Analysis
-
max time kernel
152s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:01
Behavioral task
behavioral1
Sample
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe
Resource
win7-20220812-en
General
-
Target
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe
-
Size
255KB
-
MD5
2b494e60880898b400240d07acc066d3
-
SHA1
c279aa527fcbf7ff67ba788545212d1d72e5aa51
-
SHA256
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d
-
SHA512
644fad58d1565886c2a74ab2f9e7a0ecc80d78975d3b4ee5fd3a6b326b2275b0f864bada26c81431a9b9091d70c697a3461ba090b6bccdee7e5ee68569e64fec
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJF:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" shoxqyzrbg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" shoxqyzrbg.exe -
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" shoxqyzrbg.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" shoxqyzrbg.exe -
Executes dropped EXE 5 IoCs
Processes:
shoxqyzrbg.exedwulweptqxagzqc.exelsrzxkvr.exehigsfagrhljxa.exelsrzxkvr.exepid process 1980 shoxqyzrbg.exe 940 dwulweptqxagzqc.exe 1716 lsrzxkvr.exe 1092 higsfagrhljxa.exe 1800 lsrzxkvr.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\shoxqyzrbg.exe upx \Windows\SysWOW64\lsrzxkvr.exe upx C:\Windows\SysWOW64\shoxqyzrbg.exe upx \Windows\SysWOW64\dwulweptqxagzqc.exe upx C:\Windows\SysWOW64\dwulweptqxagzqc.exe upx \Windows\SysWOW64\higsfagrhljxa.exe upx C:\Windows\SysWOW64\lsrzxkvr.exe upx C:\Windows\SysWOW64\higsfagrhljxa.exe upx C:\Windows\SysWOW64\shoxqyzrbg.exe upx C:\Windows\SysWOW64\lsrzxkvr.exe upx C:\Windows\SysWOW64\dwulweptqxagzqc.exe upx C:\Windows\SysWOW64\higsfagrhljxa.exe upx behavioral1/memory/1720-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1980-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/940-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1716-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1092-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\lsrzxkvr.exe upx C:\Windows\SysWOW64\lsrzxkvr.exe upx behavioral1/memory/1800-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1720-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1980-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/940-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1716-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1092-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1800-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exepid process 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1980 shoxqyzrbg.exe -
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" shoxqyzrbg.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
dwulweptqxagzqc.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run dwulweptqxagzqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gabehoqn = "shoxqyzrbg.exe" dwulweptqxagzqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lyzxqjur = "dwulweptqxagzqc.exe" dwulweptqxagzqc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "higsfagrhljxa.exe" dwulweptqxagzqc.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
shoxqyzrbg.exelsrzxkvr.exelsrzxkvr.exedescription ioc process File opened (read-only) \??\o: shoxqyzrbg.exe File opened (read-only) \??\z: shoxqyzrbg.exe File opened (read-only) \??\a: lsrzxkvr.exe File opened (read-only) \??\h: lsrzxkvr.exe File opened (read-only) \??\s: lsrzxkvr.exe File opened (read-only) \??\u: lsrzxkvr.exe File opened (read-only) \??\w: lsrzxkvr.exe File opened (read-only) \??\q: shoxqyzrbg.exe File opened (read-only) \??\y: shoxqyzrbg.exe File opened (read-only) \??\z: lsrzxkvr.exe File opened (read-only) \??\j: shoxqyzrbg.exe File opened (read-only) \??\y: lsrzxkvr.exe File opened (read-only) \??\p: lsrzxkvr.exe File opened (read-only) \??\v: lsrzxkvr.exe File opened (read-only) \??\b: shoxqyzrbg.exe File opened (read-only) \??