Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
5397924660b1303ae18b98574737138c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5397924660b1303ae18b98574737138c.exe
Resource
win10v2004-20231215-en
General
-
Target
5397924660b1303ae18b98574737138c.exe
-
Size
512KB
-
MD5
5397924660b1303ae18b98574737138c
-
SHA1
2810380a2f4a9740154124b818ce99194104d8d0
-
SHA256
f1ee0894cbd512511beff6769544b0352496542a2ce369debfbd0ec6eb26c751
-
SHA512
b8cd82e122c95b6dac9fde33a36941d352ff640d09dd59dee87dee4bdf2c8dbaea1ebfd0cb3bfda5348fcfd46a0b94c0187b1d530c403da03cef1908a675b967
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5h
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cnuzavctua.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cnuzavctua.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" cnuzavctua.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cnuzavctua.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 5397924660b1303ae18b98574737138c.exe -
Executes dropped EXE 5 IoCs
pid Process 3548 cnuzavctua.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 2828 ayjvecsnbuvev.exe 4520 jpurkfus.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" cnuzavctua.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hlfxtyzq = "cnuzavctua.exe" yhsilyzdheduvco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\whwbvsep = "yhsilyzdheduvco.exe" yhsilyzdheduvco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ayjvecsnbuvev.exe" yhsilyzdheduvco.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: jpurkfus.exe File opened (read-only) \??\z: jpurkfus.exe File opened (read-only) \??\g: cnuzavctua.exe File opened (read-only) \??\k: cnuzavctua.exe File opened (read-only) \??\a: jpurkfus.exe File opened (read-only) \??\e: jpurkfus.exe File opened (read-only) \??\q: jpurkfus.exe File opened (read-only) \??\s: cnuzavctua.exe File opened (read-only) \??\t: cnuzavctua.exe File opened (read-only) \??\q: jpurkfus.exe File opened (read-only) \??\r: jpurkfus.exe File opened (read-only) \??\w: jpurkfus.exe File opened (read-only) \??\x: jpurkfus.exe File opened (read-only) \??\k: jpurkfus.exe File opened (read-only) \??\s: jpurkfus.exe File opened (read-only) \??\h: jpurkfus.exe File opened (read-only) \??\y: jpurkfus.exe File opened (read-only) \??\j: cnuzavctua.exe File opened (read-only) \??\z: cnuzavctua.exe File opened (read-only) \??\n: jpurkfus.exe File opened (read-only) \??\w: cnuzavctua.exe File opened (read-only) \??\j: jpurkfus.exe File opened (read-only) \??\v: jpurkfus.exe File opened (read-only) \??\b: jpurkfus.exe File opened (read-only) \??\m: jpurkfus.exe File opened (read-only) \??\h: cnuzavctua.exe File opened (read-only) \??\l: cnuzavctua.exe File opened (read-only) \??\q: cnuzavctua.exe File opened (read-only) \??\b: jpurkfus.exe File opened (read-only) \??\u: jpurkfus.exe File opened (read-only) \??\o: jpurkfus.exe File opened (read-only) \??\u: jpurkfus.exe File opened (read-only) \??\x: jpurkfus.exe File opened (read-only) \??\g: jpurkfus.exe File opened (read-only) \??\m: jpurkfus.exe File opened (read-only) \??\a: jpurkfus.exe File opened (read-only) \??\i: jpurkfus.exe File opened (read-only) \??\k: jpurkfus.exe File opened (read-only) \??\n: jpurkfus.exe File opened (read-only) \??\r: jpurkfus.exe File opened (read-only) \??\v: jpurkfus.exe File opened (read-only) \??\z: jpurkfus.exe File opened (read-only) \??\n: cnuzavctua.exe File opened (read-only) \??\h: jpurkfus.exe File opened (read-only) \??\i: jpurkfus.exe File opened (read-only) \??\o: jpurkfus.exe File opened (read-only) \??\t: jpurkfus.exe File opened (read-only) \??\s: jpurkfus.exe File opened (read-only) \??\u: cnuzavctua.exe File opened (read-only) \??\e: jpurkfus.exe File opened (read-only) \??\l: jpurkfus.exe File opened (read-only) \??\w: jpurkfus.exe File opened (read-only) \??\b: cnuzavctua.exe File opened (read-only) \??