Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
Resource
win10v2004-20240426-en
General
-
Target
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
-
Size
512KB
-
MD5
6ddc42125dab7bef0e226b4ec8913967
-
SHA1
3d8e7a7fb00566525d13eacc0ad4dd0111ab7327
-
SHA256
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b
-
SHA512
572e2daf78c66b1f7657f269ecd3b045c5878cae34e4abf46ad02683d61ae5e6d31deb4c67e43e02ee0a9ccfe6ecfbd1e037ae42effe718c0bf6b0747f756c32
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" roezfzffaw.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" roezfzffaw.exe -
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" roezfzffaw.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" roezfzffaw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe -
Executes dropped EXE 5 IoCs
Processes:
roezfzffaw.exehonmgpnqdxhhwkq.exezisgunhh.exeykqrbpbwhbckh.exezisgunhh.exepid process 3068 roezfzffaw.exe 3500 honmgpnqdxhhwkq.exe 2680 zisgunhh.exe 2024 ykqrbpbwhbckh.exe 876 zisgunhh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" roezfzffaw.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
honmgpnqdxhhwkq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ykqrbpbwhbckh.exe" honmgpnqdxhhwkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fxducbya = "roezfzffaw.exe" honmgpnqdxhhwkq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gggokaze = "honmgpnqdxhhwkq.exe" honmgpnqdxhhwkq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
zisgunhh.exeroezfzffaw.exezisgunhh.exedescription ioc process File opened (read-only) \??\i: zisgunhh.exe File opened (read-only) \??\r: zisgunhh.exe File opened (read-only) \??\y: zisgunhh.exe File opened (read-only) \??\g: roezfzffaw.exe File opened (read-only) \??\t: roezfzffaw.exe File opened (read-only) \??\m: zisgunhh.exe File opened (read-only) \??\t: zisgunhh.exe File opened (read-only) \??\h: roezfzffaw.exe File opened (read-only) \??\s: roezfzffaw.exe File opened (read-only) \??\o: zisgunhh.exe File opened (read-only) \??\y: zisgunhh.exe File opened (read-only) \??\k: roezfzffaw.exe File opened (read-only) \??\n: zisgunhh.exe File opened (read-only) \??\a: zisgunhh.exe File opened (read-only) \??\q: zisgunhh.exe File opened (read-only) \??\n: roezfzffaw.exe File opened (read-only) \??\p: roezfzffaw.exe File opened (read-only) \??\h: zisgunhh.exe File opened (read-only) \??\k: zisgunhh.exe File opened (read-only) \??\e: zisgunhh.exe File opened (read-only) \??\k: zisgunhh.exe File opened (read-only) \??\r: zisgunhh.exe File opened (read-only) \??\w: zisgunhh.exe File opened (read-only) \??\j: roezfzffaw.exe File opened (read-only) \??\q: roezfzffaw.exe File opened (read-only) \??\t: zisgunhh.exe File opened (read-only) \??\u: roezfzffaw.exe File opened (read-only) \??\l: zisgunhh.exe File opened (read-only) \??\a: zisgunhh.exe File opened (read-only) \??\z: zisgunhh.exe File opened (read-only) \??\n: zisgunhh.exe File opened (read-only) \??\w: roezfzffaw.exe File opened (read-only) \??\w: zisgunhh.exe File opened (read-only) \??\s: zisgunhh.exe File opened (read-only) \??\v: zisgunhh.exe File opened (read-only) \??\z: zisgunhh.exe File opened (read-only) \??\l: roezfzffaw.exe File opened (read-only) \??\e: zisgunhh.exe File opened (read-only) \??\g: zisgunhh.exe File opened (read-only) \??\h: zisgunhh.exe File opened (read-only) \??\i: zisgunhh.exe File opened (read-only) \??\x: zisgunhh.exe File opened (read-only) \??\o: roezfzffaw.exe File opened (read-only) \??\r: roezfzffaw.exe File opened (read-only) \??\b: zisgunhh.exe File opened (read-only) \??\g: zisgunhh.exe File opened (read-only) \??\p: zisgunhh.exe File opened (read-only) \??\s: zisgunhh.exe File opened (read-only) \??\e: roezfzffaw.exe File opened (read-only) \??\v: roezfzffaw.exe File opened (read-only) \??\b: roezfzffaw.exe File opened (read-only) \??