\w: shoxqyzrbg.exe File opened (read-only) \??\f: lsrzxkvr.exe File opened (read-only) \??\w: lsrzxkvr.exe File opened (read-only) \??\z: lsrzxkvr.exe File opened (read-only) \??\f: shoxqyzrbg.exe File opened (read-only) \??\h: shoxqyzrbg.exe File opened (read-only) \??\l: shoxqyzrbg.exe File opened (read-only) \??\m: shoxqyzrbg.exe File opened (read-only) \??\x: lsrzxkvr.exe File opened (read-only) \??\i: lsrzxkvr.exe File opened (read-only) \??\l: lsrzxkvr.exe File opened (read-only) \??\g: shoxqyzrbg.exe File opened (read-only) \??\u: shoxqyzrbg.exe File opened (read-only) \??\e: lsrzxkvr.exe File opened (read-only) \??\g: lsrzxkvr.exe File opened (read-only) \??\r: lsrzxkvr.exe File opened (read-only) \??\j: lsrzxkvr.exe File opened (read-only) \??\o: lsrzxkvr.exe File opened (read-only) \??\o: lsrzxkvr.exe File opened (read-only) \??\y: lsrzxkvr.exe File opened (read-only) \??\k: shoxqyzrbg.exe File opened (read-only) \??\a: shoxqyzrbg.exe File opened (read-only) \??\f: lsrzxkvr.exe File opened (read-only) \??\m: lsrzxkvr.exe File opened (read-only) \??\t: lsrzxkvr.exe File opened (read-only) \??\i: lsrzxkvr.exe File opened (read-only) \??\m: lsrzxkvr.exe File opened (read-only) \??\q: lsrzxkvr.exe File opened (read-only) \??\x: lsrzxkvr.exe File opened (read-only) \??\n: shoxqyzrbg.exe File opened (read-only) \??\j: lsrzxkvr.exe File opened (read-only) \??\n: lsrzxkvr.exe File opened (read-only) \??\t: lsrzxkvr.exe File opened (read-only) \??\i: shoxqyzrbg.exe File opened (read-only) \??\n: lsrzxkvr.exe File opened (read-only) \??\v: lsrzxkvr.exe File opened (read-only) \??\g: lsrzxkvr.exe File opened (read-only) \??\k: lsrzxkvr.exe File opened (read-only) \??\q: lsrzxkvr.exe File opened (read-only) \??\r: lsrzxkvr.exe File opened (read-only) \??\b: lsrzxkvr.exe File opened (read-only) \??\k: lsrzxkvr.exe File opened (read-only) \??\b: lsrzxkvr.exe File opened (read-only) \??\l: lsrzxkvr.exe File opened (read-only) \??\p: shoxqyzrbg.exe File opened (read-only) \??\t: shoxqyzrbg.exe File opened (read-only) \??\x: shoxqyzrbg.exe File opened (read-only) \??\s: lsrzxkvr.exe File opened (read-only) \??\a: lsrzxkvr.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
shoxqyzrbg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" shoxqyzrbg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" shoxqyzrbg.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1720-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1980-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/940-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1720-79-0x00000000033B0000-0x0000000003450000-memory.dmp autoit_exe behavioral1/memory/1716-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1092-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1800-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1720-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1980-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/940-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1716-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1092-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1800-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exedescription ioc process File opened for modification C:\Windows\SysWOW64\lsrzxkvr.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File created C:\Windows\SysWOW64\higsfagrhljxa.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File opened for modification C:\Windows\SysWOW64\higsfagrhljxa.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll shoxqyzrbg.exe File opened for modification C:\Windows\SysWOW64\shoxqyzrbg.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File created C:\Windows\SysWOW64\dwulweptqxagzqc.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File opened for modification C:\Windows\SysWOW64\dwulweptqxagzqc.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File created C:\Windows\SysWOW64\lsrzxkvr.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File created C:\Windows\SysWOW64\shoxqyzrbg.exe b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe -
Drops file in Program Files directory 14 IoCs
Processes:
lsrzxkvr.exelsrzxkvr.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lsrzxkvr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lsrzxkvr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lsrzxkvr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lsrzxkvr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lsrzxkvr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lsrzxkvr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lsrzxkvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lsrzxkvr.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXEb8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exedescription ioc process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEshoxqyzrbg.exeexplorer.exeb8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" shoxqyzrbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" shoxqyzrbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC7781491DBB3B9BC7C97ECE237CB" b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf shoxqyzrbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg shoxqyzrbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1704 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exelsrzxkvr.exehigsfagrhljxa.exedwulweptqxagzqc.exelsrzxkvr.exepid process 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 1800 lsrzxkvr.exe 1800 lsrzxkvr.exe 1800 lsrzxkvr.exe 1800 lsrzxkvr.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 940 dwulweptqxagzqc.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 956 explorer.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: 33 1936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1936 AUDIODG.EXE Token: 33 1936 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1936 AUDIODG.EXE Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe Token: SeShutdownPrivilege 956 explorer.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exedwulweptqxagzqc.exelsrzxkvr.exehigsfagrhljxa.exelsrzxkvr.exeexplorer.exepid process 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1800 lsrzxkvr.exe 1800 lsrzxkvr.exe 1800 lsrzxkvr.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe -
Suspicious use of SendNotifyMessage 41 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exedwulweptqxagzqc.exelsrzxkvr.exehigsfagrhljxa.exeexplorer.exepid process 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 1980 shoxqyzrbg.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 940 dwulweptqxagzqc.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1716 lsrzxkvr.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 1092 higsfagrhljxa.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe 956 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1704 WINWORD.EXE 1704 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exeshoxqyzrbg.exeWINWORD.EXEdescription pid process target process PID 1720 wrote to memory of 1980 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe shoxqyzrbg.exe PID 1720 wrote to memory of 1980 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe shoxqyzrbg.exe PID 1720 wrote to memory of 1980 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe shoxqyzrbg.exe PID 1720 wrote to memory of 1980 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe shoxqyzrbg.exe PID 1720 wrote to memory of 940 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe dwulweptqxagzqc.exe PID 1720 wrote to memory of 940 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe dwulweptqxagzqc.exe PID 1720 wrote to memory of 940 