Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
17ddb4edf577c9143cab458936f7fa04.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
17ddb4edf577c9143cab458936f7fa04.exe
Resource
win10v2004-20231215-en
General
-
Target
17ddb4edf577c9143cab458936f7fa04.exe
-
Size
512KB
-
MD5
17ddb4edf577c9143cab458936f7fa04
-
SHA1
3fcb06b9c98fe4d8aa4778c33a76353bcbf2af15
-
SHA256
0f65f212348cc045f8cdd39ac4a2a63f626841eb02e7c50bd73b62567befcc3d
-
SHA512
bfa99ecad681a5360ec3f2083b9640329a7d7f849173fa4d6c12f2526f9da29dc1dd9ce672f8e3c3cdd4b096559c9eb5f17187a9a2e8ed587c313437ce063a34
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm59
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" kcsjscwoer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kcsjscwoer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" kcsjscwoer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" kcsjscwoer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 17ddb4edf577c9143cab458936f7fa04.exe -
Executes dropped EXE 5 IoCs
pid Process 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 2408 xksqrkeg.exe 2316 qqcabbbsaiehv.exe 824 xksqrkeg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" kcsjscwoer.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wyulnowu = "kcsjscwoer.exe" nrukxlcjxzqgagx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zppmvkcb = "nrukxlcjxzqgagx.exe" nrukxlcjxzqgagx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qqcabbbsaiehv.exe" nrukxlcjxzqgagx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\v: kcsjscwoer.exe File opened (read-only) \??\w: kcsjscwoer.exe File opened (read-only) \??\r: xksqrkeg.exe File opened (read-only) \??\m: xksqrkeg.exe File opened (read-only) \??\t: xksqrkeg.exe File opened (read-only) \??\z: kcsjscwoer.exe File opened (read-only) \??\a: xksqrkeg.exe File opened (read-only) \??\a: xksqrkeg.exe File opened (read-only) \??\n: xksqrkeg.exe File opened (read-only) \??\u: xksqrkeg.exe File opened (read-only) \??\h: xksqrkeg.exe File opened (read-only) \??\l: xksqrkeg.exe File opened (read-only) \??\j: kcsjscwoer.exe File opened (read-only) \??\r: kcsjscwoer.exe File opened (read-only) \??\t: kcsjscwoer.exe File opened (read-only) \??\i: xksqrkeg.exe File opened (read-only) \??\m: xksqrkeg.exe File opened (read-only) \??\k: kcsjscwoer.exe File opened (read-only) \??\m: kcsjscwoer.exe File opened (read-only) \??\n: xksqrkeg.exe File opened (read-only) \??\o: kcsjscwoer.exe File opened (read-only) \??\y: kcsjscwoer.exe File opened (read-only) \??\p: xksqrkeg.exe File opened (read-only) \??\i: kcsjscwoer.exe File opened (read-only) \??\g: xksqrkeg.exe File opened (read-only) \??\k: xksqrkeg.exe File opened (read-only) \??\v: xksqrkeg.exe File opened (read-only) \??\q: xksqrkeg.exe File opened (read-only) \??\r: xksqrkeg.exe File opened (read-only) \??\e: kcsjscwoer.exe File opened (read-only) \??\j: xksqrkeg.exe File opened (read-only) \??\o: xksqrkeg.exe File opened (read-only) \??\v: xksqrkeg.exe File opened (read-only) \??\n: kcsjscwoer.exe File opened (read-only) \??\h: xksqrkeg.exe File opened (read-only) \??\w: xksqrkeg.exe File opened (read-only) \??\x: xksqrkeg.exe File opened (read-only) \??\h: kcsjscwoer.exe File opened (read-only) \??\l: xksqrkeg.exe File opened (read-only) \??\z: xksqrkeg.exe File opened (read-only) \??\p: kcsjscwoer.exe File opened (read-only) \??\q: kcsjscwoer.exe File opened (read-only) \??\b: xksqrkeg.exe File opened (read-only) \??\q: xksqrkeg.exe File opened (read-only) \??\b: xksqrkeg.exe File opened (read-only) \??