Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 10:18
Behavioral task
behavioral1
Sample
a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe
Resource
win7-20220812-en
General
-
Target
a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe
-
Size
255KB
-
MD5
5c28d79e821071f5c69092dcf826ba5f
-
SHA1
64d69a492d224e0a1d9605b00826bb6cb2c5793a
-
SHA256
a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94
-
SHA512
e18f91e0d5ed860399f8288ba47f5077695ec839e5191d3e9f6044d2c5b998983c2c07077cdc5fd85ede880774b800a51aa60cdc68145856625c787e56050b56
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ5:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lkzgywudgm.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lkzgywudgm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lkzgywudgm.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lkzgywudgm.exe -
Executes dropped EXE 6 IoCs
pid Process 1628 lkzgywudgm.exe 948 mxdubomcyvgzfge.exe 1568 rowfbheh.exe 1452 pedsrpneqplrj.exe 564 rowfbheh.exe 1484 pedsrpneqplrj.exe -
resource yara_rule behavioral1/memory/1788-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000a00000001318e-60.dat upx behavioral1/files/0x000c0000000054a8-62.dat upx behavioral1/files/0x00080000000133d3-64.dat upx behavioral1/files/0x000a00000001318e-63.dat upx behavioral1/files/0x00080000000133d3-67.dat upx behavioral1/files/0x00070000000133e5-69.dat upx behavioral1/files/0x00080000000133d3-71.dat upx behavioral1/files/0x00070000000133e5-72.dat upx behavioral1/files/0x000a00000001318e-73.dat upx behavioral1/files/0x00070000000133e5-75.dat upx behavioral1/files/0x00080000000133d3-78.dat upx behavioral1/files/0x00080000000133d3-76.dat upx behavioral1/files/0x00070000000133e5-81.dat upx behavioral1/files/0x00070000000133e5-83.dat upx behavioral1/memory/1788-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1628-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/948-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1568-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1452-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/564-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1484-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0002000000003d1f-96.dat upx behavioral1/memory/1628-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/948-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1568-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1452-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/564-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1484-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000600000001434d-108.dat upx -
Loads dropped DLL 6 IoCs
pid Process 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1628 lkzgywudgm.exe 364 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lkzgywudgm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nxtbmwxn = "mxdubomcyvgzfge.exe" mxdubomcyvgzfge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "pedsrpneqplrj.exe" mxdubomcyvgzfge.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mxdubomcyvgzfge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dbvhftxo = "lkzgywudgm.exe" mxdubomcyvgzfge.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: rowfbheh.exe File opened (read-only) \??\p: rowfbheh.exe File opened (read-only) \??\x: rowfbheh.exe File opened (read-only) \??\f: rowfbheh.exe File opened (read-only) \??\r: rowfbheh.exe File opened (read-only) \??\h: lkzgywudgm.exe File opened (read-only) \??\w: lkzgywudgm.exe File opened (read-only) \??\t: rowfbheh.exe File opened (read-only) \??\b: rowfbheh.exe File opened (read-only) \??\b: lkzgywudgm.exe File opened (read-only) \??\j: lkzgywudgm.exe File opened (read-only) \??\n: lkzgywudgm.exe File opened (read-only) \??\e: lkzgywudgm.exe File opened (read-only) \??