Analysis
-
max time kernel
151s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:01
Behavioral task
behavioral1
Sample
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe
Resource
win7-20221111-en
General
-
Target
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe
-
Size
255KB
-
MD5
4508e3462ab57f779f193428976ba116
-
SHA1
e7198fe50c68ec2269d4e74894d6e2ec4b8f46a3
-
SHA256
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b
-
SHA512
2dac2e0837da9e9a10979444eb520d2a4f4f642070b2c37233c077a9ebfca85666ef3d0b2cf357e416859f1ddf4e5ed23680b4d6c726545c9c0d212a6ed2ffce
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJh:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tyupextqww.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tyupextqww.exe -
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tyupextqww.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tyupextqww.exe -
Executes dropped EXE 6 IoCs
Processes:
tyupextqww.exebmuhvohtauhftzu.exeieneteei.exedscobbpjqtecn.exedscobbpjqtecn.exeieneteei.exepid process 1068 tyupextqww.exe 1740 bmuhvohtauhftzu.exe 1180 ieneteei.exe 460 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 1320 ieneteei.exe -
Processes:
resource yara_rule behavioral1/memory/940-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\tyupextqww.exe upx C:\Windows\SysWOW64\tyupextqww.exe upx \Windows\SysWOW64\bmuhvohtauhftzu.exe upx C:\Windows\SysWOW64\bmuhvohtauhftzu.exe upx C:\Windows\SysWOW64\tyupextqww.exe upx \Windows\SysWOW64\ieneteei.exe upx C:\Windows\SysWOW64\ieneteei.exe upx C:\Windows\SysWOW64\bmuhvohtauhftzu.exe upx C:\Windows\SysWOW64\dscobbpjqtecn.exe upx \Windows\SysWOW64\dscobbpjqtecn.exe upx C:\Windows\SysWOW64\ieneteei.exe upx C:\Windows\SysWOW64\dscobbpjqtecn.exe upx \Windows\SysWOW64\dscobbpjqtecn.exe upx C:\Windows\SysWOW64\dscobbpjqtecn.exe upx \Windows\SysWOW64\ieneteei.exe upx C:\Windows\SysWOW64\ieneteei.exe upx behavioral1/memory/940-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1068-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1740-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1180-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/460-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/552-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1320-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1068-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1740-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1180-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/460-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/552-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1320-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx C:\Users\Admin\AppData\Roaming\MoveResolve.doc.exe upx C:\Users\Admin\Music\RestartGrant.doc.exe upx -
Loads dropped DLL 6 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.execmd.exetyupextqww.exepid process 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 996 cmd.exe 1068 tyupextqww.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tyupextqww.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
bmuhvohtauhftzu.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vaekwwce = "bmuhvohtauhftzu.exe" bmuhvohtauhftzu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "dscobbpjqtecn.exe" bmuhvohtauhftzu.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bmuhvohtauhftzu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pmvyuxym = "tyupextqww.exe" bmuhvohtauhftzu.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