\e: xksqrkeg.exe File opened (read-only) \??\k: xksqrkeg.exe File opened (read-only) \??\u: kcsjscwoer.exe File opened (read-only) \??\g: xksqrkeg.exe File opened (read-only) \??\a: kcsjscwoer.exe File opened (read-only) \??\x: kcsjscwoer.exe File opened (read-only) \??\o: xksqrkeg.exe File opened (read-only) \??\t: xksqrkeg.exe File opened (read-only) \??\y: xksqrkeg.exe File opened (read-only) \??\s: xksqrkeg.exe File opened (read-only) \??\y: xksqrkeg.exe File opened (read-only) \??\z: xksqrkeg.exe File opened (read-only) \??\s: xksqrkeg.exe File opened (read-only) \??\i: xksqrkeg.exe File opened (read-only) \??\p: xksqrkeg.exe File opened (read-only) \??\b: kcsjscwoer.exe File opened (read-only) \??\l: kcsjscwoer.exe File opened (read-only) \??\j: xksqrkeg.exe File opened (read-only) \??\w: xksqrkeg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" kcsjscwoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" kcsjscwoer.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1708-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0006000000023223-5.dat autoit_exe behavioral2/files/0x0006000000023225-31.dat autoit_exe behavioral2/files/0x0006000000023225-32.dat autoit_exe behavioral2/files/0x0006000000023224-27.dat autoit_exe behavioral2/files/0x00050000000006e9-18.dat autoit_exe behavioral2/files/0x00090000000231b1-93.dat autoit_exe behavioral2/files/0x000700000002323d-114.dat autoit_exe behavioral2/files/0x000700000002323d-123.dat autoit_exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xksqrkeg.exe 17ddb4edf577c9143cab458936f7fa04.exe File created C:\Windows\SysWOW64\qqcabbbsaiehv.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\qqcabbbsaiehv.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll kcsjscwoer.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xksqrkeg.exe File created C:\Windows\SysWOW64\nrukxlcjxzqgagx.exe 17ddb4edf577c9143cab458936f7fa04.exe File created C:\Windows\SysWOW64\xksqrkeg.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\nrukxlcjxzqgagx.exe 17ddb4edf577c9143cab458936f7fa04.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xksqrkeg.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe xksqrkeg.exe File created C:\Windows\SysWOW64\kcsjscwoer.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\kcsjscwoer.exe 17ddb4edf577c9143cab458936f7fa04.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xksqrkeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xksqrkeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xksqrkeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xksqrkeg.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xksqrkeg.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe xksqrkeg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe xksqrkeg.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xksqrkeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xksqrkeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xksqrkeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xksqrkeg.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xksqrkeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe xksqrkeg.exe File opened for modification C:\Windows\mydoc.rtf 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xksqrkeg.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe xksqrkeg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B121449438E352CCBAA032E9D7BE" 17ddb4edf577c9143cab458936f7fa04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC70E14E2DAB6B9B97C94EDE434CB" 17ddb4edf577c9143cab458936f7fa04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf kcsjscwoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs kcsjscwoer.