Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-04-2022 21:58
Static task
static1
Behavioral task
behavioral1
Sample
document.rtf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
document.rtf
Resource
win10v2004-20220414-en
General
-
Target
document.rtf
-
Size
21KB
-
MD5
7eaf1191dd524f013b3da5637cc65020
-
SHA1
83f34f15b36102026280e53cb2b44cbb24f03104
-
SHA256
177d47fb1686f807548d86cccc3c1783125a02b197e827981e842a7fe273fd13
-
SHA512
670f3fe1878a7e478321e3c7baf2c8833891b03bfd56afbfa7bcc9cf4b81be3ecda12c51a3866c75ae18bc7074f5408a334eaf4db67d5d466a48ae390889f702
Malware Config
Extracted
xloader
2.5
a2c8
sethdukes.online
hustl-hk.com
alienspacebabes.com
yitongbag.com
adlichoob.com
wejust5.com
wwwsnapfinancial.com
patriotcapitalgroupllc.com
divaconnectionbuild.com
adventureventures.net
jaromer.net
closureservices.com
sdc-english.com
fleet-lab.com
gtgits.com
clinicaorion.com
deleaderainfluenceur.com
honghuamach.net
638661.com
sleepgenies.info
strtplay2day.info
ellsworthfunds.com
workthered.com
handsomered.com
6953.online
discover4two.com
yshengxiang.com
thenicnackgyrls.com
deathtohope.com
lhdtrj.com
primedispatchers.com
rojosusa.com
ekini.online
hdlypx.com
trendsplayers.xyz
inclusichecks.com
idm-convention.com
efp-advisors.com
kansaslivestockfoundation.com
2020taxpros.com
chesexamprep.com
fking.biz
vmhenterprise.com
cherrythechickenandfriends.com
unheek.com
somnoengineering.com
aaraeg.net
jbzisha.com
healthoffword.xyz
redis76.com
gigtex.com
schoolaccred.net
vadiemfg.com
tbrme.plus
icdmeister.com
sunshinecoastfashion.com
babypasal.com
kaizenswinger.com
apfllcadvisors.com
cheffumeur.com
luzider-traum.net
functionalsoft.com
toityzvolat.quest
awla-bus.com
westexeurope.com
Signatures
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-74-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1828-75-0x000000000041D3A0-mapping.dmp xloader behavioral1/memory/1828-79-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/640-85-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid Process 3 2020 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
vbc.exepkqvhvquh.exepkqvhvquh.exepid Process 1704 vbc.exe 1324 pkqvhvquh.exe 1828 pkqvhvquh.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXEvbc.exepkqvhvquh.exepid Process 2020 EQNEDT32.EXE 1704 vbc.exe 1704 vbc.exe 1324 pkqvhvquh.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
pkqvhvquh.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\lfrlfiiuq = "C:\\Users\\Admin\\AppData\\Roaming\\ofhxtuqkrc\\mfmfycmde.exe" pkqvhvquh.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
pkqvhvquh.exepkqvhvquh.exesvchost.exedescription pid Process procid_target PID 1324 set thread context of 1828 1324 pkqvhvquh.exe 34 PID 1828 set thread context of 1224 1828 pkqvhvquh.exe 15 PID 640 set thread context of 1224 640 svchost.exe 15 -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
WINWORD.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid Process 1392 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
pkqvhvquh.exesvchost.exepid Process 1828 pkqvhvquh.exe 1828 pkqvhvquh.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe 640 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
pkqvhvquh.exesvchost.exepid Process 1828 pkqvhvquh.exe 1828 pkqvhvquh.exe 1828 pkqvhvquh.exe 640 svchost.exe 640 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pkqvhvquh.exesvchost.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 1828 pkqvhvquh.exe Token: SeDebugPrivilege 640 svchost.exe Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid Process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid Process 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid Process 1392 WINWORD.EXE 1392 WINWORD.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
