Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:01
Behavioral task
behavioral1
Sample
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe
Resource
win7-20220812-en
General
-
Target
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe
-
Size
255KB
-
MD5
855fa2fe0d782cbd256466662a9dc7a1
-
SHA1
7ca032553c54862e9db8bbb0d632c32254e61802
-
SHA256
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b
-
SHA512
731d79d9099d0a675198fa9e11da1e538dd17581a89caf833ea92711bb66ffb0b337bdfced5d449471f7f8f20ac0bbba72d050f3f778d05d767e524b7cfa5a58
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJn:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIG
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gajdqzcrpa.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gajdqzcrpa.exe -
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gajdqzcrpa.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gajdqzcrpa.exe -
Executes dropped EXE 5 IoCs
Processes:
gajdqzcrpa.exehkchscdmxhiynda.exeosroeyun.exejnreuhgpwkjgf.exeosroeyun.exepid process 1900 gajdqzcrpa.exe 2044 hkchscdmxhiynda.exe 1916 osroeyun.exe 1828 jnreuhgpwkjgf.exe 1080 osroeyun.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\gajdqzcrpa.exe upx C:\Windows\SysWOW64\gajdqzcrpa.exe upx \Windows\SysWOW64\hkchscdmxhiynda.exe upx C:\Windows\SysWOW64\gajdqzcrpa.exe upx C:\Windows\SysWOW64\hkchscdmxhiynda.exe upx \Windows\SysWOW64\osroeyun.exe upx \Windows\SysWOW64\jnreuhgpwkjgf.exe upx behavioral1/memory/868-69-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/868-70-0x0000000003320000-0x00000000033C0000-memory.dmp upx C:\Windows\SysWOW64\osroeyun.exe upx C:\Windows\SysWOW64\osroeyun.exe upx behavioral1/memory/1900-74-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\hkchscdmxhiynda.exe upx behavioral1/memory/1916-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\jnreuhgpwkjgf.exe upx C:\Windows\SysWOW64\jnreuhgpwkjgf.exe upx C:\Windows\SysWOW64\osroeyun.exe upx \Windows\SysWOW64\osroeyun.exe upx behavioral1/memory/868-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1828-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1080-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1916-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1900-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1828-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1080-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx C:\Users\Admin\Documents\MountSearch.doc.exe upx -
Loads dropped DLL 5 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exepid process 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 1900 gajdqzcrpa.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gajdqzcrpa.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
hkchscdmxhiynda.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hkchscdmxhiynda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\weronivm = "gajdqzcrpa.exe" hkchscdmxhiynda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\votijxup = "hkchscdmxhiynda.exe" hkchscdmxhiynda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jnreuhgpwkjgf.exe" hkchscdmxhiynda.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
gajdqzcrpa.exeosroeyun.exeosroeyun.exedescription ioc process File opened (read-only) \??\l: gajdqzcrpa.exe File opened (read-only) \??\x: osroeyun.exe File opened (read-only) \??\r: osroeyun.exe File opened (read-only) \??\v: osroeyun.exe File opened (read-only) \??\i: gajdqzcrpa.exe File opened (read-only) \??\k: gajdqzcrpa.exe File opened (read-only) \??\n: osroeyun.exe File opened (read-only) \??\i: osroeyun.exe File opened (read-only) \??\k: osroeyun.exe File opened (read-only) \??\n: osroeyun.exe File opened (read-only) \??\p: osroeyun.exe File opened (read-only) \??\q: osroeyun.exe File opened (read-only) \??\v: osroeyun.exe File opened (read-only) \??\j: osroeyun.exe File opened (read-only) \??\s: gajdqzcrpa.exe File opened (read-only) \??\t: gajdqzcrpa.exe File opened (read-only) \??\s: osroeyun.exe File opened (read-only) \??\j: gajdqzcrpa.exe File opened (read-only) \??\h: osroeyun.exe File opened (read-only) \??\r: osroeyun.exe File opened (read-only) \??\l: osroeyun.exe File opened (read-only) \??\v: gajdqzcrpa.exe File opened (read-only) \??\g: osroeyun.exe File opened (read-only) \??\b: osroeyun.exe File opened (read-only) \??\k: osroeyun.exe File opened (read-only) \??\m: osroeyun.exe File opened (read-only) \??\a: osroeyun.exe File opened (read-only) \??\s: osroeyun.exe File opened (read-only) \??\g: gajdqzcrpa.exe File opened (read-only) \??\w: gajdqzcrpa.exe File opened (read-only) \??\z: osroeyun.exe File opened (read-only) \??\t: osroeyun.exe File opened (read-only) \??\b: osroeyun.exe File opened (read-only) \??\y: osroeyun.exe File opened (read-only) \??\h: osroeyun.exe File opened (read-only) \??\r: gajdqzcrpa.exe File opened (read-only) \??\t: osroeyun.exe File opened (read-only) \??\p: gajdqzcrpa.exe File opened (read-only) \??\x: gajdqzcrpa.exe File opened (read-only) \??\i: osroeyun.exe File opened (read-only) \??\u: osroeyun.exe File opened (read-only) \??\w: osroeyun.exe File opened (read-only) \??\b: gajdqzcrpa.exe File opened (read-only) \??\n: gajdqzcrpa.exe File opened (read-only) \??\x: osroeyun.exe File opened (read-only) \??\h: gajdqzcrpa.exe File opened (read-only) \??\m: gajdqzcrpa.exe File opened (read-only) \??\e: osroeyun.exe File opened (read-only) \??\f: osroeyun.exe File opened (read-only) \??\f: osroeyun.exe File opened (read-only) \??\g: osroeyun.exe File opened (read-only) \??\p: osroeyun.exe File opened (read-only) \??\j: osroeyun.exe File opened (read-only) \??\y: gajdqzcrpa.exe File opened (read-only) \??\o: osroeyun.exe File opened (read-only) \??\e: osroeyun.exe File opened (read-only) \??\f: gajdqzcrpa.exe File opened (read-only) \??\q: gajdqzcrpa.exe File opened (read-only) \??\a: gajdqzcrpa.exe File opened (read-only) \??\e: gajdqzcrpa.exe File opened (read-only) \??\z: gajdqzcrpa.exe File opened (read-only) \??\a: osroeyun.exe File opened (read-only) \??\q: osroeyun.exe File opened (read-only) \??\z: osroeyun.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
