Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 11:33
Behavioral task
behavioral1
Sample
1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe
Resource
win7-20220812-en
General
-
Target
1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe
-
Size
255KB
-
MD5
cb84e85ff46441d7599261aeca8faf72
-
SHA1
ad808f191df4623d104fa065b52cbacd93f02eef
-
SHA256
1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e
-
SHA512
75423b78184be9a6e9f4e32ce6d938da40da30e98ca46c99fd4975702bc5081ef9f394c7662a25ac8bdddf7f4d70b1c38f91fcc99f19fad160e9135908ed25ed
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJj:1xlZam+akqx6YQJXcNlEHUIQeE3mmBII
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lbnrprtgwt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lbnrprtgwt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lbnrprtgwt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lbnrprtgwt.exe -
Executes dropped EXE 5 IoCs
pid Process 1928 lbnrprtgwt.exe 1176 hmlitfdyvdxauqk.exe 1324 ssgmkwxf.exe 1116 btypskootmdqk.exe 896 ssgmkwxf.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/files/0x000b0000000122ff-60.dat upx behavioral1/files/0x000b0000000122ff-62.dat upx behavioral1/files/0x000900000001230d-64.dat upx behavioral1/files/0x000900000001230d-66.dat upx behavioral1/memory/1736-72-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000900000001230d-71.dat upx behavioral1/files/0x0008000000012311-74.dat upx behavioral1/files/0x000b0000000122ff-69.dat upx behavioral1/memory/1928-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1176-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1324-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000900000001230d-81.dat upx behavioral1/files/0x000900000001230d-78.dat upx behavioral1/files/0x0008000000012311-68.dat upx behavioral1/memory/1736-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1116-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/896-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1176-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1928-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1324-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/896-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012311-98.dat upx behavioral1/files/0x00070000000133d3-101.dat upx -
Loads dropped DLL 5 IoCs
pid Process 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1928 lbnrprtgwt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" lbnrprtgwt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hmlitfdyvdxauqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gdqmycoo = "lbnrprtgwt.exe" hmlitfdyvdxauqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\chprynng = "hmlitfdyvdxauqk.exe" hmlitfdyvdxauqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "btypskootmdqk.exe" hmlitfdyvdxauqk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: lbnrprtgwt.exe File opened (read-only) \??\b: ssgmkwxf.exe File opened (read-only) \??\i: lbnrprtgwt.exe File opened (read-only) \??\p: lbnrprtgwt.exe File opened (read-only) \??\i: ssgmkwxf.exe File opened (read-only) \??\j: ssgmkwxf.exe File opened (read-only) \??\k: ssgmkwxf.exe File opened (read-only) \??\l: ssgmkwxf.exe File opened (read-only) \??\p: ssgmkwxf.exe File opened (read-only) \??\y: ssgmkwxf.exe File opened (read-only) \??\f: lbnrprtgwt.exe File opened (read-only) \??\m: ssgmkwxf.exe File opened (read-only) \??\t: ssgmkwxf.exe File opened (read-only) \??\r: ssgmkwxf.exe File opened (read-only) \??\a: lbnrprtgwt.exe File opened (read-only) \??\e: ssgmkwxf.exe File opened (read-only) \??\h: ssgmkwxf.exe File opened (read-only) \??\s: ssgmkwxf.exe File opened (read-only) \??\n: ssgmkwxf.exe File opened (read-only) \??\g: lbnrprtgwt.exe File opened (read-only) \??\f: ssgmkwxf.exe File opened (read-only) \??\i: ssgmkwxf.exe File opened (read-only) \??\h: ssgmkwxf.exe File opened (read-only) \??\v: ssgmkwxf.exe File opened (read-only) \??\n: lbnrprtgwt.exe File opened (read-only) \??\k: lbnrprtgwt.exe File opened (read-only) \??\v: ssgmkwxf.exe File opened (read-only) \??\z: ssgmkwxf.exe File opened (read-only) \??\e: lbnrprtgwt.exe File opened (read-only) \??\q: lbnrprtgwt.exe File opened (read-only) \??