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 17ddb4edf577c9143cab458936f7fa04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBF9CDFE13F19284783B36869839E2B3FE03FE4269033EE1CF42E709A2" 17ddb4edf577c9143cab458936f7fa04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FCF9485A85699141D75A7D97BCEEE133593767426336D6E9" 17ddb4edf577c9143cab458936f7fa04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" kcsjscwoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" kcsjscwoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh kcsjscwoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc kcsjscwoer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" kcsjscwoer.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings 17ddb4edf577c9143cab458936f7fa04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33332C7B9D5183556D3F76D377212CAA7DF465DB" 17ddb4edf577c9143cab458936f7fa04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F668C3FF1821ABD27ED0A18B7E9016" 17ddb4edf577c9143cab458936f7fa04.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4468 WINWORD.EXE 4468 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 4956 kcsjscwoer.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 4956 kcsjscwoer.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 1092 nrukxlcjxzqgagx.exe 1092 nrukxlcjxzqgagx.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 824 xksqrkeg.exe 824 xksqrkeg.exe 824 xksqrkeg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1708 17ddb4edf577c9143cab458936f7fa04.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 1092 nrukxlcjxzqgagx.exe 4956 kcsjscwoer.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2408 xksqrkeg.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 2316 qqcabbbsaiehv.exe 824 xksqrkeg.exe 824 xksqrkeg.exe 824 xksqrkeg.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE 4468 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1708 wrote to memory of 4956 1708 17ddb4edf577c9143cab458936f7fa04.exe 88 PID 1708 wrote to memory of 4956 1708 17ddb4edf577c9143cab458936f7fa04.exe 88 PID 1708 wrote to memory of 4956 1708 17ddb4edf577c9143cab458936f7fa04.exe 88 PID 1708 wrote to memory of 1092 1708 17ddb4edf577c9143cab458936f7fa04.exe 93 PID 1708 wrote to memory of 1092 1708 17ddb4edf577c9143cab458936f7fa04.exe 93 PID 1708 wrote to memory of 1092 1708 17ddb4edf577c9143cab458936f7fa04.exe 93 PID 1708 wrote to memory of 2408 1708 17ddb4edf577c9143cab458936f7fa04.exe 89 PID 1708 wrote to memory of 2408 1708 17ddb4edf577c9143cab458936f7fa04.exe 89 PID 1708 wrote to memory of 2408 1708 17ddb4edf577c9143cab458936f7fa04.exe 89 PID 1708 wrote to memory of 2316 1708 17ddb4edf577c9143cab458936f7fa04.exe 91 PID 1708 wrote to memory of 2316 1708 17ddb4edf577c9143cab458936f7fa04.exe 91 PID 1708 wrote to memory of 2316 1708 17ddb4edf577c9143cab458936f7fa04.exe 91 PID 1708 wrote to memory of 4468 1708 17ddb4edf577c9143cab458936f7fa04.exe 92 PID 1708 wrote to memory of 4468 1708 17ddb4edf577c9143cab458936f7fa04.exe 92 PID 4956 wrote to memory of 824 4956 kcsjscwoer.exe 97 PID 4956 wrote to memory of 824 4956 kcsjscwoer.exe 97 PID 4956 wrote to memory of 824 4956 kcsjscwoer.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe"C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\kcsjscwoer.exekcsjscwoer.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\xksqrkeg.exeC:\Windows\system32\xksqrkeg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:824