\j: zisgunhh.exe File opened (read-only) \??\o: zisgunhh.exe File opened (read-only) \??\m: roezfzffaw.exe File opened (read-only) \??\j: zisgunhh.exe File opened (read-only) \??\p: zisgunhh.exe File opened (read-only) \??\v: zisgunhh.exe File opened (read-only) \??\x: zisgunhh.exe File opened (read-only) \??\q: zisgunhh.exe File opened (read-only) \??\u: zisgunhh.exe File opened (read-only) \??\a: roezfzffaw.exe File opened (read-only) \??\b: zisgunhh.exe File opened (read-only) \??\y: roezfzffaw.exe File opened (read-only) \??\z: roezfzffaw.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
roezfzffaw.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" roezfzffaw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" roezfzffaw.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/2744-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\honmgpnqdxhhwkq.exe autoit_exe C:\Windows\SysWOW64\roezfzffaw.exe autoit_exe C:\Windows\SysWOW64\ykqrbpbwhbckh.exe autoit_exe C:\Windows\SysWOW64\zisgunhh.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe autoit_exe C:\Users\Admin\Documents\PingMerge.doc.exe autoit_exe C:\Users\Admin\Documents\ResolveSearch.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe autoit_exe -
Drops file in System32 directory 12 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exezisgunhh.exezisgunhh.exeroezfzffaw.exedescription ioc process File opened for modification C:\Windows\SysWOW64\zisgunhh.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification C:\Windows\SysWOW64\roezfzffaw.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\honmgpnqdxhhwkq.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\zisgunhh.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\ykqrbpbwhbckh.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll roezfzffaw.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe zisgunhh.exe File created C:\Windows\SysWOW64\roezfzffaw.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\honmgpnqdxhhwkq.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\ykqrbpbwhbckh.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe -
Drops file in Program Files directory 14 IoCs
Processes:
zisgunhh.exezisgunhh.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal zisgunhh.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zisgunhh.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zisgunhh.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal zisgunhh.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zisgunhh.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zisgunhh.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe zisgunhh.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe zisgunhh.exe -
Drops file in Windows directory 19 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exezisgunhh.exezisgunhh.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe zisgunhh.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zisgunhh.exe File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe zisgunhh.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe zisgunhh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeroezfzffaw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F768C4FE1B22DDD273D0D38B09916B" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc roezfzffaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" roezfzffaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C779C2C82556A4377A170202CD87D8F65DE" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" roezfzffaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" roezfzffaw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf roezfzffaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDFABBF963F194830C3A4186EE3E90B08B03FC43600348E2C942EB09D2" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC1B1584494399E52CBBADC329DD7CE" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF8FF8C4F5882139141D65C7D97BC95E143594567446335D79C" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "183EC60F15E5DAB4B8CF7CE5EC9434CC" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" roezfzffaw.