Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:08
Behavioral task
behavioral1
Sample
23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe
Resource
win10v2004-20220812-en
General
-
Target
23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe
-
Size
255KB
-
MD5
06aa52d3519cbceda0513bf78c4b83f0
-
SHA1
3fdae2728658cf9fb066cb5ede05685936f38892
-
SHA256
23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8
-
SHA512
75356f9627fbbd6c530bc5b5dfa384df87ba25b94ba0a81beb7a5a6ea1d1d2a0294911e2a943fdd2e3d33401b6e81a197f315dbde67c61fa797129653e2bbfa9
-
SSDEEP
6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/4:Plf5j6zCNa0xeE3mI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" migvgvvyrt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" migvgvvyrt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" migvgvvyrt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" migvgvvyrt.exe -
Executes dropped EXE 5 IoCs
pid Process 1304 migvgvvyrt.exe 1096 fotfjiqrpcaatvx.exe 1756 fdusjwzn.exe 952 apmecansjnsov.exe 1520 fdusjwzn.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1032-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000c0000000054a8-60.dat upx behavioral1/files/0x000a0000000132f6-61.dat upx behavioral1/files/0x0008000000013473-64.dat upx behavioral1/files/0x000a0000000132f6-63.dat upx behavioral1/files/0x0008000000013473-67.dat upx behavioral1/files/0x000a0000000132f6-68.dat upx behavioral1/files/0x00070000000134d5-70.dat upx behavioral1/memory/1304-74-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00070000000134d5-72.dat upx behavioral1/memory/1756-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1096-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00070000000134d5-79.dat upx behavioral1/files/0x0008000000013473-78.dat upx behavioral1/memory/952-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000013473-82.dat upx behavioral1/files/0x0008000000013473-84.dat upx behavioral1/memory/1520-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1032-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00070000000139e2-95.dat upx behavioral1/memory/1096-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1756-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/952-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1304-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1520-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000600000001448b-104.dat upx behavioral1/files/0x0006000000014493-105.dat upx -
Loads dropped DLL 5 IoCs
pid Process 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1304 migvgvvyrt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" migvgvvyrt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run fotfjiqrpcaatvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lcusghjk = "migvgvvyrt.exe" fotfjiqrpcaatvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rvscnaap = "fotfjiqrpcaatvx.exe" fotfjiqrpcaatvx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "apmecansjnsov.exe" fotfjiqrpcaatvx.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: fdusjwzn.exe File opened (read-only) \??\x: fdusjwzn.exe File opened (read-only) \??\j: migvgvvyrt.exe File opened (read-only) \??\n: migvgvvyrt.exe File opened (read-only) \??\k: fdusjwzn.exe File opened (read-only) \??\m: fdusjwzn.exe File opened (read-only) \??\k: fdusjwzn.exe File opened (read-only) \??\n: fdusjwzn.exe File opened (read-only) \??\z: fdusjwzn.exe File opened (read-only) \??\n: fdusjwzn.exe File opened (read-only) \??\y: fdusjwzn.exe File opened (read-only) \??\s: migvgvvyrt.exe File opened (read-only) \??\u: fdusjwzn.exe File opened (read-only) \??\i: migvgvvyrt.exe File opened (read-only) \??\k: migvgvvyrt.exe File opened (read-only) \??\q: migvgvvyrt.exe File opened (read-only) \??\u: migvgvvyrt.exe File opened (read-only) \??