\e: cnuzavctua.exe File opened (read-only) \??\p: jpurkfus.exe File opened (read-only) \??\m: cnuzavctua.exe File opened (read-only) \??\p: cnuzavctua.exe File opened (read-only) \??\r: cnuzavctua.exe File opened (read-only) \??\y: jpurkfus.exe File opened (read-only) \??\i: cnuzavctua.exe File opened (read-only) \??\x: cnuzavctua.exe File opened (read-only) \??\y: cnuzavctua.exe File opened (read-only) \??\g: jpurkfus.exe File opened (read-only) \??\j: jpurkfus.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" cnuzavctua.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" cnuzavctua.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4604-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x000900000002320b-5.dat autoit_exe behavioral2/files/0x0008000000023216-28.dat autoit_exe behavioral2/files/0x0006000000023224-31.dat autoit_exe behavioral2/files/0x0006000000023224-30.dat autoit_exe behavioral2/files/0x000900000002320b-24.dat autoit_exe behavioral2/files/0x000900000002320b-23.dat autoit_exe behavioral2/files/0x000300000001f45f-19.dat autoit_exe behavioral2/files/0x000300000001f45f-18.dat autoit_exe behavioral2/files/0x0009000000000753-92.dat autoit_exe behavioral2/files/0x0009000000023238-96.dat autoit_exe behavioral2/files/0x0009000000023238-99.dat autoit_exe -
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll cnuzavctua.exe File created C:\Windows\SysWOW64\cnuzavctua.exe 5397924660b1303ae18b98574737138c.exe File opened for modification C:\Windows\SysWOW64\yhsilyzdheduvco.exe 5397924660b1303ae18b98574737138c.exe File created C:\Windows\SysWOW64\jpurkfus.exe 5397924660b1303ae18b98574737138c.exe File opened for modification C:\Windows\SysWOW64\cnuzavctua.exe 5397924660b1303ae18b98574737138c.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification C:\Windows\SysWOW64\ayjvecsnbuvev.exe 5397924660b1303ae18b98574737138c.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe jpurkfus.exe File created C:\Windows\SysWOW64\yhsilyzdheduvco.exe 5397924660b1303ae18b98574737138c.exe File opened for modification C:\Windows\SysWOW64\jpurkfus.exe 5397924660b1303ae18b98574737138c.exe File created C:\Windows\SysWOW64\ayjvecsnbuvev.exe 5397924660b1303ae18b98574737138c.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jpurkfus.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jpurkfus.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jpurkfus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal jpurkfus.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jpurkfus.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe jpurkfus.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jpurkfus.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe jpurkfus.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification C:\Windows\mydoc.rtf 5397924660b1303ae18b98574737138c.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe jpurkfus.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe jpurkfus.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe jpurkfus.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe jpurkfus.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33402C769D2C82556A4677D670252DDA7CF464D8" 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7866BB9FE1D22D0D10FD1A78B08906B" 5397924660b1303ae18b98574737138c.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings 5397924660b1303ae18b98574737138c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs cnuzavctua.