tyupextqww.exeieneteei.exeieneteei.exedescription ioc process File opened (read-only) \??\e: tyupextqww.exe File opened (read-only) \??\k: tyupextqww.exe File opened (read-only) \??\a: ieneteei.exe File opened (read-only) \??\m: ieneteei.exe File opened (read-only) \??\x: ieneteei.exe File opened (read-only) \??\n: ieneteei.exe File opened (read-only) \??\x: ieneteei.exe File opened (read-only) \??\z: ieneteei.exe File opened (read-only) \??\u: tyupextqww.exe File opened (read-only) \??\i: ieneteei.exe File opened (read-only) \??\q: ieneteei.exe File opened (read-only) \??\m: ieneteei.exe File opened (read-only) \??\w: ieneteei.exe File opened (read-only) \??\j: tyupextqww.exe File opened (read-only) \??\x: tyupextqww.exe File opened (read-only) \??\f: ieneteei.exe File opened (read-only) \??\p: ieneteei.exe File opened (read-only) \??\u: ieneteei.exe File opened (read-only) \??\f: ieneteei.exe File opened (read-only) \??\a: tyupextqww.exe File opened (read-only) \??\g: ieneteei.exe File opened (read-only) \??\o: ieneteei.exe File opened (read-only) \??\v: ieneteei.exe File opened (read-only) \??\z: ieneteei.exe File opened (read-only) \??\i: tyupextqww.exe File opened (read-only) \??\v: tyupextqww.exe File opened (read-only) \??\l: ieneteei.exe File opened (read-only) \??\n: ieneteei.exe File opened (read-only) \??\y: ieneteei.exe File opened (read-only) \??\e: ieneteei.exe File opened (read-only) \??\k: ieneteei.exe File opened (read-only) \??\u: ieneteei.exe File opened (read-only) \??\v: ieneteei.exe File opened (read-only) \??\p: tyupextqww.exe File opened (read-only) \??\b: ieneteei.exe File opened (read-only) \??\h: ieneteei.exe File opened (read-only) \??\s: ieneteei.exe File opened (read-only) \??\q: ieneteei.exe File opened (read-only) \??\s: ieneteei.exe File opened (read-only) \??\h: tyupextqww.exe File opened (read-only) \??\o: tyupextqww.exe File opened (read-only) \??\e: ieneteei.exe File opened (read-only) \??\r: ieneteei.exe File opened (read-only) \??\z: tyupextqww.exe File opened (read-only) \??\j: ieneteei.exe File opened (read-only) \??\r: tyupextqww.exe File opened (read-only) \??\w: tyupextqww.exe File opened (read-only) \??\q: tyupextqww.exe File opened (read-only) \??\f: tyupextqww.exe File opened (read-only) \??\l: tyupextqww.exe File opened (read-only) \??\b: ieneteei.exe File opened (read-only) \??\o: ieneteei.exe File opened (read-only) \??\y: ieneteei.exe File opened (read-only) \??\n: tyupextqww.exe File opened (read-only) \??\s: tyupextqww.exe File opened (read-only) \??\w: ieneteei.exe File opened (read-only) \??\h: ieneteei.exe File opened (read-only) \??\p: ieneteei.exe File opened (read-only) \??\t: ieneteei.exe File opened (read-only) \??\m: tyupextqww.exe File opened (read-only) \??\y: tyupextqww.exe File opened (read-only) \??\a: ieneteei.exe File opened (read-only) \??\g: ieneteei.exe File opened (read-only) \??\t: tyupextqww.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
tyupextqww.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tyupextqww.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tyupextqww.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/940-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/940-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1068-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1740-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1180-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/460-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/552-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1320-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1068-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1740-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1180-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/460-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/552-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1320-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exetyupextqww.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ieneteei.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\dscobbpjqtecn.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tyupextqww.exe File opened for modification C:\Windows\SysWOW64\tyupextqww.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\bmuhvohtauhftzu.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\ieneteei.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\tyupextqww.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\bmuhvohtauhftzu.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\dscobbpjqtecn.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe -
Drops file in Program Files directory 15 IoCs
Processes:
