Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:11
Behavioral task
behavioral1
Sample
12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe
Resource
win10v2004-20220812-en
General
-
Target
12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe
-
Size
255KB
-
MD5
088a6fba98ffbda33d5442b5ebb285f1
-
SHA1
7fc07806cb40273b44425bcbca8e1e0663a32c43
-
SHA256
12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3
-
SHA512
a8328c9c183186a6078dd804d25326667d34481c6dcbf7fb105424f9fde0113b3ed5720058e59f257dc12a3b768a9d125406a7f5a3f19a55ac82739673eb56d2
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ9:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIA
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" vuxgnhovmb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vuxgnhovmb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" vuxgnhovmb.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" vuxgnhovmb.exe -
Executes dropped EXE 6 IoCs
pid Process 1608 vuxgnhovmb.exe 956 cnwvnugtgnijrth.exe 1692 jdugoosi.exe 268 czfsslmrvhnwu.exe 468 jdugoosi.exe 112 czfsslmrvhnwu.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x0009000000013a13-61.dat upx behavioral1/memory/1608-64-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1880-60-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/files/0x0009000000013a13-65.dat upx behavioral1/files/0x0009000000013a13-67.dat upx behavioral1/files/0x0007000000014159-68.dat upx behavioral1/files/0x0007000000014159-73.dat upx behavioral1/files/0x0007000000014159-78.dat upx behavioral1/files/0x000600000001420e-77.dat upx behavioral1/files/0x0007000000014159-72.dat upx behavioral1/files/0x000600000001420e-74.dat upx behavioral1/files/0x0007000000014159-71.dat upx behavioral1/files/0x000600000001420e-82.dat upx behavioral1/files/0x000600000001420e-83.dat upx behavioral1/files/0x000600000001420e-85.dat upx behavioral1/memory/1692-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/956-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/112-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/468-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/268-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1880-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1608-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/956-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1692-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/268-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/468-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/112-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1880-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014af2-113.dat upx behavioral1/files/0x0006000000014baa-114.dat upx behavioral1/files/0x0006000000014c4a-115.dat upx behavioral1/files/0x0006000000014c4a-116.dat upx -
Loads dropped DLL 6 IoCs
pid Process 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1608 vuxgnhovmb.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1352 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" vuxgnhovmb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xdjriend = "vuxgnhovmb.exe" cnwvnugtgnijrth.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uijoibaq = "cnwvnugtgnijrth.exe" cnwvnugtgnijrth.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "czfsslmrvhnwu.exe" cnwvnugtgnijrth.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cnwvnugtgnijrth.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: vuxgnhovmb.exe File opened (read-only) \??\m: jdugoosi.exe File opened (read-only) \??\o: vuxgnhovmb.exe File opened (read-only) \??\m: vuxgnhovmb.exe File opened (read-only) \??\x: vuxgnhovmb.exe File opened (read-only) \??\k: jdugoosi.exe File opened (read-only) \??\g: jdugoosi.exe File opened (read-only) \??\k: vuxgnhovmb.exe File opened (read-only) \??\t: jdugoosi.exe File opened (read-only) \??\w: jdugoosi.exe File opened (read-only) \??\e: jdugoosi.exe File opened (read-only) \??\t: jdugoosi.exe File opened (read-only) \??\j: jdugoosi.exe File opened (read-only) \??