Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 13:11
Static task
static1
Behavioral task
behavioral1
Sample
beb0ce0ae439be0520015a4d5360f26b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
beb0ce0ae439be0520015a4d5360f26b.exe
Resource
win10v2004-20240226-en
General
-
Target
beb0ce0ae439be0520015a4d5360f26b.exe
-
Size
512KB
-
MD5
beb0ce0ae439be0520015a4d5360f26b
-
SHA1
22c23fac685196f5ce36f742542729eebd309445
-
SHA256
b0da068cbcccf587b4f6f6f7fa90e23ef7a7c559b17ca0368463fec8244ef4fe
-
SHA512
16487cca3afe3f5773c76d5c6a81f01d96c32b6fa8522644a928a0b8c5126ab9440594e37dfa723e56bade83b753eb6e9e87e16086e87d65a5df3d0f790b5ef7
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6o:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm51
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cqybplfxkm.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" cqybplfxkm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cqybplfxkm.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cqybplfxkm.exe -
Executes dropped EXE 5 IoCs
pid Process 960 cqybplfxkm.exe 2784 kutuakon.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2724 kutuakon.exe -
Loads dropped DLL 5 IoCs
pid Process 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 960 cqybplfxkm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" cqybplfxkm.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cztlavfvwhmkc.exe" jfdlvdsmixbpymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eozkrbhu = "cqybplfxkm.exe" jfdlvdsmixbpymo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zyegqlod = "jfdlvdsmixbpymo.exe" jfdlvdsmixbpymo.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: cqybplfxkm.exe File opened (read-only) \??\n: cqybplfxkm.exe File opened (read-only) \??\i: kutuakon.exe File opened (read-only) \??\r: kutuakon.exe File opened (read-only) \??\u: kutuakon.exe File opened (read-only) \??\g: kutuakon.exe File opened (read-only) \??\t: kutuakon.exe File opened (read-only) \??\v: kutuakon.exe File opened (read-only) \??\q: cqybplfxkm.exe File opened (read-only) \??\n: kutuakon.exe File opened (read-only) \??\l: kutuakon.exe File opened (read-only) \??\w: kutuakon.exe File opened (read-only) \??\j: cqybplfxkm.exe File opened (read-only) \??\z: kutuakon.exe File opened (read-only) \??\o: kutuakon.exe File opened (read-only) \??\u: kutuakon.exe File opened (read-only) \??\a: kutuakon.exe File opened (read-only) \??\w: kutuakon.exe File opened (read-only) \??\h: kutuakon.exe File opened (read-only) \??\k: cqybplfxkm.exe File opened (read-only) \??\r: cqybplfxkm.exe File opened (read-only) \??\t: kutuakon.exe File opened (read-only) \??\y: kutuakon.exe File opened (read-only) \??\i: kutuakon.exe File opened (read-only) \??\j: kutuakon.exe File opened (read-only) \??\o: kutuakon.exe File opened (read-only) \??\s: kutuakon.exe File opened (read-only) \??\p: kutuakon.exe File opened (read-only) \??\b: kutuakon.exe File opened (read-only) \??\e: kutuakon.exe File opened (read-only) \??\r: kutuakon.exe File opened (read-only) \??\y: cqybplfxkm.exe File opened (read-only) \??\v: kutuakon.exe File opened (read-only) \??\g: kutuakon.exe File opened (read-only) \??\q: kutuakon.exe File opened (read-only) \??\y: kutuakon.exe File opened (read-only) \??\g: cqybplfxkm.exe File opened (read-only) \??\h: cqybplfxkm.exe File opened (read-only) \??\k: kutuakon.exe File opened (read-only) \??\m: kutuakon.exe File opened (read-only) \??\v: cqybplfxkm.exe File opened (read-only) \??\z: cqybplfxkm.exe File opened (read-only) \??\q: kutuakon.exe File opened (read-only) \??\i: cqybplfxkm.exe File opened (read-only) \??\o: cqybplfxkm.exe File opened (read-only) \??\a: cqybplfxkm.exe File opened (read-only) \??\m: cqybplfxkm.exe File opened (read-only) \??\p: kutuakon.exe File opened (read-only) \??\x: kutuakon.exe File opened (read-only) \??\e: kutuakon.exe File opened (read-only) \??\s: kutuakon.exe File opened (read-only) \??\z: kutuakon.exe File opened (read-only) \??\m: kutuakon.exe File opened (read-only) \??\n: kutuakon.exe File opened (read-only) \??\l: cqybplfxkm.exe File opened (read-only) \??\j: kutuakon.exe File opened (read-only) \??\k: kutuakon.exe File opened (read-only) \??