Resubmissions
07-09-2020 14:49
200907-6g4j1lsg4a 807-09-2020 14:46
200907-621166mbea 807-09-2020 14:43
200907-arlway4y22 807-09-2020 14:40
200907-2gfycfzzsn 807-09-2020 14:37
200907-48ed1pf1qa 807-09-2020 14:30
200907-nrhrd8w9xa 807-09-2020 14:27
200907-7xkbfnkxne 807-09-2020 13:24
200907-hmxpvsyqqx 807-09-2020 13:22
200907-y2l4q28146 807-09-2020 13:19
200907-snqv561r56 8Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
07-09-2020 13:11
Static task
static1
Behavioral task
behavioral1
Sample
HRCComplaintProcedureForm (7).doc
Resource
win7v200722
Behavioral task
behavioral2
Sample
HRCComplaintProcedureForm (7).doc
Resource
win10
General
-
Target
HRCComplaintProcedureForm (7).doc
-
Size
80KB
-
MD5
a411bb05ee4192202c88efdbd54552db
-
SHA1
6b0acf8175d39a1008bf9fb0d3c45bb63a3361e9
-
SHA256
33a24ad4b225880bee5c9d40527022ea020daf2f6d7643269f4f739b3271f5de
-
SHA512
6e424b2c2a7881d4969ddfaef595822f3d987e8fc49f578118c6d4ba25461ef53613405394f4ac366606ecfda08ede4d22f436f182aaee82ba9b5f7962cce6f4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Adobe_Updater.exepid process 1108 Adobe_Updater.exe -
Loads dropped DLL 32 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exesetup.exeMsiExec.exepid process 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 820 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 1092 setup.exe 1092 setup.exe 1176 MsiExec.exe 1176 MsiExec.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MSFS msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\MAPI msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents\IMAIL msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OptionalComponents msiexec.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini msiexec.exe File opened for modification C:\Users\Public\Desktop\desktop.ini msiexec.exe -
Enumerates connected drives 3 TTPs
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule \Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll js -
Drops file in System32 directory 1 IoCs
Processes:
MsiExec.exedescription ioc process File created C:\Windows\SysWOW64\Elevation.tmp MsiExec.exe -
Modifies service 2 TTPs 285 IoCs
Processes:
vssvc.exesetup.exemsiexec.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\FREEZE_FRONT (Enter) = 4800000000000000a0f4cff22985d6011c030000d4010000ec030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\FREEZE (Enter) = 4800000000000000e03cdef22985d6011c03000048050000eb030000010000000200000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\PREPAREBACKUP (Enter) = 4800000000000000a047dedc2985d6011c030000f8070000e903000001000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\PREPAREBACKUP (Enter) = 480000000000000020309ef02985d6011c030000a8040000e9030000010000000500000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\VSS_WS_STABLE (SetCurrentState) = 48000000000000000017aaf02985d6011c0300000003000001000000010000000100000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_ENDPREPARE (Enter) = 4800000000000000c02634f12985d6011c030000d401000002040000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\FREEZE (Leave) = 48000000000000008062ffde2985d6011c03000040030000eb03000000000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\THAW (Enter) = 4800000000000000807825df2985d6011c03000040030000f203000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\THAW (Enter) = 480000000000000020bc4bf32985d6011c030000d4010000f2030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\BACKUPSHUTDOWN (Leave) = 4800000000000000004875f42985d6011c03000038060000fb030000000000000500000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_PREFINALCOMMIT (Enter) = 4800000000000000a0a73fdf2985d6011c030000400300000604000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\PREPARESNAPSHOT (Enter) = 480000000000000080620af22985d6011c030000d4010000ea030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\PREPARESNAPSHOT (Enter) = 4800000000000000a0a74af22985d6011c03000020060000ea030000010000000100000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\VSS_WS_WAITING_FOR_FREEZE (SetCurrentState) = 4800000000000000407da7f22985d6011c0300004805000002000000010000000100000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_COMMIT (Enter) = 480000000000000020bc4bf32985d6011c0300008c04000004040000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\VSS_WS_STABLE (SetCurrentState) = 4800000000000000809cb3f02985d6011c030000a804000001000000010000000100000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\IDENTIFY (Enter) = 4800000000000000603744d62985d6011c030000f8070000e80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\VSS_WS_WAITING_FOR_FREEZE (SetCurrentState) = 4800000000000000a03981de2985d6011c030000480500000200000001000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\FREEZE (Enter) = 4800000000000000e08ca2de2985d6011c03000038060000eb03000001000000020000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\THAW (Enter) = 480000000000000000fe2edf2985d6011c03000048050000f203000001000000030000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\POSTSNAPSHOT (Leave) = 4800000000000000e01b9adf2985d6011c03000090050000f503000000000000040000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP\SppCreate (Enter) = 4800000000000000803c52ee2985d601440400007c050000d00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 setup.