\y: vuxgnhovmb.exe File opened (read-only) \??\y: jdugoosi.exe File opened (read-only) \??\p: jdugoosi.exe File opened (read-only) \??\y: jdugoosi.exe File opened (read-only) \??\p: vuxgnhovmb.exe File opened (read-only) \??\h: vuxgnhovmb.exe File opened (read-only) \??\e: vuxgnhovmb.exe File opened (read-only) \??\r: vuxgnhovmb.exe File opened (read-only) \??\o: jdugoosi.exe File opened (read-only) \??\w: jdugoosi.exe File opened (read-only) \??\n: vuxgnhovmb.exe File opened (read-only) \??\z: vuxgnhovmb.exe File opened (read-only) \??\f: jdugoosi.exe File opened (read-only) \??\v: jdugoosi.exe File opened (read-only) \??\j: vuxgnhovmb.exe File opened (read-only) \??\v: vuxgnhovmb.exe File opened (read-only) \??\s: jdugoosi.exe File opened (read-only) \??\b: vuxgnhovmb.exe File opened (read-only) \??\n: jdugoosi.exe File opened (read-only) \??\r: jdugoosi.exe File opened (read-only) \??\q: jdugoosi.exe File opened (read-only) \??\z: jdugoosi.exe File opened (read-only) \??\w: vuxgnhovmb.exe File opened (read-only) \??\s: jdugoosi.exe File opened (read-only) \??\b: jdugoosi.exe File opened (read-only) \??\h: jdugoosi.exe File opened (read-only) \??\l: jdugoosi.exe File opened (read-only) \??\o: jdugoosi.exe File opened (read-only) \??\i: vuxgnhovmb.exe File opened (read-only) \??\u: jdugoosi.exe File opened (read-only) \??\f: jdugoosi.exe File opened (read-only) \??\a: jdugoosi.exe File opened (read-only) \??\p: jdugoosi.exe File opened (read-only) \??\u: jdugoosi.exe File opened (read-only) \??\h: jdugoosi.exe File opened (read-only) \??\k: jdugoosi.exe File opened (read-only) \??\n: jdugoosi.exe File opened (read-only) \??\g: vuxgnhovmb.exe File opened (read-only) \??\s: vuxgnhovmb.exe File opened (read-only) \??\i: jdugoosi.exe File opened (read-only) \??\l: jdugoosi.exe File opened (read-only) \??\m: jdugoosi.exe File opened (read-only) \??\v: jdugoosi.exe File opened (read-only) \??\z: jdugoosi.exe File opened (read-only) \??\a: jdugoosi.exe File opened (read-only) \??\f: vuxgnhovmb.exe File opened (read-only) \??\i: jdugoosi.exe File opened (read-only) \??\q: jdugoosi.exe File opened (read-only) \??\a: vuxgnhovmb.exe File opened (read-only) \??\q: vuxgnhovmb.exe File opened (read-only) \??\t: vuxgnhovmb.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" vuxgnhovmb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" vuxgnhovmb.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1608-64-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1880-60-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1880-89-0x00000000022D0000-0x0000000002370000-memory.dmp autoit_exe behavioral1/memory/1692-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/956-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/112-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/468-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/268-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1880-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1608-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/956-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1880-97-0x00000000022D0000-0x0000000002370000-memory.dmp autoit_exe behavioral1/memory/1692-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/268-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/468-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/112-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1880-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll vuxgnhovmb.exe File created C:\Windows\SysWOW64\vuxgnhovmb.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File opened for modification C:\Windows\SysWOW64\jdugoosi.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File opened for modification C:\Windows\SysWOW64\czfsslmrvhnwu.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File created C:\Windows\SysWOW64\jdugoosi.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File created C:\Windows\SysWOW64\czfsslmrvhnwu.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File opened for modification C:\Windows\SysWOW64\vuxgnhovmb.