\u: fdusjwzn.exe File opened (read-only) \??\e: migvgvvyrt.exe File opened (read-only) \??\g: migvgvvyrt.exe File opened (read-only) \??\h: fdusjwzn.exe File opened (read-only) \??\v: fdusjwzn.exe File opened (read-only) \??\l: migvgvvyrt.exe File opened (read-only) \??\x: fdusjwzn.exe File opened (read-only) \??\y: migvgvvyrt.exe File opened (read-only) \??\o: fdusjwzn.exe File opened (read-only) \??\a: migvgvvyrt.exe File opened (read-only) \??\p: fdusjwzn.exe File opened (read-only) \??\q: fdusjwzn.exe File opened (read-only) \??\l: fdusjwzn.exe File opened (read-only) \??\r: fdusjwzn.exe File opened (read-only) \??\g: fdusjwzn.exe File opened (read-only) \??\j: fdusjwzn.exe File opened (read-only) \??\r: migvgvvyrt.exe File opened (read-only) \??\s: fdusjwzn.exe File opened (read-only) \??\a: fdusjwzn.exe File opened (read-only) \??\f: fdusjwzn.exe File opened (read-only) \??\g: fdusjwzn.exe File opened (read-only) \??\p: fdusjwzn.exe File opened (read-only) \??\e: fdusjwzn.exe File opened (read-only) \??\p: migvgvvyrt.exe File opened (read-only) \??\y: fdusjwzn.exe File opened (read-only) \??\z: fdusjwzn.exe File opened (read-only) \??\t: migvgvvyrt.exe File opened (read-only) \??\q: fdusjwzn.exe File opened (read-only) \??\v: fdusjwzn.exe File opened (read-only) \??\b: fdusjwzn.exe File opened (read-only) \??\h: fdusjwzn.exe File opened (read-only) \??\b: fdusjwzn.exe File opened (read-only) \??\j: fdusjwzn.exe File opened (read-only) \??\w: fdusjwzn.exe File opened (read-only) \??\o: fdusjwzn.exe File opened (read-only) \??\w: migvgvvyrt.exe File opened (read-only) \??\o: migvgvvyrt.exe File opened (read-only) \??\x: migvgvvyrt.exe File opened (read-only) \??\f: fdusjwzn.exe File opened (read-only) \??\l: fdusjwzn.exe File opened (read-only) \??\f: migvgvvyrt.exe File opened (read-only) \??\h: migvgvvyrt.exe File opened (read-only) \??\b: migvgvvyrt.exe File opened (read-only) \??\e: fdusjwzn.exe File opened (read-only) \??\t: fdusjwzn.exe File opened (read-only) \??\t: fdusjwzn.exe File opened (read-only) \??\w: fdusjwzn.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" migvgvvyrt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" migvgvvyrt.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1304-74-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1756-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1096-76-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/952-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1520-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1032-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1096-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1756-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/952-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1304-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1520-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\migvgvvyrt.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File opened for modification C:\Windows\SysWOW64\fotfjiqrpcaatvx.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll migvgvvyrt.exe File created C:\Windows\SysWOW64\migvgvvyrt.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File created C:\Windows\SysWOW64\fdusjwzn.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File opened for modification C:\Windows\SysWOW64\fdusjwzn.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File created C:\Windows\SysWOW64\apmecansjnsov.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File opened for modification C:\Windows\SysWOW64\apmecansjnsov.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe File created C:\Windows\SysWOW64\fotfjiqrpcaatvx.exe 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fdusjwzn.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fdusjwzn.