\f: lkzgywudgm.exe File opened (read-only) \??\r: rowfbheh.exe File opened (read-only) \??\k: rowfbheh.exe File opened (read-only) \??\u: rowfbheh.exe File opened (read-only) \??\v: rowfbheh.exe File opened (read-only) \??\a: lkzgywudgm.exe File opened (read-only) \??\l: lkzgywudgm.exe File opened (read-only) \??\p: lkzgywudgm.exe File opened (read-only) \??\b: rowfbheh.exe File opened (read-only) \??\q: rowfbheh.exe File opened (read-only) \??\g: rowfbheh.exe File opened (read-only) \??\q: rowfbheh.exe File opened (read-only) \??\k: lkzgywudgm.exe File opened (read-only) \??\u: lkzgywudgm.exe File opened (read-only) \??\j: rowfbheh.exe File opened (read-only) \??\o: rowfbheh.exe File opened (read-only) \??\z: rowfbheh.exe File opened (read-only) \??\j: rowfbheh.exe File opened (read-only) \??\q: lkzgywudgm.exe File opened (read-only) \??\a: rowfbheh.exe File opened (read-only) \??\n: rowfbheh.exe File opened (read-only) \??\h: rowfbheh.exe File opened (read-only) \??\r: lkzgywudgm.exe File opened (read-only) \??\x: lkzgywudgm.exe File opened (read-only) \??\y: lkzgywudgm.exe File opened (read-only) \??\m: rowfbheh.exe File opened (read-only) \??\w: rowfbheh.exe File opened (read-only) \??\x: rowfbheh.exe File opened (read-only) \??\s: lkzgywudgm.exe File opened (read-only) \??\t: lkzgywudgm.exe File opened (read-only) \??\v: lkzgywudgm.exe File opened (read-only) \??\y: rowfbheh.exe File opened (read-only) \??\i: lkzgywudgm.exe File opened (read-only) \??\z: lkzgywudgm.exe File opened (read-only) \??\e: rowfbheh.exe File opened (read-only) \??\a: rowfbheh.exe File opened (read-only) \??\i: rowfbheh.exe File opened (read-only) \??\m: rowfbheh.exe File opened (read-only) \??\o: rowfbheh.exe File opened (read-only) \??\s: rowfbheh.exe File opened (read-only) \??\l: rowfbheh.exe File opened (read-only) \??\p: rowfbheh.exe File opened (read-only) \??\z: rowfbheh.exe File opened (read-only) \??\y: rowfbheh.exe File opened (read-only) \??\e: rowfbheh.exe File opened (read-only) \??\n: rowfbheh.exe File opened (read-only) \??\u: rowfbheh.exe File opened (read-only) \??\g: lkzgywudgm.exe File opened (read-only) \??\m: lkzgywudgm.exe File opened (read-only) \??\i: rowfbheh.exe File opened (read-only) \??\l: rowfbheh.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lkzgywudgm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lkzgywudgm.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1788-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1788-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1628-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/948-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1568-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1452-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/564-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1484-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1628-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/948-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1568-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1452-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/564-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1484-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\lkzgywudgm.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\SysWOW64\lkzgywudgm.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\SysWOW64\mxdubomcyvgzfge.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\SysWOW64\pedsrpneqplrj.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lkzgywudgm.exe File created C:\Windows\SysWOW64\mxdubomcyvgzfge.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File created C:\Windows\SysWOW64\rowfbheh.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\SysWOW64\rowfbheh.