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" cnuzavctua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf cnuzavctua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat cnuzavctua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC1B02A4492389953C5BAD433E9D4C5" 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FC8E482A8268913DD75D7E96BDE3E130584266416344D6E9" 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193EC67914E5DAC0B9B97FE7EDE237C9" 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" cnuzavctua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BBCFABCFE11F190837C3A3181EA3995B0FE02F14313023CE2C8429C08A5" 5397924660b1303ae18b98574737138c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" cnuzavctua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc cnuzavctua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" cnuzavctua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cnuzavctua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg cnuzavctua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" cnuzavctua.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh cnuzavctua.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4600 WINWORD.EXE 4600 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3548 cnuzavctua.exe 3884 yhsilyzdheduvco.exe 3884 yhsilyzdheduvco.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 3448 jpurkfus.exe 3448 jpurkfus.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 3448 jpurkfus.exe 3448 jpurkfus.exe 3448 jpurkfus.exe 3448 jpurkfus.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 3448 jpurkfus.exe 3448 jpurkfus.exe 2828 ayjvecsnbuvev.exe 2828 ayjvecsnbuvev.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 4604 5397924660b1303ae18b98574737138c.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 3884 yhsilyzdheduvco.exe 3448 jpurkfus.exe 3548 cnuzavctua.exe 2828 ayjvecsnbuvev.exe 4520 jpurkfus.exe 4520 jpurkfus.exe 4520 jpurkfus.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4600 WINWORD.EXE 4600 WINWORD.EXE 4600 WINWORD.EXE 4600 WINWORD.EXE 4600 WINWORD.EXE 4600 WINWORD.EXE 4600 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3548 4604 5397924660b1303ae18b98574737138c.exe 94 PID 4604 wrote to memory of 3548 4604 5397924660b1303ae18b98574737138c.exe 94 PID 4604 wrote to memory of 3548 4604 5397924660b1303ae18b98574737138c.exe 94 PID 4604 wrote to memory of 3884 4604 5397924660b1303ae18b98574737138c.exe 101 PID 4604 wrote to memory of 3884 4604 5397924660b1303ae18b98574737138c.exe 101 PID 4604 wrote to memory of 3884 4604 5397924660b1303ae18b98574737138c.exe 101 PID 4604 wrote to memory of 3448 4604 5397924660b1303ae18b98574737138c.exe 100 PID 4604 wrote to memory of 3448 4604 5397924660b1303ae18b98574737138c.exe 100 PID 4604 wrote to memory of 3448 4604 5397924660b1303ae18b98574737138c.exe 100 PID 4604 wrote to memory of 2828 4604 5397924660b1303ae18b98574737138c.exe 95 PID 4604 wrote to memory of 2828 4604 5397924660b1303ae18b98574737138c.exe 95 PID 4604 wrote to memory of 2828 4604 5397924660b1303ae18b98574737138c.exe 95 PID 4604 wrote to memory of 4600 4604 5397924660b1303ae18b98574737138c.exe 96 PID 4604 wrote to memory of 4600 4604 5397924660b1303ae18b98574737138c.exe 96 PID 3548 wrote to memory of 4520 3548 cnuzavctua.exe 98 PID 3548 wrote to memory of 4520 3548 cnuzavctua.exe 98 PID 3548 wrote to memory of 4520 3548 cnuzavctua.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5397924660b1303ae18b98574737138c.exe"C:\Users\Admin\AppData\Local\Temp\5397924660b1303ae18b98574737138c.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cnuzavctua.execnuzavctua.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\jpurkfus.exeC:\Windows\system32\jpurkfus.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4520
-
-
-
C:\Windows\SysWOW64\ayjvecsnbuvev.exeayjvecsnbuvev.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2828
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4600
-
-
C:\Windows\SysWOW64\jpurkfus.exejpurkfus.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3448
-
-
C:\Windows\SysWOW64\yhsilyzdheduvco.exeyhsilyzdheduvco.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3884
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5ecb23f81a21a2bb9c5fdebf84bd0a0cd
SHA12e1898f7c8a3182507fcf8c2f374112694655e5d