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe dwulweptqxagzqc.exe PID 1720 wrote to memory of 940 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe dwulweptqxagzqc.exe PID 1720 wrote to memory of 1716 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe lsrzxkvr.exe PID 1720 wrote to memory of 1716 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe lsrzxkvr.exe PID 1720 wrote to memory of 1716 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe lsrzxkvr.exe PID 1720 wrote to memory of 1716 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe lsrzxkvr.exe PID 1720 wrote to memory of 1092 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe higsfagrhljxa.exe PID 1720 wrote to memory of 1092 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe higsfagrhljxa.exe PID 1720 wrote to memory of 1092 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe higsfagrhljxa.exe PID 1720 wrote to memory of 1092 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe higsfagrhljxa.exe PID 1980 wrote to memory of 1800 1980 shoxqyzrbg.exe lsrzxkvr.exe PID 1980 wrote to memory of 1800 1980 shoxqyzrbg.exe lsrzxkvr.exe PID 1980 wrote to memory of 1800 1980 shoxqyzrbg.exe lsrzxkvr.exe PID 1980 wrote to memory of 1800 1980 shoxqyzrbg.exe lsrzxkvr.exe PID 1720 wrote to memory of 1704 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe WINWORD.EXE PID 1720 wrote to memory of 1704 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe WINWORD.EXE PID 1720 wrote to memory of 1704 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe WINWORD.EXE PID 1720 wrote to memory of 1704 1720 b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe WINWORD.EXE PID 1704 wrote to memory of 1764 1704 WINWORD.EXE splwow64.exe PID 1704 wrote to memory of 1764 1704 WINWORD.EXE splwow64.exe PID 1704 wrote to memory of 1764 1704 WINWORD.EXE splwow64.exe PID 1704 wrote to memory of 1764 1704 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe"C:\Users\Admin\AppData\Local\Temp\b8e84aef0d7ba76491d0f309d743af797c2966a4e52b3f324e4b2590caac937d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\shoxqyzrbg.exeshoxqyzrbg.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\lsrzxkvr.exeC:\Windows\system32\lsrzxkvr.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1800
-
-
-
C:\Windows\SysWOW64\dwulweptqxagzqc.exedwulweptqxagzqc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:940
-
-
C:\Windows\SysWOW64\lsrzxkvr.exelsrzxkvr.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1716
-
-
C:\Windows\SysWOW64\higsfagrhljxa.exehigsfagrhljxa.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1764
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5941⤵
- Suspicious use of AdjustPrivilegeToken
PID:1936
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5e4a9a668035d2f93ce484d4ffcfbc918
SHA1070c619a0d8576491fdd50f102a187591004c13d
SHA2564ea4609bc1feeea83c9a62b8096fd770302bd6629b2ed38b2a92ba4bf5c01cc8
SHA5127ae9801dbfa16f60c512975ae4bb5c17dc5473ac7deea870122dcbfb80dadc342ace4a2288e71d48ee464591d99d0e8f21f50ada932da9b4a86e9dd14454ee1b
-
Filesize
255KB
MD5285bbd46b9dbfb1609bcd6eee8048a8a
SHA1e9c488938b7bdc2574573a9c5e5f968b0c691010
SHA256c73fb3351b96361e1925459211e0963afa05351dc07078a4955962d671794628
SHA51247e38e6862692fd896d5e8d9a4706d773c8ce06028c61ab6184e6f68cbb42885151ec3f22dac93b0528d1df978f3ff12554d7b5ac32d7b316ecf155ea17a89d5
-
Filesize
255KB
MD5285bbd46b9dbfb1609bcd6eee8048a8a
SHA1e9c488938b7bdc2574573a9c5e5f968b0c691010
SHA256c73fb3351b96361e1925459211e0963afa05351dc07078a4955962d671794628
SHA51247e38e6862692fd896d5e8d9a4706d773c8ce06028c61ab6184e6f68cbb42885151ec3f22dac93b0528d1df978f3ff12554d7b5ac32d7b316ecf155ea17a89d5
-
Filesize
255KB
MD55cf1ac5bee5e3634365870db122dce43
SHA144e3da405473ad051445fc17322d858e5e0384b9
SHA256965e8ba0d250fa700d3496f80fb5f8e2b067501715bab1cbd3f5a642f24a01c5