\t: cqybplfxkm.exe File opened (read-only) \??\u: cqybplfxkm.exe File opened (read-only) \??\x: cqybplfxkm.exe File opened (read-only) \??\s: cqybplfxkm.exe File opened (read-only) \??\w: cqybplfxkm.exe File opened (read-only) \??\h: kutuakon.exe File opened (read-only) \??\l: kutuakon.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" cqybplfxkm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" cqybplfxkm.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/824-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000b0000000149f5-5.dat autoit_exe behavioral1/files/0x000c0000000122f0-17.dat autoit_exe behavioral1/files/0x0009000000015018-26.dat autoit_exe behavioral1/files/0x0007000000015616-33.dat autoit_exe behavioral1/files/0x0006000000015df1-74.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\jfdlvdsmixbpymo.exe beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\SysWOW64\jfdlvdsmixbpymo.exe beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\SysWOW64\kutuakon.exe beb0ce0ae439be0520015a4d5360f26b.exe File created C:\Windows\SysWOW64\cztlavfvwhmkc.exe beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\SysWOW64\cztlavfvwhmkc.exe beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll cqybplfxkm.exe File created C:\Windows\SysWOW64\cqybplfxkm.exe beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\SysWOW64\cqybplfxkm.exe beb0ce0ae439be0520015a4d5360f26b.exe File created C:\Windows\SysWOW64\kutuakon.exe beb0ce0ae439be0520015a4d5360f26b.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kutuakon.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kutuakon.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kutuakon.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe kutuakon.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kutuakon.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal kutuakon.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kutuakon.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe kutuakon.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf beb0ce0ae439be0520015a4d5360f26b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFC8D4F5F851D9140D6217D93BC92E635593067336335D7EE" beb0ce0ae439be0520015a4d5360f26b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cqybplfxkm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg cqybplfxkm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh cqybplfxkm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs cqybplfxkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F46BC1FF6E21AAD172D0D38A0E9016" beb0ce0ae439be0520015a4d5360f26b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc cqybplfxkm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes beb0ce0ae439be0520015a4d5360f26b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" cqybplfxkm.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2480 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 2784 kutuakon.exe 2784 kutuakon.exe 2784 kutuakon.exe 2784 kutuakon.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2724 kutuakon.exe 2724 kutuakon.exe 2724 kutuakon.exe 2724 kutuakon.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 2784 kutuakon.exe 2784 kutuakon.exe 2784 kutuakon.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2724 kutuakon.exe 2724 kutuakon.exe 2724 kutuakon.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 824 beb0ce0ae439be0520015a4d5360f26b.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 960 cqybplfxkm.exe 2784 kutuakon.exe 2784 kutuakon.exe 2784 kutuakon.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 3040 jfdlvdsmixbpymo.