\u: lbnrprtgwt.exe File opened (read-only) \??\h: lbnrprtgwt.exe File opened (read-only) \??\x: ssgmkwxf.exe File opened (read-only) \??\x: lbnrprtgwt.exe File opened (read-only) \??\l: ssgmkwxf.exe File opened (read-only) \??\x: ssgmkwxf.exe File opened (read-only) \??\g: ssgmkwxf.exe File opened (read-only) \??\q: ssgmkwxf.exe File opened (read-only) \??\g: ssgmkwxf.exe File opened (read-only) \??\w: ssgmkwxf.exe File opened (read-only) \??\o: ssgmkwxf.exe File opened (read-only) \??\y: lbnrprtgwt.exe File opened (read-only) \??\j: ssgmkwxf.exe File opened (read-only) \??\q: ssgmkwxf.exe File opened (read-only) \??\a: ssgmkwxf.exe File opened (read-only) \??\w: lbnrprtgwt.exe File opened (read-only) \??\o: ssgmkwxf.exe File opened (read-only) \??\p: ssgmkwxf.exe File opened (read-only) \??\m: ssgmkwxf.exe File opened (read-only) \??\u: ssgmkwxf.exe File opened (read-only) \??\l: lbnrprtgwt.exe File opened (read-only) \??\r: lbnrprtgwt.exe File opened (read-only) \??\a: ssgmkwxf.exe File opened (read-only) \??\b: ssgmkwxf.exe File opened (read-only) \??\z: ssgmkwxf.exe File opened (read-only) \??\f: ssgmkwxf.exe File opened (read-only) \??\t: ssgmkwxf.exe File opened (read-only) \??\j: lbnrprtgwt.exe File opened (read-only) \??\m: lbnrprtgwt.exe File opened (read-only) \??\z: lbnrprtgwt.exe File opened (read-only) \??\n: ssgmkwxf.exe File opened (read-only) \??\u: ssgmkwxf.exe File opened (read-only) \??\y: ssgmkwxf.exe File opened (read-only) \??\e: ssgmkwxf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" lbnrprtgwt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" lbnrprtgwt.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1736-72-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1928-76-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1176-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1324-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1736-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/896-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1176-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1928-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1324-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/896-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lbnrprtgwt.exe File opened for modification C:\Windows\SysWOW64\lbnrprtgwt.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File created C:\Windows\SysWOW64\btypskootmdqk.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File opened for modification C:\Windows\SysWOW64\btypskootmdqk.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File created C:\Windows\SysWOW64\ssgmkwxf.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File opened for modification C:\Windows\SysWOW64\ssgmkwxf.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File created C:\Windows\SysWOW64\lbnrprtgwt.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File created C:\Windows\SysWOW64\hmlitfdyvdxauqk.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File opened for modification C:\Windows\SysWOW64\hmlitfdyvdxauqk.exe 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ssgmkwxf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ssgmkwxf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ssgmkwxf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ssgmkwxf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ssgmkwxf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ssgmkwxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ssgmkwxf.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc lbnrprtgwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lbnrprtgwt.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F66BB1FF1C21ACD179D0D48A0F9165" 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lbnrprtgwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" lbnrprtgwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDFAB9F961F19084743B47869F3E98B38902F042600338E2CB459A08A1" 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lbnrprtgwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg lbnrprtgwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB1B029479039EF53C5B9D5339DD7B9" 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs lbnrprtgwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf lbnrprtgwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" lbnrprtgwt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1000 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 1116 btypskootmdqk.exe 1116 btypskootmdqk.exe 1116 btypskootmdqk.