-
-
-
C:\Windows\SysWOW64\xksqrkeg.exexksqrkeg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2408
-
-
C:\Windows\SysWOW64\qqcabbbsaiehv.exeqqcabbbsaiehv.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2316
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4468
-
-
C:\Windows\SysWOW64\nrukxlcjxzqgagx.exenrukxlcjxzqgagx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD54517a475f6bcd0159d12f2ae37e0a095
SHA111ab63569afe4fe9a113cd6c2f9cc8363aec118b
SHA2566e8eddb42c66dea60d54bee0b8917b895ed289d03edb21559b471d5f4b4789e6
SHA51242170c7a4379d38c093d67b423ab37f1ad727b3105a40d4859261feae9743b6cbbf36961b08e74fe6afcf4eeff443b148b491307c2aca2eb1824babdd7751645
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD53733cbbe2aaee4d9ec8f20a61bf929b8
SHA1d9fd2cc1f03e93c5911c203a783e7ee3a64f777d
SHA256d991ae34dfd98fe90c1dcddd25f13b38b63207891ab3c82b09cc4c481cf94eaf
SHA512f6fa8e6c7accaab570737efdfc873e1b56a34fb7130eeea16461ea91fcf7fd9dc79a27c50c7d18d695d82c94e924a9e7d761d07767df37efab792af2f7918881
-
Filesize
16KB
MD553e4ab73f7f23d07266b20bea5611268
SHA15ef61e6bcdd506b441f4c88cb0b32a5331d3deea
SHA25663ac4cb63d0b0fcf18af61f7bfc41948bc86cb0b8162b5d024a2a2e2f9a0b043
SHA5120d013481966eb856c7c38de5789bb3878e0bd4ba60c5fd3cd576a9194a64415867a54a7bb8726298b843decaf86214a544281ad7aaefed64bc0f8bd8e89eca46
-
Filesize
512KB
MD5086958a9c8a3941a71ca41042e7c137d
SHA15ab0a7709eeff3b3bbe0b48c8e3bfc6a074ea66d
SHA256740c2106ba315dc7629214efde87eabe8476ca212ad4c144ed6998ab38306260
SHA5129f33bd96485d5855cea885d4657c3d568b2814d3f6f54cf637f162a7ad01067a084a681124d01cc8d0628088c1a0de9cfaa26a6422b6e2a37899beb971147cda
-
Filesize
512KB
MD5da732ef59aeedfb1127962aa3d5380fb
SHA1d017ef1a3aef76d20e0f55d6ee3c801aebde9b83
SHA25607cbb5fff623feb4fc0426563b072f7d9c2576edaa5359c85b7665cc2c0fd6ae
SHA512c57d8f22cb6e49174e90083a3ac58cf9605ea40b60908c6d732a704f8afb8b3b430a9bc954ccdb01d2611db4ee2943e6b5b9e3b30d92dfcf733efd5700252596
-
Filesize
512KB
MD56263d0282823b427054be7954696192d
SHA1b7f9ced05758e195a3b324a2ec1c44319993ea39
SHA2567909cbc5bdc723e90ce81ae83f7e45f96f0e5a7f2c8eb8f32652c37f6563f568
SHA51223ede786d9c7a4816520a1384643d437092d7240341d675f401d8140e1ea7e5e2398a01cedb827f9ed8b37c69ba6ecf1b479d6ef3965af832a73b6a243d93c0f
-
Filesize
365KB
MD5abc1bc9d6f80300c404beca6b7fda5fd
SHA141db2a5271d885eff861b03fd64094c1bb6d349d
SHA25657e1af3152f4863a5930d905c1ecdb47de5bd6e2aa98284bf23a6f99cbdd0dc6
SHA51230b547d67bf03e8338c9d76996fd9a25db48d3c292e742ed2b3864461bd20bb76bb167830f0649e5b61068f0e4994623096e917e270dd596e414619937706c31
-
Filesize
512KB
MD50b8455927e57369f859bcbbea515542d
SHA15f5214fbc38330edc8907f4e8ff62da64f0dc38c
SHA25615ef645776a4df8d5565e01d99c92e81af4cc137d8cdebe05f5267b669ea7397
SHA51237a3ba10aa691ddfd6e8ce517b9b18b393d04218ae48d7ae64d2845191ac9f3261c1ab6c855087728e4ec8423969d5dd1bc8b1f2db4587450911692477639f0e
-
Filesize
152KB
MD5bac1439a35feb1f91e2e74c05c4150db
SHA1e105c50524f5acb1457c4b67a8348897f18ffcc5
SHA256028c2509d2743e26bc414331a2e6b1aed3d5f51f94a690a211d03bd563636749
SHA512e660baf725c99f4a69ea7847d6be8af0556ef054e58eed5eae984a47cdb6df299b7e2bea9c2e946fd277e0b7fdfee23d4b75eddb8ecbfc09862c8356e680f7ab
-
Filesize
155KB
MD5b12d175e24740380b995435146402786
SHA1b59db0debfcd65ad1f47affbc9f225fa6ccdba3d
SHA256ac6b8680ad3d764c93be19760314d01a3f9f47c9d6e0b4ea345eeeb483e96694
SHA512273579ad2d233e9dfd71240af486510013fae9601a0197d41c880ad1fe8b5a8661fca3770f45ecaffbf1fc16b565cd89cf39969fed9589e7f5341fab2a61e77c