EQNEDT32.EXEvbc.exepkqvhvquh.exeExplorer.EXEsvchost.exeWINWORD.EXEdescription pid Process procid_target PID 2020 wrote to memory of 1704 2020 EQNEDT32.EXE 30 PID 2020 wrote to memory of 1704 2020 EQNEDT32.EXE 30 PID 2020 wrote to memory of 1704 2020 EQNEDT32.EXE 30 PID 2020 wrote to memory of 1704 2020 EQNEDT32.EXE 30 PID 1704 wrote to memory of 1324 1704 vbc.exe 31 PID 1704 wrote to memory of 1324 1704 vbc.exe 31 PID 1704 wrote to memory of 1324 1704 vbc.exe 31 PID 1704 wrote to memory of 1324 1704 vbc.exe 31 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1324 wrote to memory of 1828 1324 pkqvhvquh.exe 34 PID 1224 wrote to memory of 640 1224 Explorer.EXE 36 PID 1224 wrote to memory of 640 1224 Explorer.EXE 36 PID 1224 wrote to memory of 640 1224 Explorer.EXE 36 PID 1224 wrote to memory of 640 1224 Explorer.EXE 36 PID 640 wrote to memory of 768 640 svchost.exe 37 PID 640 wrote to memory of 768 640 svchost.exe 37 PID 640 wrote to memory of 768 640 svchost.exe 37 PID 640 wrote to memory of 768 640 svchost.exe 37 PID 1392 wrote to memory of 1632 1392 WINWORD.EXE 39 PID 1392 wrote to memory of 1632 1392 WINWORD.EXE 39 PID 1392 wrote to memory of 1632 1392 WINWORD.EXE 39 PID 1392 wrote to memory of 1632 1392 WINWORD.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\document.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1632
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\pkqvhvquh.exe"3⤵PID:768
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\pkqvhvquh.exeC:\Users\Admin\AppData\Local\Temp\pkqvhvquh.exe C:\Users\Admin\AppData\Local\Temp\sfclhvjg3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\pkqvhvquh.exeC:\Users\Admin\AppData\Local\Temp\pkqvhvquh.exe C:\Users\Admin\AppData\Local\Temp\sfclhvjg4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5a4df8b94280c196485ffd4b96d5096cd
SHA1c9945b172ca5db6460b795406bc86c17529c47fe
SHA256ea34fa896c5ec70f9d80f2cf96d681c739f6ea5a26f5d51f90716f91b902d376
SHA512c46ea9e76262a59d4b34bf533c87baac9316dbe36a1990866c8042ea666410a9d82e03fed333869184b3b8517b906105526a77442525d756752e6c017ec1a02f
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
7KB
MD52a5a9325a089fc3e74c4d6c82593e284
SHA1433ffa18cd6ba5979a3d4dc41b9d9bcd9204099c
SHA2567f46a014400d81509c35e6a8114bf791ae673050f8ab13008917cce00fe98983
SHA512b5c50a1c5b837338c6332a9397404dfa828ec85534790b1f0728b4b462e873f31f09c4cfa7655255cbbf4840eb89af26007d5b6f5c264e6f40ebb66dd6884cd1
-
Filesize
446KB
MD571895780eaa4fe577e5d406cb84e150e
SHA1e798fb18a9ddf2510cdbc536dd96144661ca8ea8
SHA256c43a9d3d87d5ce17e61de74587b9a1e4aa0250aae1fa6dde4e392e6de187b096
SHA512d78eeff6df29a1f3a6e2366746fbbf1fa58595ed3ddbf491d9e5bdb34aa060306b219c916ff4e39bb3c35a6a9f4700753515067d531bcc774f5303fa6b1ed3fd
-
Filesize
446KB
MD571895780eaa4fe577e5d406cb84e150e
SHA1e798fb18a9ddf2510cdbc536dd96144661ca8ea8
SHA256c43a9d3d87d5ce17e61de74587b9a1e4aa0250aae1fa6dde4e392e6de187b096
SHA512d78eeff6df29a1f3a6e2366746fbbf1fa58595ed3ddbf491d9e5bdb34aa060306b219c916ff4e39bb3c35a6a9f4700753515067d531bcc774f5303fa6b1ed3fd
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
5KB
MD58df2b872f8df8935914ac1db60ab1097
SHA19d88c7236639324e919e0580a38d1650b1095307
SHA25650cd513f82edc742cbab4cbd8415b94410d23992bb85709fae0197eb006186f2
SHA512a85b74e6188e7bc73d7cd801233be27a7e2d515b9ffaf41500629ad52a02644594e6ffad579dca5c5f34a0a25a8216298ae74436ced63f807bc88a046e2c4b56
-
Filesize
446KB
MD571895780eaa4fe577e5d406cb84e150e
SHA1e798fb18a9ddf2510cdbc536dd96144661ca8ea8
SHA256c43a9d3d87d5ce17e61de74587b9a1e4aa0250aae1fa6dde4e392e6de187b096
SHA512d78eeff6df29a1f3a6e2366746fbbf1fa58595ed3ddbf491d9e5bdb34aa060306b219c916ff4e39bb3c35a6a9f4700753515067d531bcc774f5303fa6b1ed3fd