ieneteei.exeieneteei.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ieneteei.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ieneteei.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ieneteei.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal ieneteei.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ieneteei.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe ieneteei.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal ieneteei.exe -
Drops file in Windows directory 5 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEtyupextqww.exe86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tyupextqww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tyupextqww.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh tyupextqww.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472D089D2C82246A4277A777222DDF7CF265DE" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC2B12F47E0399852CABAD732E9D7CF" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tyupextqww.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tyupextqww.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1868 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exetyupextqww.exedscobbpjqtecn.exebmuhvohtauhftzu.exeieneteei.exedscobbpjqtecn.exeieneteei.exepid process 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1180 ieneteei.exe 1180 ieneteei.exe 1180 ieneteei.exe 1180 ieneteei.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 1320 ieneteei.exe 1320 ieneteei.exe 1320 ieneteei.exe 1320 ieneteei.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1740 bmuhvohtauhftzu.exe 552 dscobbpjqtecn.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exetyupextqww.exebmuhvohtauhftzu.exedscobbpjqtecn.exeieneteei.exedscobbpjqtecn.exeieneteei.exepid process 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1180 ieneteei.exe 1180 ieneteei.exe 1180 ieneteei.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 1320 ieneteei.exe 1320 ieneteei.exe 1320 ieneteei.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exetyupextqww.exebmuhvohtauhftzu.exedscobbpjqtecn.exeieneteei.exedscobbpjqtecn.exeieneteei.exepid process 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1068 tyupextqww.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 1740 bmuhvohtauhftzu.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 460 dscobbpjqtecn.exe 1180 ieneteei.exe 1180 ieneteei.exe 1180 ieneteei.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 552 dscobbpjqtecn.exe 1320 ieneteei.exe 1320 ieneteei.exe 1320 ieneteei.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1868 WINWORD.EXE 1868 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exebmuhvohtauhftzu.execmd.exetyupextqww.exeWINWORD.EXEdescription pid process target process PID 940 wrote to memory of 1068 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe tyupextqww.exe PID 940 wrote to memory of 1068 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe tyupextqww.exe PID 940 wrote to memory of 1068 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe tyupextqww.exe PID 940 wrote to memory of 1068 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe tyupextqww.exe PID 940 wrote to memory of 1740 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe bmuhvohtauhftzu.exe PID 940 wrote to memory of 1740 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe bmuhvohtauhftzu.exe PID 940 wrote to memory of 1740 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe bmuhvohtauhftzu.exe PID 940 wrote to memory of 1740 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe bmuhvohtauhftzu.exe PID 940 wrote to memory of 1180 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe ieneteei.exe PID 940 wrote to memory of 1180 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe ieneteei.exe PID 940 wrote to memory of 1180 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe ieneteei.exe PID 940 wrote to memory of 1180 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe ieneteei.exe PID 940 wrote to memory of 460 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe dscobbpjqtecn.exe PID 940 wrote to memory of 460 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe dscobbpjqtecn.exe PID 940 wrote to memory of 460 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe dscobbpjqtecn.exe PID 940 wrote to memory of 460 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe dscobbpjqtecn.exe PID 1740 wrote to memory of 996 1740 bmuhvohtauhftzu.exe cmd.exe PID 1740 wrote to memory of 996 1740 bmuhvohtauhftzu.exe cmd.exe PID 1740 wrote to memory of 996 1740 bmuhvohtauhftzu.exe cmd.exe PID 1740 wrote to memory of 996 1740 bmuhvohtauhftzu.exe cmd.exe PID 996 wrote to memory of 552 996 cmd.exe dscobbpjqtecn.exe PID 996 wrote to memory of 552 996 cmd.exe dscobbpjqtecn.exe PID 996 wrote to memory of 552 996 cmd.exe dscobbpjqtecn.exe PID 996 wrote to memory of 552 996 cmd.exe dscobbpjqtecn.exe PID 1068 wrote to memory of 1320 1068 tyupextqww.exe ieneteei.exe PID 1068 wrote to memory of 1320 1068 tyupextqww.exe ieneteei.exe PID 1068 wrote to memory of 1320 1068 tyupextqww.exe ieneteei.exe PID 1068 wrote to memory of 1320 1068 tyupextqww.exe ieneteei.exe PID 940 wrote to memory of 1868 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 940 wrote to memory of 1868 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 940 wrote to memory of 1868 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 940 wrote to memory of 1868 940 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 1868 wrote to memory of 268 1868 WINWORD.EXE splwow64.exe PID 1868 wrote to memory of 268 1868 WINWORD.EXE splwow64.exe PID 1868 wrote to memory of 268 1868 WINWORD.EXE splwow64.exe PID 1868 wrote to memory of 268 1868 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe"C:\Users\Admin\AppData\Local\Temp\86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\tyupextqww.exetyupextqww.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\ieneteei.exeC:\Windows\system32\ieneteei.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1320 -
C:\Windows\SysWOW64\bmuhvohtauhftzu.exebmuhvohtauhftzu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd.exe /c dscobbpjqtecn.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\dscobbpjqtecn.exedscobbpjqtecn.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:552 -
C:\Windows\SysWOW64\ieneteei.exeieneteei.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1180 -
C:\Windows\SysWOW64\dscobbpjqtecn.exedscobbpjqtecn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:460 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:268
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e5b78954b4d9d8e87ba03aea52ca2336
SHA1168b4b2fbbdab69c09cf8739259703da72d76976
SHA25615779085c20279660a1d5aaf0b6967f237274295ab13b89d6494bfc55c991f5e
SHA512958042155f213dc8bc6527936d5c3076791ea3d996f9ab614de6994fe115e5e1ca72897ee193b729789d4df8d7f9fdb7e308ac1ca0cc0f4f2e8c210fb1928c3a
-
Filesize
255KB
MD5882f3cdad1ef109607019623f83007a9
SHA15fce8be65075201a13f6c999983cd661955e9448
SHA256aa58dabbf8a4d54374358d46d10345158b3e6ad10c3859287a56e4872a59e320
SHA51286798621538de727c73f875012e1b5a6681a65d9877188d9537ada572cd402ac46706054e309f19447b615675c9583f288e06fcabfd2ed5a907e8f2aa9901f05
-
Filesize
255KB
MD575aa3270a1f725ff56d9158ecd7fd6d0
SHA1e1b187f34806807d3e9783c3a4b232d79e1e4f5a
SHA256ca60afbe6e3506204cd46d00a4cbecddec183c95020f0c982568eb50c54a39a3
SHA512dfdf21549dca6131c13fa5e283a4d8a944125834109c502553c39915822f9b7a156d139344679c1b44fdcd55879b96193eded38fa64c29c1702d73b6e8e03cd1
-
Filesize
255KB
MD5c6030365159e0555e9fdac048eb1a44a
SHA13d484a6ef4047968f6250e9a949d14742c24aaa5
SHA2561acad306e268ecfa450a08b36b6832b3987f54a77670ed59e0f17f759c393c18
SHA5123ba4280483cfd22dd56f80fce748a209d2b258b48af5fdbff34deb4e6be5fb0fa06955f1534df3d2e4e1cca5c39b098792cffecbb9215714215e01afe6362115
-
Filesize
255KB
MD5c6030365159e0555e9fdac048eb1a44a
SHA13d484a6ef4047968f6250e9a949d14742c24aaa5
SHA2561acad306e268ecfa450a08b36b6832b3987f54a77670ed59e0f17f759c393c18
SHA5123ba4280483cfd22dd56f80fce748a209d2b258b48af5fdbff34deb4e6be5fb0fa06955f1534df3d2e4e1cca5c39b098792cffecbb9215714215e01afe6362115
-
Filesize
255KB
MD54698f7370f04ed6475a5a2fd66765165
SHA1f6eb36250ae4e21f8fa80c93eccec9ae213cdba8
SHA2562b7a8d3c75f5709cf906a666d5ddbdfd1ac7134a99336e7d8044afcfdc86a0a4
