Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:36
Static task
static1
Behavioral task
behavioral1
Sample
9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe
Resource
win7-20220414-en
General
-
Target
9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe
-
Size
421KB
-
MD5
bcf4313c5a74529513998ea9a3d4fefc
-
SHA1
9e4044fd6b9fae1d5b5aa7bc3dd9e83780818f35
-
SHA256
9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534
-
SHA512
2e9f74a13233a1d5ad0c1d5564c12f6d8bd1ad0377c8240cb90aeefef71264a34e1c917e5b440feb07dbd4e65e487ecb912423f8765e33e7df1c3e58690825f5
Malware Config
Signatures
-
Detects PlugX Payload 7 IoCs
resource yara_rule behavioral1/memory/1236-73-0x0000000000340000-0x000000000036D000-memory.dmp family_plugx behavioral1/memory/688-83-0x00000000002A0000-0x00000000002CD000-memory.dmp family_plugx behavioral1/memory/1668-85-0x0000000000220000-0x000000000024D000-memory.dmp family_plugx behavioral1/memory/1236-86-0x0000000000340000-0x000000000036D000-memory.dmp family_plugx behavioral1/memory/1136-91-0x0000000000320000-0x000000000034D000-memory.dmp family_plugx behavioral1/memory/1668-94-0x0000000000220000-0x000000000024D000-memory.dmp family_plugx behavioral1/memory/1136-95-0x0000000000320000-0x000000000034D000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 1724 c.exe 1236 hc.exe 688 hc.exe -
Loads dropped DLL 6 IoCs
pid Process 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 1724 c.exe 1236 hc.exe 688 hc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1292 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 svchost.exe 1668 svchost.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1136 msiexec.exe 1668 svchost.exe 1668 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1236 hc.exe Token: SeTcbPrivilege 1236 hc.exe Token: SeDebugPrivilege 688 hc.exe Token: SeTcbPrivilege 688 hc.exe Token: SeDebugPrivilege 1668 svchost.exe Token: SeTcbPrivilege 1668 svchost.exe Token: SeDebugPrivilege 1136 msiexec.exe Token: SeTcbPrivilege 1136 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1292 WINWORD.EXE 1292 WINWORD.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1292 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 28 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1872 wrote to memory of 1724 1872 9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe 29 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 1724 wrote to memory of 1236 1724 c.exe 30 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 688 wrote to memory of 1668 688 hc.exe 33 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1668 wrote to memory of 1136 1668 svchost.exe 35 PID 1292 wrote to memory of 892 1292 WINWORD.EXE 36 PID 1292 wrote to memory of 892 1292 WINWORD.EXE 36 PID 1292 wrote to memory of 892 1292 WINWORD.EXE 36 PID 1292 wrote to memory of 892 1292 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe"C:\Users\Admin\AppData\Local\Temp\9c4c4c770a018612b780162bd046fd713e6347a72a5176ed0ee3e51b11823534.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c.doc"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:892
-
-
-
C:\Users\Admin\AppData\Local\Temp\c.exe"C:\Users\Admin\AppData\Local\Temp\c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\hc\hc.exe"C:\Users\Admin\AppData\Local\Temp\hc\hc.exe" 100 17243⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Users\Admin\AppData\Local\Temp\hc\hc.exe"C:\Users\Admin\AppData\Local\Temp\hc\hc.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 16683⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD569d51f27b18cea1a2e1e2bdede6621ae