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2652 cztlavfvwhmkc.exe 2724 kutuakon.exe 2724 kutuakon.exe 2724 kutuakon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 WINWORD.EXE 2480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 824 wrote to memory of 960 824 beb0ce0ae439be0520015a4d5360f26b.exe 28 PID 824 wrote to memory of 960 824 beb0ce0ae439be0520015a4d5360f26b.exe 28 PID 824 wrote to memory of 960 824 beb0ce0ae439be0520015a4d5360f26b.exe 28 PID 824 wrote to memory of 960 824 beb0ce0ae439be0520015a4d5360f26b.exe 28 PID 824 wrote to memory of 3040 824 beb0ce0ae439be0520015a4d5360f26b.exe 29 PID 824 wrote to memory of 3040 824 beb0ce0ae439be0520015a4d5360f26b.exe 29 PID 824 wrote to memory of 3040 824 beb0ce0ae439be0520015a4d5360f26b.exe 29 PID 824 wrote to memory of 3040 824 beb0ce0ae439be0520015a4d5360f26b.exe 29 PID 824 wrote to memory of 2784 824 beb0ce0ae439be0520015a4d5360f26b.exe 30 PID 824 wrote to memory of 2784 824 beb0ce0ae439be0520015a4d5360f26b.exe 30 PID 824 wrote to memory of 2784 824 beb0ce0ae439be0520015a4d5360f26b.exe 30 PID 824 wrote to memory of 2784 824 beb0ce0ae439be0520015a4d5360f26b.exe 30 PID 824 wrote to memory of 2652 824 beb0ce0ae439be0520015a4d5360f26b.exe 31 PID 824 wrote to memory of 2652 824 beb0ce0ae439be0520015a4d5360f26b.exe 31 PID 824 wrote to memory of 2652 824 beb0ce0ae439be0520015a4d5360f26b.exe 31 PID 824 wrote to memory of 2652 824 beb0ce0ae439be0520015a4d5360f26b.exe 31 PID 960 wrote to memory of 2724 960 cqybplfxkm.exe 32 PID 960 wrote to memory of 2724 960 cqybplfxkm.exe 32 PID 960 wrote to memory of 2724 960 cqybplfxkm.exe 32 PID 960 wrote to memory of 2724 960 cqybplfxkm.exe 32 PID 824 wrote to memory of 2480 824 beb0ce0ae439be0520015a4d5360f26b.exe 33 PID 824 wrote to memory of 2480 824 beb0ce0ae439be0520015a4d5360f26b.exe 33 PID 824 wrote to memory of 2480 824 beb0ce0ae439be0520015a4d5360f26b.exe 33 PID 824 wrote to memory of 2480 824 beb0ce0ae439be0520015a4d5360f26b.exe 33 PID 2480 wrote to memory of 2628 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 2628 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 2628 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 2628 2480 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\beb0ce0ae439be0520015a4d5360f26b.exe"C:\Users\Admin\AppData\Local\Temp\beb0ce0ae439be0520015a4d5360f26b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cqybplfxkm.execqybplfxkm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\kutuakon.exeC:\Windows\system32\kutuakon.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2724
-
-
-
C:\Windows\SysWOW64\jfdlvdsmixbpymo.exejfdlvdsmixbpymo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3040
-
-
C:\Windows\SysWOW64\kutuakon.exekutuakon.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2784
-
-
C:\Windows\SysWOW64\cztlavfvwhmkc.execztlavfvwhmkc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2628
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5bebb54ea6f7924651fbd924e341b408b
SHA18273a8ba85d923f818448f5df624edb07d0664e8
SHA2562ab459cdac0f81d36ea42bac408b7d2b742d0c9db7b20d36b899e988e7a7c923
SHA512569912e254f71c31ffc7eb6b7110bd86ddc69e0f0b11c8aa3d6c24344b3d83cb62cf359c5d4b5fef7bf31ce033fc2f0a07b76dd8183c87ee9a71372f31135d41
-
Filesize
20KB
MD5689639688558e7d3ce879a760797756b
SHA1c44f259e61a73709aff91504475a34add3760619
SHA256674570ac6cf58569a879572b569943910cd193470ef69f9a415cc2ccf52d85c0
SHA5128f7c41dc7b4a76b61fc98ede1a1de2f67845dcfd1c1c3946a4fcc0877684a7c5be93c12dfc9500e13664cbe770976a5c7fe504adb2df19907bb161d409e94c2b
-
Filesize
512KB
MD58f8d6eaf706779bdbac628ca4e81b66c
SHA10e8bbf6c4a4b596141d0add0f45c3e48912a2a8c
SHA25601a707160c2f6866367bfe87b791ca05fb9f80b59fcabbcb67d113b275507c6f
SHA51228970862483b933cab38ac714ed89140f51d84ddb99addbb5eb55415f85e346ec0f8db0b8c86088541741c75249749c4e55d6805fa4ffeb84757b441c9ae4483
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5d4124f0efd404c047ae86da3a87cf246
SHA15c7664391c257e3fe0b847066a24f841c067a2c5
SHA25688ffc4ec5ac8f9d6a2e89caecb97bee3ba9d89e358787494e9cf60991507c4e5
SHA512d5ae30273e3997a9ce692095cb5c7cc5fbaaf6a54d42759ada1c4a8dfa3d6414e14d522deeec153f577adb95cc66a74088506df7dc8757c985610f595ee704b2
-
Filesize
512KB
MD57edc81b0b8b4f8ab57f41f01f7b17b61
SHA174511c5992933a337eab4f685240403db8cc194e
SHA256c7f6fd250c8ef86b8e56880dafb9f99fac59a0ff5b6abc1b436ec6c13ba89301
SHA5123967d65957304f8e454e8164e1a771baedda73c72aea8674637d5ffab451c86784d956e8636cf26dc20f2ed9ca524de722a023932f8ba52af988a25a526a7567
-
Filesize
512KB
MD593d8cc916619c67e88074f5dc7ab6e39
SHA1bee45111e3fb10a07cb0817bcb7256aeeae3e984
SHA256a29104f0d6e51739a8f36e8a4e720d3383654df06e9118530b6dd0fcb47d9dc8
SHA512ba3308fe05a05de8c1dd89bf6b609471539e16854bc12539592e22e7e0016146f6f5f492f3e438349970a8a9e4492dab8df1760770ea6e846cbf713a723e2162