SHA51246595da63bbca787f9aa03a72f007d697819eaac6b1eb59fca5b99b3c76322d5bca6ac9b0ec0193c56ab79dc7bd4cf1794c19f01c056f0bf22eff39c3240c1f6
-
Filesize
255KB
MD54698f7370f04ed6475a5a2fd66765165
SHA1f6eb36250ae4e21f8fa80c93eccec9ae213cdba8
SHA2562b7a8d3c75f5709cf906a666d5ddbdfd1ac7134a99336e7d8044afcfdc86a0a4
SHA51246595da63bbca787f9aa03a72f007d697819eaac6b1eb59fca5b99b3c76322d5bca6ac9b0ec0193c56ab79dc7bd4cf1794c19f01c056f0bf22eff39c3240c1f6
-
Filesize
255KB
MD54698f7370f04ed6475a5a2fd66765165
SHA1f6eb36250ae4e21f8fa80c93eccec9ae213cdba8
SHA2562b7a8d3c75f5709cf906a666d5ddbdfd1ac7134a99336e7d8044afcfdc86a0a4
SHA51246595da63bbca787f9aa03a72f007d697819eaac6b1eb59fca5b99b3c76322d5bca6ac9b0ec0193c56ab79dc7bd4cf1794c19f01c056f0bf22eff39c3240c1f6
-
Filesize
255KB
MD57e8c676de907a0ff80dc9168e903d4a7
SHA170e3445ec412475512e4ecbbf76da65e8b126bc0
SHA256acd9bfd5df28d4cf7e3b1cc44905da3f42b6434b312a0463f4ac51cfa5de2a90
SHA5124ea7dc2a8c9a040c00e780ef3aeb5e750bb04fe40a0f7423680051c7d7b3d8e44a384a60a36f915a11061f15cce3086c01b8b99ae4e04e121ad9077ad595f9f8
-
Filesize
255KB
MD57e8c676de907a0ff80dc9168e903d4a7
SHA170e3445ec412475512e4ecbbf76da65e8b126bc0
SHA256acd9bfd5df28d4cf7e3b1cc44905da3f42b6434b312a0463f4ac51cfa5de2a90
SHA5124ea7dc2a8c9a040c00e780ef3aeb5e750bb04fe40a0f7423680051c7d7b3d8e44a384a60a36f915a11061f15cce3086c01b8b99ae4e04e121ad9077ad595f9f8
-
Filesize
255KB
MD57e8c676de907a0ff80dc9168e903d4a7
SHA170e3445ec412475512e4ecbbf76da65e8b126bc0
SHA256acd9bfd5df28d4cf7e3b1cc44905da3f42b6434b312a0463f4ac51cfa5de2a90
SHA5124ea7dc2a8c9a040c00e780ef3aeb5e750bb04fe40a0f7423680051c7d7b3d8e44a384a60a36f915a11061f15cce3086c01b8b99ae4e04e121ad9077ad595f9f8
-
Filesize
255KB
MD5c1a0645928a3c61c978961802df5601f
SHA1ae3c8ff19a9b1e4bb6f70375a645b194a300251c
SHA256a4b8ea2d4edbd1c84c2537dec5488d543b623394782332a7adfced67f7dbdbe9
SHA512c884c86c847883713dd95771fab0df606c99466c04f9d11905ef2c5e9c4a1ea089bdf56e260c5dc1b1c1e9ce62475f5009c612a008612e260cde88e8f33cc32d
-
Filesize
255KB
MD5c1a0645928a3c61c978961802df5601f
SHA1ae3c8ff19a9b1e4bb6f70375a645b194a300251c
SHA256a4b8ea2d4edbd1c84c2537dec5488d543b623394782332a7adfced67f7dbdbe9
SHA512c884c86c847883713dd95771fab0df606c99466c04f9d11905ef2c5e9c4a1ea089bdf56e260c5dc1b1c1e9ce62475f5009c612a008612e260cde88e8f33cc32d
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5c6030365159e0555e9fdac048eb1a44a
SHA13d484a6ef4047968f6250e9a949d14742c24aaa5
SHA2561acad306e268ecfa450a08b36b6832b3987f54a77670ed59e0f17f759c393c18
SHA5123ba4280483cfd22dd56f80fce748a209d2b258b48af5fdbff34deb4e6be5fb0fa06955f1534df3d2e4e1cca5c39b098792cffecbb9215714215e01afe6362115
-
Filesize
255KB
MD54698f7370f04ed6475a5a2fd66765165
SHA1f6eb36250ae4e21f8fa80c93eccec9ae213cdba8
SHA2562b7a8d3c75f5709cf906a666d5ddbdfd1ac7134a99336e7d8044afcfdc86a0a4
SHA51246595da63bbca787f9aa03a72f007d697819eaac6b1eb59fca5b99b3c76322d5bca6ac9b0ec0193c56ab79dc7bd4cf1794c19f01c056f0bf22eff39c3240c1f6
-
Filesize
255KB
MD54698f7370f04ed6475a5a2fd66765165
SHA1f6eb36250ae4e21f8fa80c93eccec9ae213cdba8
SHA2562b7a8d3c75f5709cf906a666d5ddbdfd1ac7134a99336e7d8044afcfdc86a0a4
SHA51246595da63bbca787f9aa03a72f007d697819eaac6b1eb59fca5b99b3c76322d5bca6ac9b0ec0193c56ab79dc7bd4cf1794c19f01c056f0bf22eff39c3240c1f6
-
Filesize
255KB
MD57e8c676de907a0ff80dc9168e903d4a7
SHA170e3445ec412475512e4ecbbf76da65e8b126bc0
SHA256acd9bfd5df28d4cf7e3b1cc44905da3f42b6434b312a0463f4ac51cfa5de2a90
SHA5124ea7dc2a8c9a040c00e780ef3aeb5e750bb04fe40a0f7423680051c7d7b3d8e44a384a60a36f915a11061f15cce3086c01b8b99ae4e04e121ad9077ad595f9f8
-
Filesize
255KB
MD57e8c676de907a0ff80dc9168e903d4a7
SHA170e3445ec412475512e4ecbbf76da65e8b126bc0
SHA256acd9bfd5df28d4cf7e3b1cc44905da3f42b6434b312a0463f4ac51cfa5de2a90
SHA5124ea7dc2a8c9a040c00e780ef3aeb5e750bb04fe40a0f7423680051c7d7b3d8e44a384a60a36f915a11061f15cce3086c01b8b99ae4e04e121ad9077ad595f9f8
-
Filesize
255KB
MD5c1a0645928a3c61c978961802df5601f
SHA1ae3c8ff19a9b1e4bb6f70375a645b194a300251c
SHA256a4b8ea2d4edbd1c84c2537dec5488d543b623394782332a7adfced67f7dbdbe9
SHA512c884c86c847883713dd95771fab0df606c99466c04f9d11905ef2c5e9c4a1ea089bdf56e260c5dc1b1c1e9ce62475f5009c612a008612e260cde88e8f33cc32d