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File created C:\Windows\SysWOW64\cnwvnugtgnijrth.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File opened for modification C:\Windows\SysWOW64\cnwvnugtgnijrth.exe 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jdugoosi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jdugoosi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal jdugoosi.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jdugoosi.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jdugoosi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jdugoosi.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jdugoosi.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal jdugoosi.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs vuxgnhovmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vuxgnhovmb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32452D7D9D2183586A3276A770522DD87D8364DB" 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C6781591DAB4B8CD7CE6ED9F37C8" 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vuxgnhovmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh vuxgnhovmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB1FE6E22DAD279D0D28A0C9111" 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" vuxgnhovmb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1912 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1692 jdugoosi.exe 1692 jdugoosi.exe 1692 jdugoosi.exe 1692 jdugoosi.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 468 jdugoosi.exe 468 jdugoosi.exe 468 jdugoosi.exe 468 jdugoosi.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 956 cnwvnugtgnijrth.exe 112 czfsslmrvhnwu.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 1692 jdugoosi.exe 468 jdugoosi.exe 1692 jdugoosi.exe 268 czfsslmrvhnwu.exe 468 jdugoosi.exe 1692 jdugoosi.exe 468 jdugoosi.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 1608 vuxgnhovmb.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 956 cnwvnugtgnijrth.exe 1692 jdugoosi.exe 468 jdugoosi.exe 1692 jdugoosi.exe 268 czfsslmrvhnwu.exe 468 jdugoosi.exe 1692 jdugoosi.exe 468 jdugoosi.exe 268 czfsslmrvhnwu.exe 268 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe 112 czfsslmrvhnwu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1912 WINWORD.EXE 1912 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1608 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 27 PID 1880 wrote to memory of 1608 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 27 PID 1880 wrote to memory of 1608 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 27 PID 1880 wrote to memory of 1608 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 27 PID 1880 wrote to memory of 956 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 28 PID 1880 wrote to memory of 956 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 28 PID 1880 wrote to memory of 956 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 28 PID 1880 wrote to memory of 956 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 28 PID 1880 wrote to memory of 1692 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 29 PID 1880 wrote to memory of 1692 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 29 PID 1880 wrote to memory of 1692 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 29 PID 1880 wrote to memory of 1692 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 29 PID 956 wrote to memory of 1352 956 cnwvnugtgnijrth.exe 30 PID 956 wrote to memory of 1352 956 cnwvnugtgnijrth.exe 30 PID 956 wrote to memory of 1352 956 cnwvnugtgnijrth.exe 30 PID 956 wrote to memory of 1352 956 cnwvnugtgnijrth.exe 30 PID 1608 wrote to memory of 468 1608 vuxgnhovmb.exe 33 PID 1608 wrote to memory of 468 1608 vuxgnhovmb.exe 33 PID 1608 wrote to memory of 468 1608 vuxgnhovmb.exe 33 PID 1608 wrote to memory of 468 1608 vuxgnhovmb.exe 33 PID 1880 wrote to memory of 268 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 32 PID 1880 wrote to memory of 