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" roezfzffaw.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2852 WINWORD.EXE 2852 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeroezfzffaw.exeykqrbpbwhbckh.exezisgunhh.exehonmgpnqdxhhwkq.exezisgunhh.exepid process 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 2680 zisgunhh.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 3500 honmgpnqdxhhwkq.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeroezfzffaw.exehonmgpnqdxhhwkq.exeykqrbpbwhbckh.exezisgunhh.exezisgunhh.exepid process 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeroezfzffaw.exehonmgpnqdxhhwkq.exeykqrbpbwhbckh.exezisgunhh.exezisgunhh.exepid process 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3068 roezfzffaw.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 3500 honmgpnqdxhhwkq.exe 2024 ykqrbpbwhbckh.exe 2680 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe 876 zisgunhh.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE 2852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeroezfzffaw.exedescription pid process target process PID 2744 wrote to memory of 3068 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe roezfzffaw.exe PID 2744 wrote to memory of 3068 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe roezfzffaw.exe PID 2744 wrote to memory of 3068 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe roezfzffaw.exe PID 2744 wrote to memory of 3500 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe honmgpnqdxhhwkq.exe PID 2744 wrote to memory of 3500 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe honmgpnqdxhhwkq.exe PID 2744 wrote to memory of 3500 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe honmgpnqdxhhwkq.exe PID 2744 wrote to memory of 2680 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe zisgunhh.exe PID 2744 wrote to memory of 2680 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe zisgunhh.exe PID 2744 wrote to memory of 2680 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe zisgunhh.exe PID 2744 wrote to memory of 2024 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe ykqrbpbwhbckh.exe PID 2744 wrote to memory of 2024 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe ykqrbpbwhbckh.exe PID 2744 wrote to memory of 2024 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe ykqrbpbwhbckh.exe PID 2744 wrote to memory of 2852 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE PID 2744 wrote to memory of 2852 2744 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE PID 3068 wrote to memory of 876 3068 roezfzffaw.exe zisgunhh.exe PID 3068 wrote to memory of 876 3068 roezfzffaw.exe zisgunhh.exe PID 3068 wrote to memory of 876 3068 roezfzffaw.exe zisgunhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe"C:\Users\Admin\AppData\Local\Temp\4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\roezfzffaw.exeroezfzffaw.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\zisgunhh.exeC:\Windows\system32\zisgunhh.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:876 -
C:\Windows\SysWOW64\honmgpnqdxhhwkq.exehonmgpnqdxhhwkq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3500 -
C:\Windows\SysWOW64\zisgunhh.exezisgunhh.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2680 -
C:\Windows\SysWOW64\ykqrbpbwhbckh.exeykqrbpbwhbckh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2024 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD533bbbea6ecc28e52fb4a823672da7e56
SHA193e39e7281f455622ac66d943c6ecdf35f24a1c3
SHA256300a51ddd1e8d09e5f0f6d1ad33d7a783b80fb8a2297bdfc64f05991cb1e7818