SHA51290124d07d5e3faacd689161731ca5088b0995e23d6f1d528d7dac55090b66677ca7b2861479729d5d261d2a6de2b5608483315c4f8c629b0899264c41bfa000f
-
Filesize
255KB
MD55cf1ac5bee5e3634365870db122dce43
SHA144e3da405473ad051445fc17322d858e5e0384b9
SHA256965e8ba0d250fa700d3496f80fb5f8e2b067501715bab1cbd3f5a642f24a01c5
SHA51290124d07d5e3faacd689161731ca5088b0995e23d6f1d528d7dac55090b66677ca7b2861479729d5d261d2a6de2b5608483315c4f8c629b0899264c41bfa000f
-
Filesize
255KB
MD5d68e359b5a70bc72c48f98d7bb7c6dfc
SHA192924427dbad090eca749452f5379f9988fc931a
SHA256b7436fa7d9a299d3e3dc4121620d0363fc229c38f79db6e7ca732177b7996b3e
SHA5127f61195bda6c2635f40d9b2bb298aa19104d6f1371dd93832bc97917f3005fa5c3c56ba482e80e4bac07d719c42e89113797a2f5f3b16a90c1d729daee8e472d
-
Filesize
255KB
MD5d68e359b5a70bc72c48f98d7bb7c6dfc
SHA192924427dbad090eca749452f5379f9988fc931a
SHA256b7436fa7d9a299d3e3dc4121620d0363fc229c38f79db6e7ca732177b7996b3e
SHA5127f61195bda6c2635f40d9b2bb298aa19104d6f1371dd93832bc97917f3005fa5c3c56ba482e80e4bac07d719c42e89113797a2f5f3b16a90c1d729daee8e472d
-
Filesize
255KB
MD5d68e359b5a70bc72c48f98d7bb7c6dfc
SHA192924427dbad090eca749452f5379f9988fc931a
SHA256b7436fa7d9a299d3e3dc4121620d0363fc229c38f79db6e7ca732177b7996b3e
SHA5127f61195bda6c2635f40d9b2bb298aa19104d6f1371dd93832bc97917f3005fa5c3c56ba482e80e4bac07d719c42e89113797a2f5f3b16a90c1d729daee8e472d
-
Filesize
255KB
MD589ca181c8947603fb8c43f5d5adbfe52
SHA1fedc8ed99eb0b3e37b1d8b7dc76e9b7c0f4b662d
SHA2567cab6645b0c490e8043715a0aaf7d6ca217be3c6d7c2fc84eb7319b756af629a
SHA51285f9a9f922f7ab8c1e7d6576b116ae6103a4d8ac7258c4d22e56a51df4b86db13a1ea68451ce50f4bc90526dd3993ba287527fe3f8d3392f42dba9b3972bb431
-
Filesize
255KB
MD589ca181c8947603fb8c43f5d5adbfe52
SHA1fedc8ed99eb0b3e37b1d8b7dc76e9b7c0f4b662d
SHA2567cab6645b0c490e8043715a0aaf7d6ca217be3c6d7c2fc84eb7319b756af629a
SHA51285f9a9f922f7ab8c1e7d6576b116ae6103a4d8ac7258c4d22e56a51df4b86db13a1ea68451ce50f4bc90526dd3993ba287527fe3f8d3392f42dba9b3972bb431
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5e4a9a668035d2f93ce484d4ffcfbc918
SHA1070c619a0d8576491fdd50f102a187591004c13d
SHA2564ea4609bc1feeea83c9a62b8096fd770302bd6629b2ed38b2a92ba4bf5c01cc8
SHA5127ae9801dbfa16f60c512975ae4bb5c17dc5473ac7deea870122dcbfb80dadc342ace4a2288e71d48ee464591d99d0e8f21f50ada932da9b4a86e9dd14454ee1b
-
Filesize
255KB
MD5285bbd46b9dbfb1609bcd6eee8048a8a
SHA1e9c488938b7bdc2574573a9c5e5f968b0c691010
SHA256c73fb3351b96361e1925459211e0963afa05351dc07078a4955962d671794628
SHA51247e38e6862692fd896d5e8d9a4706d773c8ce06028c61ab6184e6f68cbb42885151ec3f22dac93b0528d1df978f3ff12554d7b5ac32d7b316ecf155ea17a89d5
-
Filesize
255KB
MD55cf1ac5bee5e3634365870db122dce43
SHA144e3da405473ad051445fc17322d858e5e0384b9
SHA256965e8ba0d250fa700d3496f80fb5f8e2b067501715bab1cbd3f5a642f24a01c5
SHA51290124d07d5e3faacd689161731ca5088b0995e23d6f1d528d7dac55090b66677ca7b2861479729d5d261d2a6de2b5608483315c4f8c629b0899264c41bfa000f
-
Filesize
255KB
MD5d68e359b5a70bc72c48f98d7bb7c6dfc
SHA192924427dbad090eca749452f5379f9988fc931a
SHA256b7436fa7d9a299d3e3dc4121620d0363fc229c38f79db6e7ca732177b7996b3e
SHA5127f61195bda6c2635f40d9b2bb298aa19104d6f1371dd93832bc97917f3005fa5c3c56ba482e80e4bac07d719c42e89113797a2f5f3b16a90c1d729daee8e472d
-
Filesize
255KB
MD5d68e359b5a70bc72c48f98d7bb7c6dfc
SHA192924427dbad090eca749452f5379f9988fc931a
SHA256b7436fa7d9a299d3e3dc4121620d0363fc229c38f79db6e7ca732177b7996b3e
SHA5127f61195bda6c2635f40d9b2bb298aa19104d6f1371dd93832bc97917f3005fa5c3c56ba482e80e4bac07d719c42e89113797a2f5f3b16a90c1d729daee8e472d
-
Filesize
255KB
MD589ca181c8947603fb8c43f5d5adbfe52
SHA1fedc8ed99eb0b3e37b1d8b7dc76e9b7c0f4b662d
SHA2567cab6645b0c490e8043715a0aaf7d6ca217be3c6d7c2fc84eb7319b756af629a
SHA51285f9a9f922f7ab8c1e7d6576b116ae6103a4d8ac7258c4d22e56a51df4b86db13a1ea68451ce50f4bc90526dd3993ba287527fe3f8d3392f42dba9b3972bb431