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\GETSTATE (Leave) = 4800000000000000602b1cdd2985d6011c030000a8040000f903000000000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\FREEZE (Enter) = 4800000000000000c073aede2985d6011c03000048050000eb03000001000000020000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\BACKUPSHUTDOWN (Leave) = 480000000000000060f93be02985d6011c03000004070000fb03000000000000050000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\THAW (Enter) = 480000000000000060045af32985d6011c03000048050000f2030000010000000300000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\POSTSNAPSHOT (Enter) = 4800000000000000c0b2e1f32985d6011c03000048050000f5030000010000000400000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\FREEZE_KTM (Leave) = 480000000000000000bcbcde2985d6011c03000040030000f003000000000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\FREEZE_SYSTEM (Enter) = 4800000000000000207ad9f22985d6011c030000d4010000ee030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState) = 4800000000000000c0b2e1f32985d6011c0300003806000005000000010000000400000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\BACKUPSHUTDOWN (Enter) = 4800000000000000e07332e02985d6011c03000040030000fb03000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\FREEZE (Leave) = 48000000000000008062ffde2985d6011c03000038060000eb03000000000000020000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace\IOCTL_RELEASE (Enter) = 480000000000000020bc4bf32985d6011c030000d4010000ff0300000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\FREEZE_FRONT (Enter) = 4800000000000000802ba0de2985d6011c03000040030000ec03000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_PRECOMMIT (Enter) = 48000000000000008062ffde2985d6011c030000400300000304000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState) = 480000000000000080961ff42985d6011c0300009005000005000000010000000400000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\PREPAREBACKUP (Leave) = 4800000000000000802eeadc2985d6011c03000014030000e903000000000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\THAW (Enter) = 4800000000000000605f31df2985d6011c03000048050000f203000001000000030000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\POSTSNAPSHOT (Leave) = 4800000000000000e01b9adf2985d6011c03000090050000f503000000000000040000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\BKGND_FREEZE_THREAD (Leave) = 480000000000000060045af32985d6011c03000070000000fc030000000000000300000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{af35dda4-cc48-11ea-b356-806e6f6e6963}_)\IOCTL_FLUSH_AND_HOLD (Enter) = 4800000000000000e0ce14df2985d6011c03000080050000fe03000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{af35dda4-cc48-11ea-b356-806e6f6e6963}_)\IOCTL_RELEASE (Leave) = 4800000000000000807825df2985d6011c03000080050000ff03000000000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_BEGINPREPARE (Leave) = 4800000000000000a0aa94f02985d6011c030000a804000001040000000000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher\THAW_KTM (Enter) = 480000000000000020bc4bf32985d6011c030000d4010000f4030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\PREPAREBACKUP (Leave) = 480000000000000000b4f3dc2985d6011c030000f8070000e903000000000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\VSS_WS_STABLE (SetCurrentState) = 480000000000000000b4f3dc2985d6011c030000f80700000100000001000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_ENDPREPARE (Leave) = 4800000000000000007a4ade2985d6011c030000400300000204000000000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\BACKUPSHUTDOWN (Enter) = 480000000000000060f93be02985d6011c03000048050000fb03000001000000050000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\IDENTIFY (Leave) = 4800000000000000c08f73ee2985d6011c03000014030000e80300000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\PREPARESNAPSHOT (Leave) = 4800000000000000407da7f22985d6011c03000020060000ea030000000000000100000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{af35dda4-cc48-11ea-b356-806e6f6e6963}_)\OPEN_VOLUME_HANDLE (Leave) = 4800000000000000a03642f32985d6011c0300002c060000fd030000000000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_POSTFINALCOMMIT (Leave) = 480000000000000000273cf42985d6011c030000d401000007040000000000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\GETSTATE (Leave) = 4800000000000000602b1cdd2985d6011c03000014030000f903000000000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{af35dda4-cc48-11ea-b356-806e6f6e6963}_)\IOCTL_RELEASE (Enter) = 4800000000000000807825df2985d6011c03000080050000ff03000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace\OPEN_VOLUME_HANDLE (Enter) = 4800000000000000a0201cf32985d6011c030000d4010000fd030000010000000000000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher\PREPAREBACKUP (Enter) = 480000000000000020c2d4dc2985d60114060000f4070000e903000001000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\PREPARESNAPSHOT (Leave) = 4800000000000000a03981de2985d6011c03000048050000ea03000000000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP\SppAddInterestingComponents (Leave) = 4800000000000000a031b8dc2985d6011406000034060000d40700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}\PROVIDER_BEGINPREPARE (Leave) = 480000000000000020c2d4dc2985d6011c030000140300000104000000000000000000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer\VSS_WS_STABLE (SetCurrentState) = 4800000000000000e08fecdc2985d6011c030000a80400000100000001000000010000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\BKGND_FREEZE_THREAD (Enter) = 4800000000000000c073aede2985d6011c03000020010000fc03000001000000030000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer\VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState) = 4800000000000000e01b9adf2985d6011c030000900500000500000001000000040000000000000096b2314ab10c5d49bda6b24b2aa545bc00000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer\FREEZE (Enter) = 48000000000000000061e5f22985d6011c03000090050000eb030000010000000200000000000000e0a11168657ead439accd5dd850934dd00000000000000000000000000000000 vssvc.exe -
Drops file in Program Files directory 275 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\engphon.env msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zy______.pfm msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\AdobePiStd.otf msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\JSByteCodeWin.bin msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\bl.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.aup msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSO.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSORES.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdater.cer msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Search5.api msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pe.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\PDFSigQFormalRep.pdf msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SecStoreFile.ico msiexec.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\Office32.WW\Office32WW.XML msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.LIC msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\info.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\UKRAINE.TXT msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEAWSDC.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.STD msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Oblique.otf msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Checkers.api msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONLNTCOMLIB.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.hsp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Acrofx32.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\Real.mpp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US.txt msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Web Server Extensions\14\BIN\FPSRVUTL.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-It.otf msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\stop_collection_data.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\reviews_sent.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.lng msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.SYX msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Bold.otf msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Regular.otf msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\PDFFile_8.ico msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeAUM_rootCert.cer msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\can129.hsp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NPSPWRAP.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa37.hyp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\zx______.pfm msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\rss.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\icudt36.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHEV.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STSUPLD.DLL msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa03.ths msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_all.gif msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\FDFFile_8.ico msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api msiexec.exe -