268 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 32 PID 1880 wrote to memory of 268 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 32 PID 1880 wrote to memory of 268 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 32 PID 1352 wrote to memory of 112 1352 cmd.exe 34 PID 1352 wrote to memory of 112 1352 cmd.exe 34 PID 1352 wrote to memory of 112 1352 cmd.exe 34 PID 1352 wrote to memory of 112 1352 cmd.exe 34 PID 1880 wrote to memory of 1912 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 35 PID 1880 wrote to memory of 1912 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 35 PID 1880 wrote to memory of 1912 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 35 PID 1880 wrote to memory of 1912 1880 12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe 35 PID 1912 wrote to memory of 1436 1912 WINWORD.EXE 38 PID 1912 wrote to memory of 1436 1912 WINWORD.EXE 38 PID 1912 wrote to memory of 1436 1912 WINWORD.EXE 38 PID 1912 wrote to memory of 1436 1912 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe"C:\Users\Admin\AppData\Local\Temp\12d61a3e44dd8c0a3ea8d07e8af74a587373dc7975999eb672fc001d33cb3ab3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\vuxgnhovmb.exevuxgnhovmb.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\jdugoosi.exeC:\Windows\system32\jdugoosi.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:468
-
-
-
C:\Windows\SysWOW64\cnwvnugtgnijrth.execnwvnugtgnijrth.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c czfsslmrvhnwu.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\czfsslmrvhnwu.execzfsslmrvhnwu.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:112
-
-
-
-
C:\Windows\SysWOW64\jdugoosi.exejdugoosi.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1692
-
-
C:\Windows\SysWOW64\czfsslmrvhnwu.execzfsslmrvhnwu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:268
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1436
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5b07517438dce12fb62b9f22318b82e17
SHA10703adad8e60c33c2fd39e7b78130633b1328aab
SHA256dad6febf093c44dd2567766cd2ea928e1b7dc030e26e91ab33ad89262c597ac4
SHA512924b1667de46d0df5f7c14832c80a353970d01d18c8b0795ff80d14cc31157aab2fd72aed82b3777114e6d387154cb607b7a6ee3d823af026eb233b05ae73cec
-
Filesize
255KB
MD5a561e5ed407ea2ebd437a295750d827e
SHA14e97b99df8a49fde82d41063bbf88abd5a8e5e75
SHA25639e41029a817f493051c9d4c8f5581fb37d9567975a94c99ef180c338614f78c
SHA512ad9b8dbbd10cc79bdb7b33703e5a22964a49e2fa4da5723be240975f702fbd427096f08ac27759e4d1300d5fdf6aed11cb7b91f03a6db389a8573d1417a9649a
-
Filesize
255KB
MD5470d18e3f23778117c55b66c49773dfa
SHA110022379a7758c422f9a2fca5d3134d49f375780
SHA25664b354c10ec6a7c7248b28853779044dad5b0a67d57b124c5f2401bbc125b122
SHA51208f0ea8968ed3d25f879a10e3c2bd81786eaf2387205a2c3861ca6592053b61ef5526ac8514a67a6b460205c6f2f6f12e7bea1362ee09bc6ddf7c5d5169ebc63
-
Filesize
255KB
MD5470d18e3f23778117c55b66c49773dfa
SHA110022379a7758c422f9a2fca5d3134d49f375780
SHA25664b354c10ec6a7c7248b28853779044dad5b0a67d57b124c5f2401bbc125b122
SHA51208f0ea8968ed3d25f879a10e3c2bd81786eaf2387205a2c3861ca6592053b61ef5526ac8514a67a6b460205c6f2f6f12e7bea1362ee09bc6ddf7c5d5169ebc63
-
Filesize
255KB
MD53a2936a4173ebd9565f0985893a06d8c
SHA1f0431cb5b5161ec413805c4d599f255c420c105d
SHA256b299e2a67bcc8b01ac72cf3f2664507c1b0d856664e962f9228b7aef8d29d08e
SHA512d41c643cdaa21e65e77fd0db0654e4eccac7201254c2b552dd5f444d9bbfc909607db2dc9323cbc516f58597b2371c0f3f99ee388aa3cd0c819eccfc527fdf0e
-
Filesize
255KB
MD53a2936a4173ebd9565f0985893a06d8c
SHA1f0431cb5b5161ec413805c4d599f255c420c105d
SHA256b299e2a67bcc8b01ac72cf3f2664507c1b0d856664e962f9228b7aef8d29d08e
SHA512d41c643cdaa21e65e77fd0db0654e4eccac7201254c2b552dd5f444d9bbfc909607db2dc9323cbc516f58597b2371c0f3f99ee388aa3cd0c819eccfc527fdf0e
-
Filesize
255KB
MD5b555ee9ffc3ad4a33482f3fa4c87da18
SHA1212b327538c68356089b20e5ae81475ca6841e8b
SHA2561481cbeb2591733e7813f7a59ec3baa8c9fc3e60e808fd9d481789dca5de2746
SHA512d013f5eec0a22ed31f1367b7a37debf599a3e8d30f2587dbc331279b88652e05f37e80d0a3f71c32dd7da93c26177c6888cf099fe52c09d479c14334ab781ead