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File created C:\Windows\SysWOW64\pedsrpneqplrj.exe a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification \??\c:\Program Files\UninstallClear.doc.exe rowfbheh.exe File opened for modification C:\Program Files\UninstallClear.doc.exe rowfbheh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rowfbheh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rowfbheh.exe File created \??\c:\Program Files\UninstallClear.doc.exe rowfbheh.exe File opened for modification C:\Program Files\UninstallClear.nal rowfbheh.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rowfbheh.exe File opened for modification C:\Program Files\UninstallClear.doc.exe rowfbheh.exe File opened for modification \??\c:\Program Files\UninstallClear.doc.exe rowfbheh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rowfbheh.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rowfbheh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rowfbheh.exe File opened for modification C:\Program Files\UninstallClear.nal rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rowfbheh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rowfbheh.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB2B15A4490399D53CCBAA132E9D7CE" a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lkzgywudgm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc lkzgywudgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334F2C0A9D2383586D3577D777232CDA7DF264AF" a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 452 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 564 rowfbheh.exe 564 rowfbheh.exe 564 rowfbheh.exe 564 rowfbheh.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 564 rowfbheh.exe 564 rowfbheh.exe 564 rowfbheh.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1628 lkzgywudgm.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 1568 rowfbheh.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 948 mxdubomcyvgzfge.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 1452 pedsrpneqplrj.exe 564 rowfbheh.exe 564 rowfbheh.exe 564 rowfbheh.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe 1484 pedsrpneqplrj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 452 WINWORD.EXE 452 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1628 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 27 PID 1788 wrote to memory of 1628 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 27 PID 1788 wrote to memory of 1628 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 27 PID 1788 wrote to memory of 1628 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 27 PID 1788 wrote to memory of 948 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 28 PID 1788 wrote to memory of 948 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 28 PID 1788 wrote to memory of 948 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 28 PID 1788 wrote to memory of 948 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 28 PID 1788 wrote to memory of 1568 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 29 PID 1788 wrote to memory of 1568 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 29 PID 1788 wrote to memory of 1568 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 29 PID 1788 wrote to memory of 1568 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 29 PID 1788 wrote to memory of 1452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 30 PID 1788 wrote to memory of 1452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 30 PID 1788 wrote to memory of 1452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 30 PID 1788 wrote to memory of 1452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 30 PID 1628 wrote to memory of 564 1628 lkzgywudgm.exe 33 PID 1628 wrote to memory of 564 1628 lkzgywudgm.exe 