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fdusjwzn.exe File opened for modification \??\c:\Program Files\PushMount.doc.exe fdusjwzn.exe File opened for modification C:\Program Files\PushMount.nal fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fdusjwzn.exe File created \??\c:\Program Files\PushMount.doc.exe fdusjwzn.exe File opened for modification \??\c:\Program Files\PushMount.doc.exe fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fdusjwzn.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fdusjwzn.exe File created \??\c:\Program Files\PushMount.doc.exe fdusjwzn.exe File opened for modification C:\Program Files\PushMount.doc.exe fdusjwzn.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fdusjwzn.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fdusjwzn.exe File opened for modification C:\Program Files\PushMount.doc.exe fdusjwzn.exe File opened for modification C:\Program Files\PushMount.nal fdusjwzn.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fdusjwzn.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fdusjwzn.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C70C14E1DAC3B8CA7CE5ED9F37C9" 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E89FCFE482D856D9142D75F7DE2BCEEE141593266446331D6E9" 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FD6BB6FF1822DBD20ED0A68A089161" 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh migvgvvyrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAFABBFE10F1E4837A3B31819A3E93B38F028C43690338E2CA45E609A2" 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" migvgvvyrt.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1820 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1756 fdusjwzn.exe 1756 fdusjwzn.exe 1756 fdusjwzn.exe 1756 fdusjwzn.exe 1096 fotfjiqrpcaatvx.exe 1520 fdusjwzn.exe 1520 fdusjwzn.exe 1520 fdusjwzn.exe 1520 fdusjwzn.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1096 fotfjiqrpcaatvx.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: 33 276 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 276 AUDIODG.EXE Token: 33 276 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 276 AUDIODG.EXE Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe Token: SeShutdownPrivilege 1524 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1756 fdusjwzn.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1756 fdusjwzn.exe 952 apmecansjnsov.exe 1756 fdusjwzn.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1520 fdusjwzn.exe 1524 explorer.exe 1524 explorer.exe 1520 fdusjwzn.exe 1520 fdusjwzn.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1304 migvgvvyrt.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1096 fotfjiqrpcaatvx.exe 1756 fdusjwzn.exe 952 apmecansjnsov.exe 952 apmecansjnsov.exe 1756 fdusjwzn.exe 952 apmecansjnsov.exe 1756 fdusjwzn.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1520 fdusjwzn.exe 1524 explorer.exe 1520 fdusjwzn.exe 1520 fdusjwzn.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe 1524 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1820 WINWORD.EXE 1820 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1304 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 27 PID 1032 wrote to memory of 1304 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 27 PID 1032 wrote to memory of 1304 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 27 PID 1032 wrote to memory of 1304 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 27 PID 1032 wrote to memory of 1096 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 29 PID 1032 wrote to memory of 1096 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 29 PID 1032 wrote to memory of 1096 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 29 PID 1032 wrote to memory of 1096 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 29 PID 1032 wrote to memory of 1756 