-
Filesize
255KB
MD5b555ee9ffc3ad4a33482f3fa4c87da18
SHA1212b327538c68356089b20e5ae81475ca6841e8b
SHA2561481cbeb2591733e7813f7a59ec3baa8c9fc3e60e808fd9d481789dca5de2746
SHA512d013f5eec0a22ed31f1367b7a37debf599a3e8d30f2587dbc331279b88652e05f37e80d0a3f71c32dd7da93c26177c6888cf099fe52c09d479c14334ab781ead
-
Filesize
255KB
MD5b555ee9ffc3ad4a33482f3fa4c87da18
SHA1212b327538c68356089b20e5ae81475ca6841e8b
SHA2561481cbeb2591733e7813f7a59ec3baa8c9fc3e60e808fd9d481789dca5de2746
SHA512d013f5eec0a22ed31f1367b7a37debf599a3e8d30f2587dbc331279b88652e05f37e80d0a3f71c32dd7da93c26177c6888cf099fe52c09d479c14334ab781ead
-
Filesize
255KB
MD5caec57a532286e607fabdc8c51b6ea26
SHA1843070395677f38596378231a70713fba8045f37
SHA256497be9b11268b37a90eb88ca769dfe12c20e30df090cebc7edb257cf1a903877
SHA5127a2634eeec0e064e975a6c229aa2c01e94e7af4d4d28bbf266694a2a43b82a66713961749da162db1fbc97f778dc975d91c33a39778527528ca0d9da5505952d
-
Filesize
255KB
MD5caec57a532286e607fabdc8c51b6ea26
SHA1843070395677f38596378231a70713fba8045f37
SHA256497be9b11268b37a90eb88ca769dfe12c20e30df090cebc7edb257cf1a903877
SHA5127a2634eeec0e064e975a6c229aa2c01e94e7af4d4d28bbf266694a2a43b82a66713961749da162db1fbc97f778dc975d91c33a39778527528ca0d9da5505952d
-
Filesize
255KB
MD5caec57a532286e607fabdc8c51b6ea26
SHA1843070395677f38596378231a70713fba8045f37
SHA256497be9b11268b37a90eb88ca769dfe12c20e30df090cebc7edb257cf1a903877
SHA5127a2634eeec0e064e975a6c229aa2c01e94e7af4d4d28bbf266694a2a43b82a66713961749da162db1fbc97f778dc975d91c33a39778527528ca0d9da5505952d
-
Filesize
255KB
MD557f43d6ba9b9a627bb1a3836aeac0bab
SHA1b76c59a45df11ef5264b4e4bffe487d352731d00
SHA25663d1621a7d1dbee0e68b4d4550e93c9cbe2cb16a7ad5c540c19d5225dea13dbd
SHA512c83b249c1ad229d65029fdc703469d40c7b698a3fbe72b2c51c05551df887a86ec7c4e3705e6657f4d9ec87eb8a5c17c684c102059e52e25069feb5939c1567d
-
Filesize
255KB
MD557f43d6ba9b9a627bb1a3836aeac0bab
SHA1b76c59a45df11ef5264b4e4bffe487d352731d00
SHA25663d1621a7d1dbee0e68b4d4550e93c9cbe2cb16a7ad5c540c19d5225dea13dbd
SHA512c83b249c1ad229d65029fdc703469d40c7b698a3fbe72b2c51c05551df887a86ec7c4e3705e6657f4d9ec87eb8a5c17c684c102059e52e25069feb5939c1567d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD53a2936a4173ebd9565f0985893a06d8c
SHA1f0431cb5b5161ec413805c4d599f255c420c105d
SHA256b299e2a67bcc8b01ac72cf3f2664507c1b0d856664e962f9228b7aef8d29d08e
SHA512d41c643cdaa21e65e77fd0db0654e4eccac7201254c2b552dd5f444d9bbfc909607db2dc9323cbc516f58597b2371c0f3f99ee388aa3cd0c819eccfc527fdf0e
-
Filesize
255KB
MD5b555ee9ffc3ad4a33482f3fa4c87da18
SHA1212b327538c68356089b20e5ae81475ca6841e8b
SHA2561481cbeb2591733e7813f7a59ec3baa8c9fc3e60e808fd9d481789dca5de2746
SHA512d013f5eec0a22ed31f1367b7a37debf599a3e8d30f2587dbc331279b88652e05f37e80d0a3f71c32dd7da93c26177c6888cf099fe52c09d479c14334ab781ead
-
Filesize
255KB
MD5b555ee9ffc3ad4a33482f3fa4c87da18
SHA1212b327538c68356089b20e5ae81475ca6841e8b
SHA2561481cbeb2591733e7813f7a59ec3baa8c9fc3e60e808fd9d481789dca5de2746
SHA512d013f5eec0a22ed31f1367b7a37debf599a3e8d30f2587dbc331279b88652e05f37e80d0a3f71c32dd7da93c26177c6888cf099fe52c09d479c14334ab781ead
-
Filesize
255KB
MD5caec57a532286e607fabdc8c51b6ea26
SHA1843070395677f38596378231a70713fba8045f37
SHA256497be9b11268b37a90eb88ca769dfe12c20e30df090cebc7edb257cf1a903877
SHA5127a2634eeec0e064e975a6c229aa2c01e94e7af4d4d28bbf266694a2a43b82a66713961749da162db1fbc97f778dc975d91c33a39778527528ca0d9da5505952d
-
Filesize
255KB
MD5caec57a532286e607fabdc8c51b6ea26
SHA1843070395677f38596378231a70713fba8045f37
SHA256497be9b11268b37a90eb88ca769dfe12c20e30df090cebc7edb257cf1a903877
SHA5127a2634eeec0e064e975a6c229aa2c01e94e7af4d4d28bbf266694a2a43b82a66713961749da162db1fbc97f778dc975d91c33a39778527528ca0d9da5505952d
-
Filesize
255KB
MD557f43d6ba9b9a627bb1a3836aeac0bab
SHA1b76c59a45df11ef5264b4e4bffe487d352731d00
SHA25663d1621a7d1dbee0e68b4d4550e93c9cbe2cb16a7ad5c540c19d5225dea13dbd
SHA512c83b249c1ad229d65029fdc703469d40c7b698a3fbe72b2c51c05551df887a86ec7c4e3705e6657f4d9ec87eb8a5c17c684c102059e52e25069feb5939c1567d