33 PID 1628 wrote to memory of 564 1628 lkzgywudgm.exe 33 PID 1628 wrote to memory of 564 1628 lkzgywudgm.exe 33 PID 948 wrote to memory of 364 948 mxdubomcyvgzfge.exe 32 PID 948 wrote to memory of 364 948 mxdubomcyvgzfge.exe 32 PID 948 wrote to memory of 364 948 mxdubomcyvgzfge.exe 32 PID 948 wrote to memory of 364 948 mxdubomcyvgzfge.exe 32 PID 364 wrote to memory of 1484 364 cmd.exe 34 PID 364 wrote to memory of 1484 364 cmd.exe 34 PID 364 wrote to memory of 1484 364 cmd.exe 34 PID 364 wrote to memory of 1484 364 cmd.exe 34 PID 1788 wrote to memory of 452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 35 PID 1788 wrote to memory of 452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 35 PID 1788 wrote to memory of 452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 35 PID 1788 wrote to memory of 452 1788 a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe 35 PID 452 wrote to memory of 1304 452 WINWORD.EXE 39 PID 452 wrote to memory of 1304 452 WINWORD.EXE 39 PID 452 wrote to memory of 1304 452 WINWORD.EXE 39 PID 452 wrote to memory of 1304 452 WINWORD.EXE 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe"C:\Users\Admin\AppData\Local\Temp\a68246a07e3c256e4eac750dfc5458e2eebe23cae1c7e60bd8e63feca8c60a94.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\lkzgywudgm.exelkzgywudgm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rowfbheh.exeC:\Windows\system32\rowfbheh.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:564
-
-
-
C:\Windows\SysWOW64\mxdubomcyvgzfge.exemxdubomcyvgzfge.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\cmd.execmd.exe /c pedsrpneqplrj.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\pedsrpneqplrj.exepedsrpneqplrj.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1484
-
-
-
-
C:\Windows\SysWOW64\rowfbheh.exerowfbheh.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1568
-
-
C:\Windows\SysWOW64\pedsrpneqplrj.exepedsrpneqplrj.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1452
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1304
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5c6624676bfbe84ff67f9677c7b586ceb
SHA192dde1e11b9959e5bf52d8886387b45d22df3186
SHA256b4f948c42ed9d399c27004016d24fbcb966d424c2edf570ba1fdd222e89555a6
SHA5122c1afee9265ae637607ee591e0fb853fa02b448fea6a23d6edb16a2b926505fd933eee03fb5d8bacb5cbdb43faa13a92f15eb38b3f3af5bbdf76fb1a13d1c9b3
-
Filesize
255KB
MD5635e288e0cf562d3fa15b8bd6c1cedae
SHA1dddf3489dc03b85002381965f78a108de304df9d
SHA25641d8922a76104b90c279dae174bec64b2e10b40591c76b6b9df19641025999ae
SHA51265aab24e951aeda54d3b407240a312d9e18013f7d85a551b5b0623d3be59f15f02bc8bf32b388851f6f0d64bdc3fcefdd32bd72eee565eb69c03eafc38853779
-
Filesize
255KB
MD5df1f149763fd07ac9abdd0b6cde4239f
SHA1b1229564dea913d7ccb0e2acf366092401ec18aa
SHA2565f25ba7daf243c0470098facef5c1bf3b7a93a40dee2b735edf5a7dfbb47d19b
SHA51204c62b5e5d5d8409b04efb24a0a90fff3078bbe4ff0cbf9595a2f8e61297cab0ebead12a3f0e291365696045f0ff528c1e1fc89406fcad4fc1e8d59af7c1f2a2
-
Filesize
255KB
MD5df1f149763fd07ac9abdd0b6cde4239f
SHA1b1229564dea913d7ccb0e2acf366092401ec18aa
SHA2565f25ba7daf243c0470098facef5c1bf3b7a93a40dee2b735edf5a7dfbb47d19b
SHA51204c62b5e5d5d8409b04efb24a0a90fff3078bbe4ff0cbf9595a2f8e61297cab0ebead12a3f0e291365696045f0ff528c1e1fc89406fcad4fc1e8d59af7c1f2a2
-
Filesize
255KB
MD5311ad00c1dc7cb15e73f798cfdc72a15
SHA1e2110efef3d36130fb1cb2d1c988a187d4e4849c
SHA2566511743e3c7ebdcc704c9b1de0db8a5331fd9de30f78004af19e9bc8eb28ff33
SHA512ceb484d6c1a27f3b8390c09b0a1a112b48606d9010c7f1312d4677b3d89cdd093b39b0ff65f116b76c52b85c2e28ad5f57e891085c183c4f8b4b3313dbb1c2b8
-
Filesize
255KB
MD5311ad00c1dc7cb15e73f798cfdc72a15
SHA1e2110efef3d36130fb1cb2d1c988a187d4e4849c
SHA2566511743e3c7ebdcc704c9b1de0db8a5331fd9de30f78004af19e9bc8eb28ff33