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 28 PID 1032 wrote to memory of 1756 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 28 PID 1032 wrote to memory of 1756 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 28 PID 1032 wrote to memory of 1756 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 28 PID 1032 wrote to memory of 952 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 30 PID 1032 wrote to memory of 952 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 30 PID 1032 wrote to memory of 952 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 30 PID 1032 wrote to memory of 952 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 30 PID 1304 wrote to memory of 1520 1304 migvgvvyrt.exe 32 PID 1304 wrote to memory of 1520 1304 migvgvvyrt.exe 32 PID 1304 wrote to memory of 1520 1304 migvgvvyrt.exe 32 PID 1304 wrote to memory of 1520 1304 migvgvvyrt.exe 32 PID 1032 wrote to memory of 1820 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 35 PID 1032 wrote to memory of 1820 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 35 PID 1032 wrote to memory of 1820 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 35 PID 1032 wrote to memory of 1820 1032 23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe 35 PID 1820 wrote to memory of 1880 1820 WINWORD.EXE 39 PID 1820 wrote to memory of 1880 1820 WINWORD.EXE 39 PID 1820 wrote to memory of 1880 1820 WINWORD.EXE 39 PID 1820 wrote to memory of 1880 1820 WINWORD.EXE 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe"C:\Users\Admin\AppData\Local\Temp\23a174d61c8e5cb4e8d88c5c39b39e57e7b4584bdd0b92e98908f6196b7f8ef8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\migvgvvyrt.exemigvgvvyrt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\fdusjwzn.exeC:\Windows\system32\fdusjwzn.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1520
-
-
-
C:\Windows\SysWOW64\fdusjwzn.exefdusjwzn.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1756
-
-
C:\Windows\SysWOW64\fotfjiqrpcaatvx.exefotfjiqrpcaatvx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1096
-
-
C:\Windows\SysWOW64\apmecansjnsov.exeapmecansjnsov.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:952
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1880
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1524
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5881⤵
- Suspicious use of AdjustPrivilegeToken
PID:276
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD575a2f244f6c242503b9c985499c8770f
SHA17d3da8e6e2f190879e856135a4c7f7a27457f819
SHA2568b0374fe504a696eea59df64cab6024b58b015205a6b6bf1e3929524e94b9cbb
SHA512fd4505c35dd1a1aa23515c9204d4ca57fbe2df0b66b250271a23a4ca1b404447ba07a477df1684e7a3b4985ad20378d6b64d77dd1237df4a7cb601079cd4c8f5
-
Filesize
255KB
MD53d611c72f5a908d4f67aba132623f5c2
SHA1efeff492d0c05253e2c6c61660f5b75f7d9bbbde
SHA256990c5316cdb08e37e186f67a7d4f582ec5cc1bc4a6d33360918875c19d8fc0b2
SHA512f3d6e6f67686886713108be845e3d0e5b3f4790ca5606dc68c2023770d5546bc70c2cba5e095bd2fe8094d16d7d9a0cf573152e7b4de89a1137bc5dd3cc46ea7
-
Filesize
255KB
MD57d58ae6379d12d482d3c8df23821cf55
SHA152376064091a530a899e4a2e22be0ea9f1f1b0eb
SHA2564ae74f9747fa188162aea46b5054932303a4728594e3adb1a5020cb24716d1b1
SHA51277c59900abbe9bfa989b321a54182cbfef2ccf999042215034370335e29b14369e3980cede096d30c29fff42a79bff697e26121e29e0f61e88242151b2d01a28
-
Filesize
255KB
MD5f43f924c7043d8083e583c1f19ff479c
SHA110ce2e4abcfb2b9195b3d80e64553e5f7aac8655
SHA2564e6d67c21868fd51b0d3b7f3dfb0ba63d4568db695fd0dabd0586c610a7a7de7
SHA512749b9ea1569df3a1dc2fec292583ab33f4c9abaecadde359f7ffec544b36a7adb49128e298a4d27566c969134b173560230f697991ef7d683ef197fbe183456c
-
Filesize
255KB
MD5f43f924c7043d8083e583c1f19ff479c
SHA110ce2e4abcfb2b9195b3d80e64553e5f7aac8655
SHA2564e6d67c21868fd51b0d3b7f3dfb0ba63d4568db695fd0dabd0586c610a7a7de7