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1928 lbnrprtgwt.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1176 hmlitfdyvdxauqk.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 1324 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 896 ssgmkwxf.exe 1116 btypskootmdqk.exe 1116 btypskootmdqk.exe 1116 btypskootmdqk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1000 WINWORD.EXE 1000 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1928 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 28 PID 1736 wrote to memory of 1928 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 28 PID 1736 wrote to memory of 1928 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 28 PID 1736 wrote to memory of 1928 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 28 PID 1736 wrote to memory of 1176 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 29 PID 1736 wrote to memory of 1176 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 29 PID 1736 wrote to memory of 1176 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 29 PID 1736 wrote to memory of 1176 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 29 PID 1736 wrote to memory of 1324 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 30 PID 1736 wrote to memory of 1324 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 30 PID 1736 wrote to memory of 1324 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 30 PID 1736 wrote to memory of 1324 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 30 PID 1736 wrote to memory of 1116 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 31 PID 1736 wrote to memory of 1116 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 31 PID 1736 wrote to memory of 1116 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 31 PID 1736 wrote to memory of 1116 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 31 PID 1928 wrote to memory of 896 1928 lbnrprtgwt.exe 32 PID 1928 wrote to memory of 896 1928 lbnrprtgwt.exe 32 PID 1928 wrote to memory of 896 1928 lbnrprtgwt.exe 32 PID 1928 wrote to memory of 896 1928 lbnrprtgwt.exe 32 PID 1736 wrote to memory of 1000 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 33 PID 1736 wrote to memory of 1000 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 33 PID 1736 wrote to memory of 1000 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 33 PID 1736 wrote to memory of 1000 1736 1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe 33 PID 1000 wrote to memory of 1960 1000 WINWORD.EXE 37 PID 1000 wrote to memory of 1960 1000 WINWORD.EXE 37 PID 1000 wrote to memory of 1960 1000 WINWORD.EXE 37 PID 1000 wrote to memory of 1960 1000 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe"C:\Users\Admin\AppData\Local\Temp\1470edd33a76b937781b6bf4911b29309d20205b7aa91e424fdc7725a80fb66e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\lbnrprtgwt.exelbnrprtgwt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\ssgmkwxf.exeC:\Windows\system32\ssgmkwxf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:896
-
-
-
C:\Windows\SysWOW64\hmlitfdyvdxauqk.exehmlitfdyvdxauqk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1176
-
-
C:\Windows\SysWOW64\ssgmkwxf.exessgmkwxf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1324
-
-
C:\Windows\SysWOW64\btypskootmdqk.exebtypskootmdqk.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1116
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5544ae62fe15a8f09b2b5210f7aa980fb
SHA155063991ea26b8292974ea0c99eb6c796da2b29c
SHA256ba17d654bc8894ffbd80cb5502c18359538beb313c7536600d6a1fff41a20447
SHA512011b868be7ba941a74dcbaf8a9d2f5ee6af12d66704bb482c5849aad108a041a7ce6bf1c2915c16fc3f545da9c79fdda3fe447757e905d912524e721e0512764
-
Filesize
255KB
MD5538ad88bf311d7f650dc3a53bab55692
SHA179a065437342ae06cb850563534c94c3d3d11237