SHA512ceb484d6c1a27f3b8390c09b0a1a112b48606d9010c7f1312d4677b3d89cdd093b39b0ff65f116b76c52b85c2e28ad5f57e891085c183c4f8b4b3313dbb1c2b8
-
Filesize
255KB
MD53dbe1888c3397d2d6b9952a0839621ea
SHA1b7c7f8f14d9312a780908462df93759750375e37
SHA256442eedc7fa3bafb4492184ce136ef1260e5ae26407077b15ec25ea60466010b2
SHA512006904719a62d9b6d14f16fc56675c829ffad26435ad69b8b2b6c1b73dd54b15c83e09e9f28801ef41dffadb32a1981addb43eac1cdc56a9d613b726a6bbaa95
-
Filesize
255KB
MD53dbe1888c3397d2d6b9952a0839621ea
SHA1b7c7f8f14d9312a780908462df93759750375e37
SHA256442eedc7fa3bafb4492184ce136ef1260e5ae26407077b15ec25ea60466010b2
SHA512006904719a62d9b6d14f16fc56675c829ffad26435ad69b8b2b6c1b73dd54b15c83e09e9f28801ef41dffadb32a1981addb43eac1cdc56a9d613b726a6bbaa95
-
Filesize
255KB
MD53dbe1888c3397d2d6b9952a0839621ea
SHA1b7c7f8f14d9312a780908462df93759750375e37
SHA256442eedc7fa3bafb4492184ce136ef1260e5ae26407077b15ec25ea60466010b2
SHA512006904719a62d9b6d14f16fc56675c829ffad26435ad69b8b2b6c1b73dd54b15c83e09e9f28801ef41dffadb32a1981addb43eac1cdc56a9d613b726a6bbaa95
-
Filesize
255KB
MD5a3c88afa5549011e0e3cf695f86bff40
SHA17262f91eb8ddf4f372bb43a248a35cb54e1d79b8
SHA256b3a83d4ce4d48df00a3df0a1d875fa96c16b95ce216cfb12c90b0c336e05b9f2
SHA51267b1e66f0f649433d8ce48dd20dc85015eed38c8644a740d2e17119018d8eb04c709a309541a159843f30eca1b0cd9d1de02a40024b729fa5f336ece755797e0
-
Filesize
255KB
MD5a3c88afa5549011e0e3cf695f86bff40
SHA17262f91eb8ddf4f372bb43a248a35cb54e1d79b8
SHA256b3a83d4ce4d48df00a3df0a1d875fa96c16b95ce216cfb12c90b0c336e05b9f2
SHA51267b1e66f0f649433d8ce48dd20dc85015eed38c8644a740d2e17119018d8eb04c709a309541a159843f30eca1b0cd9d1de02a40024b729fa5f336ece755797e0
-
Filesize
255KB
MD5a3c88afa5549011e0e3cf695f86bff40
SHA17262f91eb8ddf4f372bb43a248a35cb54e1d79b8
SHA256b3a83d4ce4d48df00a3df0a1d875fa96c16b95ce216cfb12c90b0c336e05b9f2
SHA51267b1e66f0f649433d8ce48dd20dc85015eed38c8644a740d2e17119018d8eb04c709a309541a159843f30eca1b0cd9d1de02a40024b729fa5f336ece755797e0
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5df1f149763fd07ac9abdd0b6cde4239f
SHA1b1229564dea913d7ccb0e2acf366092401ec18aa
SHA2565f25ba7daf243c0470098facef5c1bf3b7a93a40dee2b735edf5a7dfbb47d19b
SHA51204c62b5e5d5d8409b04efb24a0a90fff3078bbe4ff0cbf9595a2f8e61297cab0ebead12a3f0e291365696045f0ff528c1e1fc89406fcad4fc1e8d59af7c1f2a2
-
Filesize
255KB
MD5311ad00c1dc7cb15e73f798cfdc72a15
SHA1e2110efef3d36130fb1cb2d1c988a187d4e4849c
SHA2566511743e3c7ebdcc704c9b1de0db8a5331fd9de30f78004af19e9bc8eb28ff33
SHA512ceb484d6c1a27f3b8390c09b0a1a112b48606d9010c7f1312d4677b3d89cdd093b39b0ff65f116b76c52b85c2e28ad5f57e891085c183c4f8b4b3313dbb1c2b8
-
Filesize
255KB
MD53dbe1888c3397d2d6b9952a0839621ea
SHA1b7c7f8f14d9312a780908462df93759750375e37
SHA256442eedc7fa3bafb4492184ce136ef1260e5ae26407077b15ec25ea60466010b2
SHA512006904719a62d9b6d14f16fc56675c829ffad26435ad69b8b2b6c1b73dd54b15c83e09e9f28801ef41dffadb32a1981addb43eac1cdc56a9d613b726a6bbaa95
-
Filesize
255KB
MD53dbe1888c3397d2d6b9952a0839621ea
SHA1b7c7f8f14d9312a780908462df93759750375e37
SHA256442eedc7fa3bafb4492184ce136ef1260e5ae26407077b15ec25ea60466010b2
SHA512006904719a62d9b6d14f16fc56675c829ffad26435ad69b8b2b6c1b73dd54b15c83e09e9f28801ef41dffadb32a1981addb43eac1cdc56a9d613b726a6bbaa95
-
Filesize
255KB
MD5a3c88afa5549011e0e3cf695f86bff40
SHA17262f91eb8ddf4f372bb43a248a35cb54e1d79b8
SHA256b3a83d4ce4d48df00a3df0a1d875fa96c16b95ce216cfb12c90b0c336e05b9f2
SHA51267b1e66f0f649433d8ce48dd20dc85015eed38c8644a740d2e17119018d8eb04c709a309541a159843f30eca1b0cd9d1de02a40024b729fa5f336ece755797e0
-
Filesize
255KB
MD5a3c88afa5549011e0e3cf695f86bff40
SHA17262f91eb8ddf4f372bb43a248a35cb54e1d79b8
SHA256b3a83d4ce4d48df00a3df0a1d875fa96c16b95ce216cfb12c90b0c336e05b9f2
SHA51267b1e66f0f649433d8ce48dd20dc85015eed38c8644a740d2e17119018d8eb04c709a309541a159843f30eca1b0cd9d1de02a40024b729fa5f336ece755797e0