Drops file in Windows directory 53 IoCs
Processes:
msiexec.exeDrvInst.exeDrvInst.exedescription ioc process File created C:\Windows\Installer\f75fcc9.ipi msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\CacheSize.txt msiexec.exe File opened for modification C:\Windows\Installer\MSI29B3.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\Installer\MSIF73A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFD55.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2E2.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\9.0.0\ul_msvcp80.dll.98CB24AD_52FB_DB5F_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\MSIF8A.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\FDFFile_8.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI7C7C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2ADF.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\XDPFile_8.ico msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f75fbcd.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2E3C.tmp msiexec.exe File created C:\Windows\Installer\f75fcc7.mst msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\PDFFile_8.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI3CD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI660.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI874.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI8248.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFAD4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB06.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\9.0.0\ul_msvcm80.dll.98CB24AD_52FB_DB5F_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\MSI29D3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI29F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\RMFFile_8.ico msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSIFBDE.tmp msiexec.exe File created C:\Windows\Installer\f75fbcd.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\9.0.0\ul_msvcr80.dll.98CB24AD_52FB_DB5F_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\Installer\MSI2E1C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1075.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI8015.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI3FD.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\CacheSize.txt msiexec.exe File opened for modification C:\Windows\Installer\MSI2ABF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE13.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4C9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA98.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\PDXFile_8.ico msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SecStoreFile.ico msiexec.exe File opened for modification C:\Windows\Installer\f75fcc7.mst msiexec.exe File opened for modification C:\Windows\Installer\MSI585.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D04.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2983.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\APIFile_8.ico msiexec.exe -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{08E8D305-8D6D-49fe-8603-03A926E46AE0} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BD57A9B2-4E7D-4892-9107-9F4106472DA4} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{358E6F10-DE8A-4602-8424-179CA217F8EE} msiexec.exe -
Modifies data under HKEY_USERS 150 IoCs
Processes:
msiexec.exeDrvInst.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\miguiresource.dll,-201 = "Task Scheduler" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Program Files\Common Files\Microsoft Shared\Ink\ShapeCollector.exe,-298 = "Personalize Handwriting Recognition" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe,-101 = "Windows PowerShell ISE" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\WindowsAnytimeUpgradeUI.exe,-1 = "Windows Anytime Upgrade" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\wucltux.dll,-1 = "Windows Update" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\OobeFldr.dll,-33056 = "Getting Started" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\rstrui.exe,-100 = "System Restore" msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\wdc.dll,-10021 = "Performance Monitor" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@"%windir%\System32\ie4uinit.exe",-732 = "Finds and displays information and Web sites on the Internet." msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\displayswitch.exe,-320 = "Connect to a Projector" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\mblctr.exe,-1008 = "Windows Mobility Center" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\wsecedit.dll,-718 = "Local Security Policy" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\ehome\ehres.dll,-100 = "Windows Media Center" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\odbcint.dll,-1310 = "Data Sources (ODBC)" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\System32\AuthFWGP.dll,-20 = "Windows Firewall with Advanced Security" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\p2pcollab.dll,-8042 = "Peer to Peer Trust" DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\qagentrt.dll,-10 = "System Health Authentication" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\unregmp2.exe,-4 = "Windows Media Player" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Program Files\Windows Sidebar\sidebar.exe,-1005 = "Desktop Gadget Gallery" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\NetProjW.dll,-501 = "Connect to a Network Projector" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe,-102 = "Windows PowerShell ISE (x86)" msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\SnippingTool.exe,-15051 = "Snipping Tool" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Program Files\DVD Maker\DVDMaker.exe,-61403 = "Windows DVD Maker" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\SoundRecorder.exe,-100 = "Sound Recorder" msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@C:\Windows\system32\wdc.dll,-10030 = "Resource Monitor" msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 659 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B4CD3EE-4981-101B-9CA8-9240CE2738AE} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.api\AcroExch.Plugin msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{307F64C0-621D-4D56-BBC6-91EFC13CE40D}\ProxyStubClsid32 MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB2200E-5672-4A32-902A-5A98DB1C58DC}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C523F39F-9C83-11D3-9094-00104BD0D535}\InprocServer32 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{17F2E344-8227-4AA7-A25A-E89424566BBA} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.pdf\ShellEx msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\DataFormats\GetSet msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.acrobatsecuritysettings msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\PDFPrevHndlr.PDFPreviewHandler.1 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00FFD6C4-1A94-44BC-AD3E-8AC18552E3E6}\{B4848E37-7C66-40A6-9F66-D3A9BC8F4636}\ProxyStubClsid32 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{57A0E747-3863-4D20-A811-950C84F1DB9B}\TypeLib MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.XDPDoc\shell\Open\command msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\IA3DServer.FontManager.1 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\PDFShellServer.PDFShellInfo2\Cur Ver msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{46B89F5A-769D-4792-AD9A-E3755915CBC3}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\PDFShell.PDFShell.1 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A5090E95-F1E2-41C8-BDA1-5AEB6C321FDE} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68AB67CA7DA73301B7449A0000000010\SourceList\Net msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68AB67CA7DA73301B7449A0000000010\SourceList msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{A7D71146-EBCD-4E6C-916C-E77865BCC53B}\1.0\FLAGS msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B4CD3EB-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B4CD3F1-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\66EDAE6A0000000084E4E7A854000000 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroBroker.Broker.1\CLSID msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F6594A6D-D57F-4EFD-B2C3-DCD9779E382E}\PersistentAddinsRegistered msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00FFD6C4-1A94-44BC-AD3E-8AC18552E3E6}\{B4848E37-7C66-40A6-9F66-D3A9BC8F4636}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5BB2200E-5672-4A32-902A-5A98DB1C58DC}\ProgID msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E64169B3-3592-47d2-816E-602C5C13F328} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.pdfxml.1\shell\Read msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Document.7\shell\Open msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroIEHelper.AcroIEHlprObj.1 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.adobe.pdfxml msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8CA6C1BB-BE62-4739-80AB-D5ECC7605358}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{41C5FFFE-36DD-415D-9ED0-2976A342A1C8}\1.0\HELPDIR msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{03C2AEA5-BEFA-4C84-A187-C9245AC784F6}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B4CD3EC-4981-101B-9CA8-9240CE2738AE}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Plugin\DefaultIcon msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroIEHelperShim.AcroIEHelperShimObj msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Document.7\CLSID msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Document.7\protocol\StdFileEditing\verb msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E790E1D1-9DE8-4853-8AC6-933D4FD9C927} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.rmf\AcroExch.RMFFile\ShellNew msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8CA6C1BB-BE62-4739-80AB-D5ECC7605358}\ProxyStubClsid32 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\MiscStatus\1 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\PDFShell.PDFShell\CurVer msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{81F9B44F-BA3A-4F5D-9B51-090C74A9B3A4} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.XDPDoc\CLSID msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B801CA65-A1FC-11D0-85AD-444553540000}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EE5A151A-AD2A-4CEE-AD65-228B59F5B4AD}\NumMethods msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9B4CD3F0-4981-101B-9CA8-9240CE2738AE}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{00FFD6C4-1A94-44BC-AD3E-8AC18552E3E6}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{7CD069A0-50AA-11D1-B8F0-00A0C9259304}\ProxyStubClsid msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2991F100-D9C3-4243-82A2-A718747FC0CF} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.FDFDoc msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/vnd.adobe.rmf msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\IA3DServer.A3DMemoryManager.1\CLSID msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{41C5FFFE-36DD-415D-9ED0-2976A342A1C8}\1.0\0\win32 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.RMFFile\shell\Read\command msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.xdp msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroIEHelper.AcroIEHlprObj\CurVer msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.Sequence\DefaultIcon msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1080 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
MsiExec.exeMsiExec.exepid process 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 736 MsiExec.exe 896 MsiExec.exe 896 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 725 IoCs
Processes:
msiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeSecurityPrivilege 1556 msiexec.exe Token: SeBackupPrivilege 796 vssvc.exe Token: SeRestorePrivilege 796 vssvc.exe Token: SeAuditPrivilege 796 vssvc.exe Token: SeBackupPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1072 DrvInst.exe Token: SeLoadDriverPrivilege 1072 DrvInst.exe Token: SeLoadDriverPrivilege 1072 DrvInst.exe Token: SeLoadDriverPrivilege 1072 DrvInst.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe Token: SeRestorePrivilege 1556 msiexec.exe Token: SeTakeOwnershipPrivilege 1556 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
WINWORD.EXEpid process 1080 WINWORD.EXE 1080 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
WINWORD.EXEEXCEL.EXEpid process 1080 WINWORD.EXE 1080 WINWORD.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE 2036 EXCEL.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
msiexec.exeMsiExec.exedescription pid process target process PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 736 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 896 1556 msiexec.exe MsiExec.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 896 wrote to memory of 1108 896 MsiExec.exe Adobe_Updater.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 820 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 1176 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 1176 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 1176 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 1176 1556 msiexec.exe MsiExec.exe PID 1556 wrote to memory of 1176 1556 msiexec.exe MsiExec.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\HRCComplaintProcedureForm (7).doc"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Office14\SELFCERT.EXE"C:\Program Files\Microsoft Office\Office14\SELFCERT.EXE"1⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Modifies service
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C156A40354461BD0990E5E5FEDF19FF82⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 57D0DF2783ADC481B62429DCA585DF0F M Global\MSI00002⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe" -AU_LAUNCH_MODE=53⤵
