Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
06-07-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
ce60eac9955b4024e75b0fe7c3f5114c75c6beec8d5da1d1b0341659fdaacffb.rtf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ce60eac9955b4024e75b0fe7c3f5114c75c6beec8d5da1d1b0341659fdaacffb.rtf
Resource
win10v2004-20220414-en
General
-
Target
ce60eac9955b4024e75b0fe7c3f5114c75c6beec8d5da1d1b0341659fdaacffb.rtf
-
Size
925KB
-
MD5
ded902874fc3f5a79fef983cff9f4b3d
-
SHA1
61e28a4ae7d38458abd251a202a21ea31af2c264
-
SHA256
ce60eac9955b4024e75b0fe7c3f5114c75c6beec8d5da1d1b0341659fdaacffb
-
SHA512
1421b04298497abc59ee034633d70660ff11d603ab8bbf7e214bde4d0515e82bb68554f96b0eb9f25263762c817138c2b4d832cc6fdfc2acd77146529f6e2ede
Malware Config
Extracted
formbook
4.1
po23
jacknull.xyz
commonellc.com
topnotchconstructor.com
thescienceofrecruiting.com
bellydancer.company
iforyo.com
hotgirlsseeking24.online
pelleycivil.com
plumblersnearme.com
helpfundabortionohio.com
wineandview.com
youfather.xyz
xsjxly.com
bnfconsults.com
apeholder.com
oldbutterflyevict.space
nara-happylife.com
frontmountedattachments.com
polizzastore.com
bettor-weather.com
vivisportshoes.com
vpsyxney.com
metaphysicalbiohacker.com
web-kontor-hamburg.com
419car.com
o-vertbastiais.com
handsofchia.com
sherispeakssocial.com
idola88.win
layeredbylayne.com
makoto-car.com
bufordsinglestoryhomeslist.com
grow-wings.net
honey-clothing.net
houseofdavidonline.com
aaahp.xyz
20gotas.com
hdamxpj.com
redirect53v.direct
gctomoney.com
dgluxuries.com
023xqbj.com
exulthome.com
chuanghuisz.net
sarvesh.land
squadly.net
universityofwinchester.com
rainbowranchojai.com
hookcrafty.com
jesusdosreis.com
grumfez.online
xaruilan.com
reindeer-exist.com
scarecrowdriver.com
mindamics.com
aqgree.com
fcsbssb.com
hautewired.com
shareingale.com
saborrumbero.com
virtualmichigan.xyz
meranti.pro
cavarma.com
liamhold.com
uscreditgroup.xyz
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Formbook Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-104-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral1/memory/1600-107-0x0000000000000000-mapping.dmp formbook behavioral1/memory/1600-123-0x0000000010410000-0x000000001043F000-memory.dmp formbook behavioral1/memory/1696-127-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
ModiLoader Second Stage 31 IoCs
Processes:
resource yara_rule behavioral1/memory/1528-77-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-78-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-80-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-79-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-84-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-83-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-82-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-81-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-88-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-87-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-86-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-85-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-92-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-93-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-91-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-90-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-89-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-94-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-96-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-95-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-97-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-98-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-99-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-102-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-101-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-100-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-108-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-111-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-110-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-112-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 behavioral1/memory/1528-115-0x0000000004430000-0x0000000004485000-memory.dmp modiloader_stage2 -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 1 1548 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
tempSdgsvdsnoxyudmlywtui.exepid process 1528 tempSdgsvdsnoxyudmlywtui.exe -
Loads dropped DLL 2 IoCs
Processes:
EQNEDT32.EXEpid process 1548 EQNEDT32.EXE 1548 EQNEDT32.EXE -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DpiScaling.exeNETSTAT.EXEdescription pid process target process PID 1600 set thread context of 1268 1600 DpiScaling.exe Explorer.EXE PID 1696 set thread context of 1268 1696 NETSTAT.EXE Explorer.EXE -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 1696 NETSTAT.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1224 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
DpiScaling.exeNETSTAT.EXEpid process 1600 DpiScaling.exe 1600 DpiScaling.exe 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE 1696 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DpiScaling.exeNETSTAT.EXEpid process 1600 DpiScaling.exe 1600 DpiScaling.exe 1600 DpiScaling.exe 1696 NETSTAT.EXE 1696 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
DpiScaling.exeNETSTAT.EXEExplorer.EXEdescription pid process Token: SeDebugPrivilege 1600 DpiScaling.exe Token: SeDebugPrivilege 1696 NETSTAT.EXE Token: SeShutdownPrivilege 1268 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1224 WINWORD.EXE 1224 WINWORD.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