SHA256d66a7745cc371052fadccdb33e36e1e4d8cbaaa67d94dbdba6f8f433578751b3
SHA512e1f5b3dd370eeb0940a8dd3f497e5b2d0cf353415941d88cd41508fbd627a39f585aa9ba76516cbbfefacfce73f1a7009318a63a884b0462068f9a2d663bf7a7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD59b017eddbcbd4d3157863c50014f8ab6
SHA15ab15549696e02110c8d0cd696346f4653375ebb
SHA256f71ac437c0a233f127739dad55438071ccddc8cfdfddc66179f90f7211a83303
SHA5121f1eaf814d3a5417b25248af5ae1a0a90a62c130baf7958a8eecf88635588e77ec299097556e1f1a14ce6a4be24cae2f21e8228f03bfedff95eb0214f8fa2fdf
-
Filesize
40KB
MD53960bd4d6df704aa19a4f3206c11c6cb
SHA1a5fc2e298e99e551f3286a4afbfc94dabc32a1de
SHA256d4002f53abf3f302747b17052bce5c7123635c11892f1cfa2e3a9d8285ebfedf
SHA512581754f55bfd0dda6ec353f34a57db34396b78536bb2006f0a45fd5d54326f6fcdd26c508979f135175c04628bcb252edd23386ee171e6f9c241560498772a5f
-
Filesize
381KB
MD52700da61118643ddfde8760994390cc6
SHA18f0d62dfb1c82340ea3dd2ca59246adaddf83641
SHA25629ea0cb3e86b688ec05a9770bb4d6c6b6b1178afc8560453578d58b1ec90f4bc
SHA512addff8b94a50191de83ce36c8fbf418049629fa83a999b1aeb02fcf408ff5e9e57846a51acea5f1ae05e84eaece5976e79e253f065882361d65bd5c124d072e3
-
Filesize
381KB
MD530aec9e0b33fbd99234328357879f812
SHA13c9d37139d4ccfe2b694afba9633170d0f510a92
SHA25615aad0daaaeea2f1eb8d19a8999f42844b2885d6bef949f6787feba7dad46563
SHA5122060f2cc8c90181dd0a9965f0ff3a94aece08c82c4a68454846f66778bc60dade3ba5ddc38be57311ff4a7bd78217b89a9cd09837eee4b5d9893277299dad415
-
Filesize
512KB
MD5e7a4f2411b388e7b74896b7cc9b9045d
SHA19941059d0ab215f4f391494caf5e7412106124c9
SHA2568d419e340ab4bea7bbf135d8e6bf26d085cfb27cb084990b3074702833a9d86e
SHA51249604c8ec0eca464b20fae1016ee7335bbdcd33ec132c310a61524b5e68bd95528754a269006dfd605b74693c302ff11dc5812152234680682607395f9c70c9c
-
Filesize
199KB
MD5f16dde398c2a11520a56efa64d2c19fe
SHA1a1ec322e7959e9edccd89688d67aeb8636add878
SHA2564ae9f83d09bbf771bfa1c23d521c8f24c459d4567e68e05417a0084433834659
SHA5123ae02b1889c75392f77780629275b343ec1051376062cb38a2962a639dd788745aaa0dc7063cb439ab21f316a590ab9db00bd217cae0c73acc521d281fe87ca9
-
Filesize
413KB
MD532ebe632698c34115cf4fde2fd26a005
SHA1c86f851ed4702ab1f9b7ecd2de33a3e5bed43cde
SHA2566914003d74626f905a9ee70fe0e84999196aa047576814767321b2fe35ffc490
SHA512cd7584948ddf8c9195ae516a828e0f93a6e149a412e86bb55085cb1fd6f8ad16242e2fbcea6b28a8bc4a09f3db528832aa27c61a1f2648a6aa13f135a8779125
-
Filesize
124KB
MD5de83bfac85a2c62d0cb12eb47652d5dc
SHA11990b0d527e8ea6e7503d0084dced33b9ffce8a6
SHA2565d14fa9e8658105bdf0715b3de050ea871e8b3aceb585810c35435c966aed51c
SHA512fee49bcb9c25cce746b005724afca9832b0b74b422569a441bb521bec8d31bca3f286c599b8822e7926cae1d0866a27215be6baf8b285356cd1a0bdf4f5da51e
-
Filesize
203KB
MD5dd6f7a0b23c0b318985964aea67b1685
SHA16ab6394bd7807a937148b2a8183ad0b8fb31c8d9
SHA256654474f081981616662ab007d338a39b147bc37df8c2d396c2ba39e8931e1427
SHA5122a7b2e96898336256f19844e333a38f925f53f846d6b08332e41d6d4de99f440c5000d2bf73325ab576845e5d4c3decf1c39942fd694304f4c45c75ad70c6578
-
Filesize
512KB
MD5c777aad087bbba38123c32b4be796bf0
SHA1cdf3bed450bc5a3beb6509502fb16f97295c26e0
SHA2565c036524fdccfdfc49862b0d231681133bbb58eac658a2710bbf8fbd8ae02e50
SHA5124c5d3568921db6fff0873b8a58dc92bd93744e068ac93c8eff45b24f114c28cc48c29d1bedf6e28830614fd9766e8111a169ee1af3b8b1383c7f912e6acc8bf7
-
Filesize
87KB
MD5fa7d11c750ca2617045455138ebb35cc
SHA161acd0bfc4761b896c878d3b3c5b8e11858a0bc9
SHA256025242f516e5400ac83014876dd6d1de2de87332374be66f7ce4f8213b0922ee
SHA512a8df5f4752e0d2b29e35560a6c9ea54c23624eacc7c5e719ba78398c0a72070fa9117fcca500e6418ea9a299c0e86d96a27f637c2fba412463834e6e3328bf56
-
Filesize
92KB
MD56662b185f19fbf697c56a25c92de7961
SHA10df0c0df0de3724258df2549c583e3c934aca726
SHA256c11edb9e97848e20319fba876d9382c7193f68323eff1f7ed805bb04303bdc86
SHA512c6e2cb83f68a63ca299dae843d2697d41dab8b565fb4005755b0d255b388779b6c1dad97375009c995f0a3d2e0acb4cc820090ca5dc24ee11e1a3de5b1a4921f