SHA512bb512b0b1687bc8683da91201bbc0bba80fd2c4440d7bfe3efd45f2c3556d3a2d22061609837b63f9ce6227ea19e5d6c707b14803934ced2845112150143a176
-
Filesize
512KB
MD555a3f6514ec5aea2f8cd768f41b5965c
SHA1303ada57863ca87b6f5af9617a14528039e066d8
SHA256f2d16d67ffe9d02827b858f38b4f00b7d81aa7db326ead6b2065b2351430f36d
SHA5125b1810002aea01a8a4f5a71355dd49bc1f153b863293a1a3f64bce0dd05a56c99bc360d94b6e8efbf439a7f49d9627f7b369f76c9e3ce856e05da2b9743535c0
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
239B
MD512b138a5a40ffb88d1850866bf2959cd
SHA157001ba2de61329118440de3e9f8a81074cb28a2
SHA2569def83813762ad0c5f6fdd68707d43b7ccd26633b2123254272180d76bc3faaf
SHA5129f69865a791d09dec41df24d68ad2ab8292d1b5beeca8324ba02feba71a66f1ca4bb44954e760c0037c8db1ac00d71581cab4c77acbc3fb741940b17ccc444eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD550821dc0592833215f45792c8ac0b0aa
SHA1e83a40eb6135f97a8d0d67690f614a67f24ac3d0
SHA256cabdc52cd41848d651c02ab1ae9cfe5c9c70594ab0cb5e75dc2c5ab893586b73
SHA512c55cf7c28fd0db7b157d65e6869217c2fb34bcfc4f49116626eba8f4dc675bd5e39477945464817095ffeb780242478fe2e80be0f1063dfd92298a7e5c1fc5b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD58a0677416bcf0053db4160b1d126de4b
SHA1b79c20935b04e0df56c891905e874e05105d87de
SHA256ab76de467b35ec922772ba5c837f99fd9ee3e2cb6cb7bc69c36d33624777f9c6
SHA512989b816fbf1c48c9011678d30eab0dc9f27295e890b095688aaf0ef3e2c9f5b548fc90d57a25207d5595a5fddc20ba1cb54185b17f80a96bd7ed7788b81ec4b5
-
Filesize
512KB
MD5a309558c64aa072598d9f9e359f41b1f
SHA1eab66a62d1f43c1462b1b64099d65f584abb602d
SHA256148de5052b4e219f0f9269dd864095b4d3f3bc62e60fa7062928aaabdcb7ca78
SHA5123c279ebd86a7d6554c5b14a8245803eca0ebf5784677e1543def8bc86eb19c62c0dc75eba463cd14b210e87fb769667aff8802e587e347db6aea77fa5451c359
-
Filesize
512KB
MD5231a900fb3c77c4780eb2bb547dda17f
SHA1fe4f9da4430a91bbb3629a63499ddf15bb7a9c31
SHA256e43b3f5fd6b233e79dcb403844a961f08bafc9f84cb01e5d737150b2198b962d
SHA512567fc874a68d00aac73c067f15c474919619434557addef5229efdf07a26d0b8e1281f7509407fbcb492022ae153d049f6c3ab59c1c2894d40689fb7c8e64e8d
-
Filesize
512KB
MD53f61c7dde6bf39554115d863f122e0a6
SHA177c95fdc4e9226ba88d868682f62bd452e77c870
SHA2568adfbd7b13afb23b4e389b989b33969cac5c7f080bc3ccbd344a09f1ec78ebca
SHA5127a12ad773217e2bce8881d50aa7807723663947a1a6ee7f91c623a158f84996affe5bbb25340138456ae791cbbfa079326755e74b5017ab21284ecca19193f06
-
Filesize
512KB
MD5a24e493b3a3d2ca5c9964578c486cdd5
SHA1174b251b236705be1c4e7cf839b44353b3172f64
SHA2566a37eb2311415f033e61eb0c64514e9fade655cbe77a0361360f21993f4c0857
SHA51262c05f765aea98c659930ccd5d9efba23ebfb70676f6367dda626b746c161e5a7289e4557dba3c9aefda84c94c21306f25695ca92a10752177386cc016c00dd0
-
Filesize
512KB
MD568ef6065df54b18c1db16f88d1fc49ae
SHA11e741dd7ec9d36baeea71da7180570b051b1c9ba
SHA256337e6991018dc0ccfbe76cde6c9e2b9aaf8494ddcf69a4a5c28f594fc690555c
SHA51229ece71c094482286d411a64c0f109fdfcfbb16d200bfb2726566fe07c689a996c70fc2d0d7d4d29fac7f6c20c498a4e1eb758fca8f1af10c0b0d8020a48eeb8
-
Filesize
512KB
MD57033f04e2f764e9335829ac31f879734
SHA1b3f80eb2b16b012cde48f3e9e157bd145acae287
SHA2567828cd34b0a5fb4bbe4af34c76cc647190f8e4b0e4ff6dc729eb68a95431fd20
SHA512590b61a392ca682d0f3380164503ffe0a09cf34888826351cc87d7b2d167cad79912d2a29460385332a2e2009e2b8c5f12ea5b913c712689330c824c58d6d17a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5e5636d0ad7fe658a520f593915d0adcc
SHA18c9535827b1ac7ffff8a37f0c7e6a19d304a04ae
SHA25603de86ddd78828b3833f0948273df9f146834cae269e4be3a759908e23c3e158
SHA51283b6170840935a654e1c4936b397f466d54e1cbfda3623b2e326f27eb5934fcc285ef002238370bfa5a2dad9337fc3d5c46d7737b100a180e395b524671067f1
-
Filesize
512KB
MD5197b74817f16009c5d066cf2c78a3de8
SHA13f6be81ad7ef4b98b2bd7a06f4e80fa71225e861
SHA256b6c688e6362ffb68df1c648b8e4f8a903a27afe29cb4f37e2760ce64ac472dea
SHA512a74d417be401a4b9e81c248403c7e3a41018d8febdb9da9c3113fa59342fdf4d7dd5d2353d64b8c4be19ddac8a1555b26ba36c448e57153551d431441c3b2d66