EQNEDT32.EXEtempSdgsvdsnoxyudmlywtui.exeExplorer.EXEWINWORD.EXENETSTAT.EXEdescription pid process target process PID 1548 wrote to memory of 1528 1548 EQNEDT32.EXE tempSdgsvdsnoxyudmlywtui.exe PID 1548 wrote to memory of 1528 1548 EQNEDT32.EXE tempSdgsvdsnoxyudmlywtui.exe PID 1548 wrote to memory of 1528 1548 EQNEDT32.EXE tempSdgsvdsnoxyudmlywtui.exe PID 1548 wrote to memory of 1528 1548 EQNEDT32.EXE tempSdgsvdsnoxyudmlywtui.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1528 wrote to memory of 1600 1528 tempSdgsvdsnoxyudmlywtui.exe DpiScaling.exe PID 1268 wrote to memory of 1696 1268 Explorer.EXE NETSTAT.EXE PID 1268 wrote to memory of 1696 1268 Explorer.EXE NETSTAT.EXE PID 1268 wrote to memory of 1696 1268 Explorer.EXE NETSTAT.EXE PID 1268 wrote to memory of 1696 1268 Explorer.EXE NETSTAT.EXE PID 1224 wrote to memory of 1484 1224 WINWORD.EXE splwow64.exe PID 1224 wrote to memory of 1484 1224 WINWORD.EXE splwow64.exe PID 1224 wrote to memory of 1484 1224 WINWORD.EXE splwow64.exe PID 1224 wrote to memory of 1484 1224 WINWORD.EXE splwow64.exe PID 1696 wrote to memory of 1380 1696 NETSTAT.EXE cmd.exe PID 1696 wrote to memory of 1380 1696 NETSTAT.EXE cmd.exe PID 1696 wrote to memory of 1380 1696 NETSTAT.EXE cmd.exe PID 1696 wrote to memory of 1380 1696 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ce60eac9955b4024e75b0fe7c3f5114c75c6beec8d5da1d1b0341659fdaacffb.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exe"C:\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exeFilesize
1.0MB
MD54942c83e6f8149c8ee9765f3c2b27bc7
SHA1caf483ee54b09acc8b18a298ba42283260906687
SHA2560b576117983f942d005bd209239752290a0f97a9b0be5326f4f2d76c8ee416e0
SHA5124033e41aa44513ad425f7e6f0256a28f0a15b7419e7adf45edca82baf5894a0819b57521e9366273ef333d7fdbc154482efa36a9a6e06dddbf7119ffa2485383
-
C:\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exeFilesize
1.0MB
MD54942c83e6f8149c8ee9765f3c2b27bc7
SHA1caf483ee54b09acc8b18a298ba42283260906687
SHA2560b576117983f942d005bd209239752290a0f97a9b0be5326f4f2d76c8ee416e0
SHA5124033e41aa44513ad425f7e6f0256a28f0a15b7419e7adf45edca82baf5894a0819b57521e9366273ef333d7fdbc154482efa36a9a6e06dddbf7119ffa2485383
-
\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exeFilesize
1.0MB
MD54942c83e6f8149c8ee9765f3c2b27bc7
SHA1caf483ee54b09acc8b18a298ba42283260906687
SHA2560b576117983f942d005bd209239752290a0f97a9b0be5326f4f2d76c8ee416e0
SHA5124033e41aa44513ad425f7e6f0256a28f0a15b7419e7adf45edca82baf5894a0819b57521e9366273ef333d7fdbc154482efa36a9a6e06dddbf7119ffa2485383
-
\Users\Admin\AppData\Roaming\tempSdgsvdsnoxyudmlywtui.exeFilesize
1.0MB
MD54942c83e6f8149c8ee9765f3c2b27bc7
SHA1caf483ee54b09acc8b18a298ba42283260906687
SHA2560b576117983f942d005bd209239752290a0f97a9b0be5326f4f2d76c8ee416e0
SHA5124033e41aa44513ad425f7e6f0256a28f0a15b7419e7adf45edca82baf5894a0819b57521e9366273ef333d7fdbc154482efa36a9a6e06dddbf7119ffa2485383
-
memory/1224-58-0x0000000076531000-0x0000000076533000-memory.dmpFilesize
8KB
-
memory/1224-132-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1224-54-0x0000000072AA1000-0x0000000072AA4000-memory.dmpFilesize
12KB
-
memory/1224-57-0x000000007150D000-0x0000000071518000-memory.dmpFilesize
44KB
-
memory/1224-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1224-55-0x0000000070521000-0x0000000070523000-memory.dmpFilesize
8KB
-
memory/1224-67-0x000000007150D000-0x0000000071518000-memory.dmpFilesize
44KB
-
memory/1268-133-0x0000000006500000-0x000000000659C000-memory.dmpFilesize
624KB
-
memory/1268-131-0x0000000006500000-0x000000000659C000-memory.dmpFilesize
624KB
-
memory/1268-130-0x00000000063C0000-0x00000000064FA000-memory.dmpFilesize
1.2MB
-
memory/1268-116-0x00000000063C0000-0x00000000064FA000-memory.dmpFilesize
1.2MB
-
memory/1380-124-0x0000000000000000-mapping.dmp
-
memory/1484-125-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmpFilesize
8KB
-
memory/1484-120-0x0000000000000000-mapping.dmp
-
memory/1528-95-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-101-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-87-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-86-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-85-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-92-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-93-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-91-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-90-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-89-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-94-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-96-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-81-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-97-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-98-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-99-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-102-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-84-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-100-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-104-0x0000000010410000-0x000000001043F000-memory.dmpFilesize
188KB
-
memory/1528-62-0x0000000000000000-mapping.dmp
-
memory/1528-88-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-108-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-111-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-110-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-112-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-82-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-77-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-115-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-83-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-78-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-80-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1528-79-0x0000000004430000-0x0000000004485000-memory.dmpFilesize
340KB
-
memory/1600-107-0x0000000000000000-mapping.dmp
-
memory/1600-122-0x00000000002A0000-0x00000000002B4000-memory.dmpFilesize
80KB
-
memory/1600-123-0x0000000010410000-0x000000001043F000-memory.dmpFilesize
188KB
-
memory/1600-114-0x0000000002040000-0x0000000002343000-memory.dmpFilesize
3.0MB
-
memory/1600-105-0x0000000010410000-0x000000001043F000-memory.dmpFilesize
188KB
-
memory/1696-126-0x0000000000440000-0x0000000000449000-memory.dmpFilesize
36KB
-
memory/1696-127-0x0000000000080000-0x00000000000AF000-memory.dmpFilesize
188KB
-
memory/1696-128-0x00000000020C0000-0x00000000023C3000-memory.dmpFilesize
3.0MB
-
memory/1696-129-0x0000000001F30000-0x0000000001FC3000-memory.dmpFilesize
588KB
-
memory/1696-121-0x0000000000000000-mapping.dmp