d4887dc91cf71f4235315c
SHA1d7e26967ae15815e8d8232f82ff543ecf873ee79
SHA2562fb1824accfaec47c0ca25777a3ec1198a070bb8b347f34bc940544e959ac091
SHA51212d942740883133f0a12e825560bb5c9656151b5c2bd01adb1c225fbedfd5af1a60166770f70d6aabbff5218c8841304030cf94f696263bbd836cb46e4f335a6
-
Filesize
45KB
MD5818d3a11ad59b2e9eb043f8b5e5540ef
SHA119e7c752cb10402c4ea8d77229a3e7191c175ef8
SHA2561c844272f5ff7f732e436f6192f8e4409ac70203ff25570a78ec8339da715abf
SHA5128aa9f3b51a1b864a02fc978b6402ebaa2f50105807a7dbf19d1655d9d1575d32dcf85d53d057a02058800b4bd28989e2ea70ca4e6ae26329ddb4a6907e7869df