SHA1f02a66fbb16a0f8e986e30aa5d5075a7d1b1cbfb
SHA25630a862b6f45d21c829321fd4d7a0f9e91586a46453903178cae1a5913f684795
SHA512dbe64e300218ccf06ad0b355cc7fcdca040e332385eee717a5897e6ec913771581a2ae17a0a9d753f0668775fd4fd4dce7ed899e8ff0a71ddbed48fb8935d5b7
-
Filesize
306KB
MD569d51f27b18cea1a2e1e2bdede6621ae
SHA1f02a66fbb16a0f8e986e30aa5d5075a7d1b1cbfb
SHA25630a862b6f45d21c829321fd4d7a0f9e91586a46453903178cae1a5913f684795
SHA512dbe64e300218ccf06ad0b355cc7fcdca040e332385eee717a5897e6ec913771581a2ae17a0a9d753f0668775fd4fd4dce7ed899e8ff0a71ddbed48fb8935d5b7
-
Filesize
169KB
MD523f2c3dbdb65c898a11e7f4ddc598a10
SHA1cd3cc620c55dba7eaeb77a4fde5833b4ca115e9c
SHA256a67de1db8d5b8134e4ba468cbb38274d1b36d7ade8f80c58e680650c68149677
SHA5120e854e276c146cf90cea6db254e9741650336f77c31290502073f5c78fb9c8f6d1afdc67b913cd736e2330556440534e7422bdc072b482a5cdc4a5addee10c3a
-
Filesize
169KB
MD523f2c3dbdb65c898a11e7f4ddc598a10
SHA1cd3cc620c55dba7eaeb77a4fde5833b4ca115e9c
SHA256a67de1db8d5b8134e4ba468cbb38274d1b36d7ade8f80c58e680650c68149677
SHA5120e854e276c146cf90cea6db254e9741650336f77c31290502073f5c78fb9c8f6d1afdc67b913cd736e2330556440534e7422bdc072b482a5cdc4a5addee10c3a
-
Filesize
2KB
MD51a2a20f59bf7c2573a64e2fdc346c85a
SHA1e4f9b896092fc89e1959110127c959e60ac6c681
SHA256465932424b76728ab29454ba60419d288e6e7f16bba3752d2b7f4d43ba5ac25b
SHA5124a70a58df847db1e8f0ab19ca31a759b8df8cfc45f8c14236230ba5f528081604aeb6fcba5f5a035fc691629a60e490c9f1a39a46ddf531443dcbcb711d75c14
-
Filesize
111KB
MD53652107febb36846b6f0a54b789be269
SHA1c897641f38e349cc55a402c300d03e4030c16ccf
SHA2563782db6cdfe9381e33100bff53554087bad1c406e04b541034712bf4399dc125
SHA51278b1c0977d53fd54712fd5d836855d76882c137ab87828f9ea3d4411f79ec892abae2b352857b2cabeb75af71805cb5e346422a2657412e9694580a6014144dd
-
Filesize
306KB
MD569d51f27b18cea1a2e1e2bdede6621ae
SHA1f02a66fbb16a0f8e986e30aa5d5075a7d1b1cbfb
SHA25630a862b6f45d21c829321fd4d7a0f9e91586a46453903178cae1a5913f684795
SHA512dbe64e300218ccf06ad0b355cc7fcdca040e332385eee717a5897e6ec913771581a2ae17a0a9d753f0668775fd4fd4dce7ed899e8ff0a71ddbed48fb8935d5b7
-
Filesize
306KB
MD569d51f27b18cea1a2e1e2bdede6621ae
SHA1f02a66fbb16a0f8e986e30aa5d5075a7d1b1cbfb
SHA25630a862b6f45d21c829321fd4d7a0f9e91586a46453903178cae1a5913f684795
SHA512dbe64e300218ccf06ad0b355cc7fcdca040e332385eee717a5897e6ec913771581a2ae17a0a9d753f0668775fd4fd4dce7ed899e8ff0a71ddbed48fb8935d5b7
-
Filesize
306KB
MD569d51f27b18cea1a2e1e2bdede6621ae
SHA1f02a66fbb16a0f8e986e30aa5d5075a7d1b1cbfb
SHA25630a862b6f45d21c829321fd4d7a0f9e91586a46453903178cae1a5913f684795
SHA512dbe64e300218ccf06ad0b355cc7fcdca040e332385eee717a5897e6ec913771581a2ae17a0a9d753f0668775fd4fd4dce7ed899e8ff0a71ddbed48fb8935d5b7
-
Filesize
169KB
MD523f2c3dbdb65c898a11e7f4ddc598a10
SHA1cd3cc620c55dba7eaeb77a4fde5833b4ca115e9c
SHA256a67de1db8d5b8134e4ba468cbb38274d1b36d7ade8f80c58e680650c68149677
SHA5120e854e276c146cf90cea6db254e9741650336f77c31290502073f5c78fb9c8f6d1afdc67b913cd736e2330556440534e7422bdc072b482a5cdc4a5addee10c3a
-
Filesize
2KB
MD51a2a20f59bf7c2573a64e2fdc346c85a
SHA1e4f9b896092fc89e1959110127c959e60ac6c681
SHA256465932424b76728ab29454ba60419d288e6e7f16bba3752d2b7f4d43ba5ac25b
SHA5124a70a58df847db1e8f0ab19ca31a759b8df8cfc45f8c14236230ba5f528081604aeb6fcba5f5a035fc691629a60e490c9f1a39a46ddf531443dcbcb711d75c14
-
Filesize
2KB
MD51a2a20f59bf7c2573a64e2fdc346c85a
SHA1e4f9b896092fc89e1959110127c959e60ac6c681
SHA256465932424b76728ab29454ba60419d288e6e7f16bba3752d2b7f4d43ba5ac25b
SHA5124a70a58df847db1e8f0ab19ca31a759b8df8cfc45f8c14236230ba5f528081604aeb6fcba5f5a035fc691629a60e490c9f1a39a46ddf531443dcbcb711d75c14