- Executes dropped EXE
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Z "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding A398FC38C0DBEA1942D0ECE7E1F3DCAA2⤵
- Loads dropped DLL
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "0000000000000540" "00000000000003DC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\setup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Office Setup Controller\setup.exe" /uninstall PROPLUS /dll OSETUP.DLL1⤵
- Loads dropped DLL
- Modifies service
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot13" "" "" "66d15495b" "0000000000000000" "0000000000000540" "0000000000000588"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\37371AF57575D4FC7CE445937224B2BDB6F80AEE
-
C:\Windows\Installer\MSI1075.tmp
-
C:\Windows\Installer\MSI1D04.tmp
-
C:\Windows\Installer\MSI2983.tmp
-
C:\Windows\Installer\MSI29B3.tmp
-
C:\Windows\Installer\MSI29D3.tmp
-
C:\Windows\Installer\MSI29F3.tmp
-
C:\Windows\Installer\MSI2ABF.tmp
-
C:\Windows\Installer\MSI2ADF.tmp
-
C:\Windows\Installer\MSI2E1C.tmp
-
C:\Windows\Installer\MSI2E2.tmp
-
C:\Windows\Installer\MSI2E3C.tmp
-
C:\Windows\Installer\MSI3CD.tmp
-
C:\Windows\Installer\MSI3FD.tmp
-
C:\Windows\Installer\MSI4C9.tmp
-
C:\Windows\Installer\MSI585.tmp
-
C:\Windows\Installer\MSI7C7C.tmp
-
C:\Windows\Installer\MSI8015.tmp
-
C:\Windows\Installer\MSI874.tmp
-
C:\Windows\Installer\MSIA98.tmp
-
C:\Windows\Installer\MSIB06.tmp
-
C:\Windows\Installer\MSIE13.tmp
-
C:\Windows\Installer\MSIF73A.tmp
-
C:\Windows\Installer\MSIF8A.tmp
-
C:\Windows\Installer\MSIFAD4.tmp
-
C:\Windows\Installer\MSIFBDE.tmp
-
C:\Windows\Installer\MSIFD55.tmp
-
\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeUpdater.dll
-
\Program Files (x86)\Adobe\Reader 9.0\Reader\authplay.dll
-
\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Updater.api
-
\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe
-
\Users\Admin\AppData\Local\Temp\Setup00000444\OSETUP.DLL
-
\Users\Admin\AppData\Local\Temp\Setup00000444\OSETUPUI.DLL
-
\Windows\Installer\MSI1075.tmp
-
\Windows\Installer\MSI1D04.tmp
-
\Windows\Installer\MSI2983.tmp
-
\Windows\Installer\MSI29B3.tmp
-
\Windows\Installer\MSI29D3.tmp
-
\Windows\Installer\MSI29F3.tmp
-
\Windows\Installer\MSI2ABF.tmp
-
\Windows\Installer\MSI2ADF.tmp
-
\Windows\Installer\MSI2E1C.tmp
-
\Windows\Installer\MSI2E2.tmp
-
\Windows\Installer\MSI2E3C.tmp
-
\Windows\Installer\MSI3CD.tmp
-
\Windows\Installer\MSI3FD.tmp
-
\Windows\Installer\MSI4C9.tmp
-
\Windows\Installer\MSI585.tmp
-
\Windows\Installer\MSI7C7C.tmp
-
\Windows\Installer\MSI8015.tmp
-
\Windows\Installer\MSI874.tmp
-
\Windows\Installer\MSIA98.tmp
-
\Windows\Installer\MSIB06.tmp
-
\Windows\Installer\MSIE13.tmp
-
\Windows\Installer\MSIF73A.tmp
-
\Windows\Installer\MSIF8A.tmp
-
\Windows\Installer\MSIFAD4.tmp
-
\Windows\Installer\MSIFBDE.tmp
-
\Windows\Installer\MSIFD55.tmp
-
memory/736-7-0x0000000000000000-mapping.dmp
-
memory/820-50-0x0000000000000000-mapping.dmp
-
memory/896-32-0x0000000000000000-mapping.dmp
-
memory/1092-91-0x0000000002D50000-0x0000000002D51000-memory.dmpFilesize
4KB
-
memory/1092-95-0x0000000009890000-0x0000000009894000-memory.dmpFilesize
16KB
-
memory/1092-94-0x000000000A890000-0x000000000A894000-memory.dmpFilesize
16KB
-
memory/1092-87-0x0000000001D10000-0x0000000001D11000-memory.dmpFilesize
4KB
-
memory/1092-92-0x00000000039C0000-0x00000000039C2000-memory.dmpFilesize
8KB
-
memory/1108-40-0x0000000000000000-mapping.dmp
-
memory/1176-98-0x0000000000000000-mapping.dmp
-
memory/1408-2-0x0000000001BC0000-0x0000000001BC1000-memory.dmpFilesize
4KB
-
memory/1556-84-0x00000000047A0000-0x00000000047A4000-memory.dmpFilesize
16KB
-
memory/1556-4-0x0000000001010000-0x0000000001012000-memory.dmpFilesize
8KB
-
memory/1556-56-0x00000000018A0000-0x00000000018A4000-memory.dmpFilesize
16KB
-
memory/1556-46-0x00000000047A0000-0x00000000047A4000-memory.dmpFilesize
16KB
-
memory/1556-76-0x00000000047A0000-0x00000000047A4000-memory.dmpFilesize
16KB
-
memory/1556-28-0x00000000011B0000-0x00000000011B2000-memory.dmpFilesize
8KB
-
memory/1556-27-0x00000000018A0000-0x00000000018A4000-memory.dmpFilesize
16KB
-
memory/1556-55-0x00000000018A0000-0x00000000018A4000-memory.dmpFilesize
16KB
-
memory/1556-54-0x0000000002660000-0x0000000002680000-memory.dmpFilesize
128KB
-
memory/1556-26-0x0000000001A10000-0x0000000001A14000-memory.dmpFilesize
16KB
-
memory/1556-105-0x0000000001370000-0x0000000001374000-memory.dmpFilesize
16KB
-
memory/1556-103-0x0000000002420000-0x0000000002424000-memory.dmpFilesize
16KB
-
memory/1556-104-0x0000000001370000-0x0000000001374000-memory.dmpFilesize
16KB
-
memory/2036-0-0x0000000002120000-0x0000000002121000-memory.dmpFilesize
4KB