SHA25694f2f7922adb2af70b2768245877d686c5f1e5ea8c1110aaedfc0967fb72a508
SHA512cc4cfa2167c8c7125a8fc2239223fcf7f73b9e58c6ceb25a011d3a2c740d32a8e350314a5cac5cbb0c7cb7d4173d7e1d9a5503ecfa15163c8663c269d4d7e1e9
-
Filesize
255KB
MD5538ad88bf311d7f650dc3a53bab55692
SHA179a065437342ae06cb850563534c94c3d3d11237
SHA25694f2f7922adb2af70b2768245877d686c5f1e5ea8c1110aaedfc0967fb72a508
SHA512cc4cfa2167c8c7125a8fc2239223fcf7f73b9e58c6ceb25a011d3a2c740d32a8e350314a5cac5cbb0c7cb7d4173d7e1d9a5503ecfa15163c8663c269d4d7e1e9
-
Filesize
255KB
MD50624b17658ce3969430aa439f689aeac
SHA1e7c5a58716c0606758f96d83dae158b2057d3697
SHA2564ce34c54b93508e072926f7e8671edee982ca407d3e7fda66d26e3ef5171344a
SHA512fdd8ae709ee3dd88f8287cfc1fcfa1e33f337f5cd97fa79aee016f384c8feeed1c4ed7139a10f2ee1ce2782d531225ee514ae6f4218fd852318b20b6e67a9f30
-
Filesize
255KB
MD50624b17658ce3969430aa439f689aeac
SHA1e7c5a58716c0606758f96d83dae158b2057d3697
SHA2564ce34c54b93508e072926f7e8671edee982ca407d3e7fda66d26e3ef5171344a
SHA512fdd8ae709ee3dd88f8287cfc1fcfa1e33f337f5cd97fa79aee016f384c8feeed1c4ed7139a10f2ee1ce2782d531225ee514ae6f4218fd852318b20b6e67a9f30
-
Filesize
255KB
MD54e6ef0753acea2ae976311a82c88623d
SHA1cf1e67b92375bad55bd7fc93baf7d49a38b66ee1
SHA2564098fa2039a603b40142270541f575d67410ba345d55bb04939f1b8a4578a86e
SHA512079aab80b5f4ea68ae904c3c5dfdf54549e2fdb0500e6a05c7bd5d0c1f671d7c6ebabf2f51d926312341cfd43b494ac5aba923177b543223a38dab1bfc7660bc
-
Filesize
255KB
MD54e6ef0753acea2ae976311a82c88623d
SHA1cf1e67b92375bad55bd7fc93baf7d49a38b66ee1
SHA2564098fa2039a603b40142270541f575d67410ba345d55bb04939f1b8a4578a86e
SHA512079aab80b5f4ea68ae904c3c5dfdf54549e2fdb0500e6a05c7bd5d0c1f671d7c6ebabf2f51d926312341cfd43b494ac5aba923177b543223a38dab1bfc7660bc
-
Filesize
255KB
MD5c8cd339d50654d56235bdec0d8b77afb
SHA1d614d224fa3a61e927a70ba0880ae4aad0aa97de
SHA2565bd1e0dcb2b8288eb3e00c0547c3142e269edf8bf1c916356951ffd07e5eccf0
SHA512b60a422a7511326aad6cc4440cdf76777f19f0d59b24622c5dfd816f9bcaaaecb207bca504b3b2639da0ec2024d1b61f964730e2519bfa45c81dd0959d7fccbe
-
Filesize
255KB
MD5c8cd339d50654d56235bdec0d8b77afb
SHA1d614d224fa3a61e927a70ba0880ae4aad0aa97de
SHA2565bd1e0dcb2b8288eb3e00c0547c3142e269edf8bf1c916356951ffd07e5eccf0
SHA512b60a422a7511326aad6cc4440cdf76777f19f0d59b24622c5dfd816f9bcaaaecb207bca504b3b2639da0ec2024d1b61f964730e2519bfa45c81dd0959d7fccbe
-
Filesize
255KB
MD5c8cd339d50654d56235bdec0d8b77afb
SHA1d614d224fa3a61e927a70ba0880ae4aad0aa97de
SHA2565bd1e0dcb2b8288eb3e00c0547c3142e269edf8bf1c916356951ffd07e5eccf0
SHA512b60a422a7511326aad6cc4440cdf76777f19f0d59b24622c5dfd816f9bcaaaecb207bca504b3b2639da0ec2024d1b61f964730e2519bfa45c81dd0959d7fccbe
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5538ad88bf311d7f650dc3a53bab55692
SHA179a065437342ae06cb850563534c94c3d3d11237
SHA25694f2f7922adb2af70b2768245877d686c5f1e5ea8c1110aaedfc0967fb72a508
SHA512cc4cfa2167c8c7125a8fc2239223fcf7f73b9e58c6ceb25a011d3a2c740d32a8e350314a5cac5cbb0c7cb7d4173d7e1d9a5503ecfa15163c8663c269d4d7e1e9
-
Filesize
255KB
MD50624b17658ce3969430aa439f689aeac
SHA1e7c5a58716c0606758f96d83dae158b2057d3697
SHA2564ce34c54b93508e072926f7e8671edee982ca407d3e7fda66d26e3ef5171344a
SHA512fdd8ae709ee3dd88f8287cfc1fcfa1e33f337f5cd97fa79aee016f384c8feeed1c4ed7139a10f2ee1ce2782d531225ee514ae6f4218fd852318b20b6e67a9f30
-
Filesize
255KB
MD54e6ef0753acea2ae976311a82c88623d
SHA1cf1e67b92375bad55bd7fc93baf7d49a38b66ee1
SHA2564098fa2039a603b40142270541f575d67410ba345d55bb04939f1b8a4578a86e
SHA512079aab80b5f4ea68ae904c3c5dfdf54549e2fdb0500e6a05c7bd5d0c1f671d7c6ebabf2f51d926312341cfd43b494ac5aba923177b543223a38dab1bfc7660bc
-
Filesize
255KB
MD5c8cd339d50654d56235bdec0d8b77afb
SHA1d614d224fa3a61e927a70ba0880ae4aad0aa97de
SHA2565bd1e0dcb2b8288eb3e00c0547c3142e269edf8bf1c916356951ffd07e5eccf0
SHA512b60a422a7511326aad6cc4440cdf76777f19f0d59b24622c5dfd816f9bcaaaecb207bca504b3b2639da0ec2024d1b61f964730e2519bfa45c81dd0959d7fccbe
-
Filesize
255KB
MD5c8cd339d50654d56235bdec0d8b77afb
SHA1d614d224fa3a61e927a70ba0880ae4aad0aa97de
SHA2565bd1e0dcb2b8288eb3e00c0547c3142e269edf8bf1c916356951ffd07e5eccf0
SHA512b60a422a7511326aad6cc4440cdf76777f19f0d59b24622c5dfd816f9bcaaaecb207bca504b3b2639da0ec2024d1b61f964730e2519bfa45c81dd0959d7fccbe