SHA512749b9ea1569df3a1dc2fec292583ab33f4c9abaecadde359f7ffec544b36a7adb49128e298a4d27566c969134b173560230f697991ef7d683ef197fbe183456c
-
Filesize
255KB
MD597bf07c1f143968408bbce6c6fb86140
SHA19cd7fa87bbae7dd77feca9288fef42f554af554b
SHA25692f2e62789830da4805a0ff88da31ea008933ec0df375fff166a542afb0ceb02
SHA512f7f16e0900317e538c5183c2de7c7fdd9894ab0f5fd364b97892faa62326da074c290a62272a37f0013817aa7500edc8037fde4ca5ba97953dd444d1ecb4be20
-
Filesize
255KB
MD597bf07c1f143968408bbce6c6fb86140
SHA19cd7fa87bbae7dd77feca9288fef42f554af554b
SHA25692f2e62789830da4805a0ff88da31ea008933ec0df375fff166a542afb0ceb02
SHA512f7f16e0900317e538c5183c2de7c7fdd9894ab0f5fd364b97892faa62326da074c290a62272a37f0013817aa7500edc8037fde4ca5ba97953dd444d1ecb4be20
-
Filesize
255KB
MD597bf07c1f143968408bbce6c6fb86140
SHA19cd7fa87bbae7dd77feca9288fef42f554af554b
SHA25692f2e62789830da4805a0ff88da31ea008933ec0df375fff166a542afb0ceb02
SHA512f7f16e0900317e538c5183c2de7c7fdd9894ab0f5fd364b97892faa62326da074c290a62272a37f0013817aa7500edc8037fde4ca5ba97953dd444d1ecb4be20
-
Filesize
255KB
MD571b4d3618ba8392173763f977189e723
SHA1e34228192611f65b4a35aff5ad2004958665bbe6
SHA256c0bc840dc0c8bb51cc4418c20fc740e56c99eefd1aeace38ab2eb20729899ede
SHA51263c15ef835acbd33f63a59bd516d622522bd74ab32afef7797e0dd228fc6db7ede9821006a20c7df1c8c65bc15d639107f5a6dee731ecd880a0e6fd21763ec2f
-
Filesize
255KB
MD571b4d3618ba8392173763f977189e723
SHA1e34228192611f65b4a35aff5ad2004958665bbe6
SHA256c0bc840dc0c8bb51cc4418c20fc740e56c99eefd1aeace38ab2eb20729899ede
SHA51263c15ef835acbd33f63a59bd516d622522bd74ab32afef7797e0dd228fc6db7ede9821006a20c7df1c8c65bc15d639107f5a6dee731ecd880a0e6fd21763ec2f
-
Filesize
255KB
MD51dbe8442de34d45cecc0551d31a393ae
SHA10f5233bf63bb6eb8aef6299613a3bbd87e3e24c8
SHA256d4fd85589be9727fc7a098380f0f4767d718da0b022d6c3773ad612697293fdd
SHA5125fe14ebcc3b0ae65ae67ef1b23f09320ee539d630b4f2ddf00306904e34b7daf9ed7b515ec73d012eea79ee41008dfacecb6416d62672109d5298965a8d67b1d
-
Filesize
255KB
MD51dbe8442de34d45cecc0551d31a393ae
SHA10f5233bf63bb6eb8aef6299613a3bbd87e3e24c8
SHA256d4fd85589be9727fc7a098380f0f4767d718da0b022d6c3773ad612697293fdd
SHA5125fe14ebcc3b0ae65ae67ef1b23f09320ee539d630b4f2ddf00306904e34b7daf9ed7b515ec73d012eea79ee41008dfacecb6416d62672109d5298965a8d67b1d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5f43f924c7043d8083e583c1f19ff479c
SHA110ce2e4abcfb2b9195b3d80e64553e5f7aac8655
SHA2564e6d67c21868fd51b0d3b7f3dfb0ba63d4568db695fd0dabd0586c610a7a7de7
SHA512749b9ea1569df3a1dc2fec292583ab33f4c9abaecadde359f7ffec544b36a7adb49128e298a4d27566c969134b173560230f697991ef7d683ef197fbe183456c
-
Filesize
255KB
MD597bf07c1f143968408bbce6c6fb86140
SHA19cd7fa87bbae7dd77feca9288fef42f554af554b
SHA25692f2e62789830da4805a0ff88da31ea008933ec0df375fff166a542afb0ceb02
SHA512f7f16e0900317e538c5183c2de7c7fdd9894ab0f5fd364b97892faa62326da074c290a62272a37f0013817aa7500edc8037fde4ca5ba97953dd444d1ecb4be20
-
Filesize
255KB
MD597bf07c1f143968408bbce6c6fb86140
SHA19cd7fa87bbae7dd77feca9288fef42f554af554b
SHA25692f2e62789830da4805a0ff88da31ea008933ec0df375fff166a542afb0ceb02
SHA512f7f16e0900317e538c5183c2de7c7fdd9894ab0f5fd364b97892faa62326da074c290a62272a37f0013817aa7500edc8037fde4ca5ba97953dd444d1ecb4be20
-
Filesize
255KB
MD571b4d3618ba8392173763f977189e723
SHA1e34228192611f65b4a35aff5ad2004958665bbe6
SHA256c0bc840dc0c8bb51cc4418c20fc740e56c99eefd1aeace38ab2eb20729899ede
SHA51263c15ef835acbd33f63a59bd516d622522bd74ab32afef7797e0dd228fc6db7ede9821006a20c7df1c8c65bc15d639107f5a6dee731ecd880a0e6fd21763ec2f
-
Filesize
255KB
MD51dbe8442de34d45cecc0551d31a393ae
SHA10f5233bf63bb6eb8aef6299613a3bbd87e3e24c8
SHA256d4fd85589be9727fc7a098380f0f4767d718da0b022d6c3773ad612697293fdd
SHA5125fe14ebcc3b0ae65ae67ef1b23f09320ee539d630b4f2ddf00306904e34b7daf9ed7b515ec73d012eea79ee41008dfacecb6416d62672109d5298965a8d67b1d