gajdqzcrpa.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gajdqzcrpa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gajdqzcrpa.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/868-69-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1900-74-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1916-76-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/868-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1828-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1080-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1916-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1900-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1828-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1080-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exedescription ioc process File created C:\Windows\SysWOW64\jnreuhgpwkjgf.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\SysWOW64\hkchscdmxhiynda.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File created C:\Windows\SysWOW64\osroeyun.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\SysWOW64\osroeyun.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\SysWOW64\jnreuhgpwkjgf.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gajdqzcrpa.exe File created C:\Windows\SysWOW64\gajdqzcrpa.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\SysWOW64\gajdqzcrpa.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File created C:\Windows\SysWOW64\hkchscdmxhiynda.exe b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe -
Drops file in Program Files directory 14 IoCs
Processes:
osroeyun.exeosroeyun.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe osroeyun.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal osroeyun.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe osroeyun.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal osroeyun.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe osroeyun.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe osroeyun.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe osroeyun.exe -
Drops file in Windows directory 4 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEgajdqzcrpa.exeb62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf gajdqzcrpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gajdqzcrpa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" gajdqzcrpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs gajdqzcrpa.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDFABFF911F19184083B42869F39E3B3FE02FC4361024BE1BF429D08D2" b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC4B029449739ED53CBB9A233E9D7C8" b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gajdqzcrpa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C799C2383206D4677A170252DDC7C8E64D8" b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFBFF894F5D856D903DD72F7D92BC94E635593567366342D7E9" b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1744 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exeosroeyun.exehkchscdmxhiynda.exejnreuhgpwkjgf.exeosroeyun.exepid process 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 1916 osroeyun.exe 1916 osroeyun.exe 1916 osroeyun.exe 1916 osroeyun.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1080 osroeyun.exe 1080 osroeyun.exe 1080 osroeyun.exe 1080 osroeyun.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: SeShutdownPrivilege 1356 explorer.exe Token: 33 2028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2028 AUDIODG.EXE Token: 33 2028 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2028 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exeosroeyun.exehkchscdmxhiynda.exejnreuhgpwkjgf.exeosroeyun.exeexplorer.exepid process 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1916 osroeyun.exe 1916 osroeyun.exe 1916 osroeyun.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1080 osroeyun.exe 1080 osroeyun.exe 1080 osroeyun.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe -
Suspicious use of SendNotifyMessage 37 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exeosroeyun.exehkchscdmxhiynda.exejnreuhgpwkjgf.exeexplorer.exepid process 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1900 gajdqzcrpa.exe 1916 osroeyun.exe 1916 osroeyun.exe 1916 osroeyun.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 2044 hkchscdmxhiynda.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1828 jnreuhgpwkjgf.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe 1356 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1744 WINWORD.EXE 1744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exegajdqzcrpa.exedescription pid process target process PID 868 wrote to memory of 1900 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe gajdqzcrpa.exe PID 868 wrote to memory of 1900 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe gajdqzcrpa.exe PID 868 wrote to memory of 1900 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe gajdqzcrpa.exe PID 868 wrote to memory of 1900 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe gajdqzcrpa.exe PID 868 wrote to memory of 2044 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe hkchscdmxhiynda.exe PID 868 wrote to memory of 2044 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe hkchscdmxhiynda.exe PID 868 wrote to memory of 2044 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe hkchscdmxhiynda.exe PID 868 wrote to memory of 2044 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe hkchscdmxhiynda.exe PID 868 wrote to memory of 1916 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe osroeyun.exe PID 868 wrote to memory of 1916 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe osroeyun.exe PID 868 wrote to memory of 1916 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe osroeyun.exe PID 868 wrote to memory of 1916 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe osroeyun.exe PID 868 wrote to memory of 1828 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe jnreuhgpwkjgf.exe PID 868 wrote to memory of 1828 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe jnreuhgpwkjgf.exe PID 868 wrote to memory of 1828 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe jnreuhgpwkjgf.exe PID 868 wrote to memory of 1828 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe jnreuhgpwkjgf.exe PID 1900 wrote to memory of 1080 1900 gajdqzcrpa.exe osroeyun.exe PID 1900 wrote to memory of 1080 1900 gajdqzcrpa.exe osroeyun.exe PID 1900 wrote to memory of 1080 1900 gajdqzcrpa.exe osroeyun.exe PID 1900 wrote to memory of 1080 1900 gajdqzcrpa.exe osroeyun.exe PID 868 wrote to memory of 1744 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe WINWORD.EXE PID 868 wrote to memory of 1744 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe WINWORD.EXE PID 868 wrote to memory of 1744 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe WINWORD.EXE PID 868 wrote to memory of 1744 868 b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe"C:\Users\Admin\AppData\Local\Temp\b62374321cbc31b0989ff0cebcaef98aab301e90326e856e0d744fd26dcd8e1b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\gajdqzcrpa.exegajdqzcrpa.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\osroeyun.exeC:\Windows\system32\osroeyun.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1080
-
-
-
C:\Windows\SysWOW64\hkchscdmxhiynda.exehkchscdmxhiynda.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2044
-
-
C:\Windows\SysWOW64\osroeyun.exeosroeyun.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1916
-
-
C:\Windows\SysWOW64\jnreuhgpwkjgf.exejnreuhgpwkjgf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1828
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1356
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5ac1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2028
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD54f81da58c5e323bd2a03c64ed29ec3ab
SHA17e4ad8c523c2c5031eecb37f51ac1bf96ef85c05
SHA256f51658f72bc717fb849a81cd6bb0cc33c119c68a112b9d120c83446714c1e604
SHA51276e60022350c6d83e458fbab5e055857b36eccc37c2426d732384c9f815481789e2ae74009e858a9723d27740772c5825d48d09e285e7c8b5d499dbb07f2c378
-
Filesize
255KB
MD5176b6b65a2af02fdbf599bf275580e89
SHA1c6ce4217100d8ebb2ee0df661a1769e7e09f11d2
SHA256d011fe65be2f81fde9d0d11254c552b9b42ccbbdde013fe97a1dbba494f2f8ff
SHA512d71f49049ec218f157dbebc685bdb49c7034aad6cec6574150146400ccb7634c39a56f183bd302523b506a08d4151218e57a29ecc77e52c82e622e6dec798577
-
Filesize
255KB
MD503cc5492fa9a39fe90c63fd706ac91df
SHA19c7c27f6b3f5b585fe234c538acbb1d868bd05c4
SHA256663f6cf54c36c50607779dc0bbfd25c59aa5d33b2be1aa3d212d3b1fff6c20cd
SHA512620776b88619cf69ca6a26a08af52c2a542597363f9a7e0ad1efd89d2e4405fca12198561575daf8efd05f3443a55c22c97c15871ac61b8ce96639877ad91129
-
Filesize
255KB
MD5289e4fc5b480fb6e2ca782ad49808254
SHA18a1258d4f25ceedce5f01fc4c7a624658c21bf69
SHA256de6ac6c7c883eeb5155d260c216fe9df6ef8133b660813e3635649da36c2c5fb
SHA5126530ccf9d6c96847de41b7adf3cae1929959ce433ecd26d124d84dc2ad9bceb0f3924f2ab8e55b1287c86e3be023938411e9d94f5159a12e9fec50f435509bbf
-
Filesize
255KB
MD5289e4fc5b480fb6e2ca782ad49808254
SHA18a1258d4f25ceedce5f01fc4c7a624658c21bf69
SHA256de6ac6c7c883eeb5155d260c216fe9df6ef8133b660813e3635649da36c2c5fb
SHA5126530ccf9d6c96847de41b7adf3cae1929959ce433ecd26d124d84dc2ad9bceb0f3924f2ab8e55b1287c86e3be023938411e9d94f5159a12e9fec50f435509bbf
-
Filesize
255KB
MD5c482e7f7f9a7c6d3a043f7bdbaf4c33a
SHA14f32649a33b22bcf9559dfadffacb383636d939a
SHA2565571973193a3315dadbbdedff1876e1f4f620be32a09b4756d9436cb8b1331e5
SHA51209dd8997d5d4ac546fb89901de1579aec518cc09e7b699fe10e65d6dcf30b3bda969986a6ed9a047b39892abdf7858cc5668505f15d767bdb7328084c62491e8
-
Filesize
255KB
MD5c482e7f7f9a7c6d3a043f7bdbaf4c33a
SHA14f32649a33b22bcf9559dfadffacb383636d939a
SHA2565571973193a3315dadbbdedff1876e1f4f620be32a09b4756d9436cb8b1331e5
SHA51209dd8997d5d4ac546fb89901de1579aec518cc09e7b699fe10e65d6dcf30b3bda969986a6ed9a047b39892abdf7858cc5668505f15d767bdb7328084c62491e8
-
Filesize
255KB
MD5f55597fe141dcba79af049977fbaba75
SHA10223641849104e77eb97ff228b098d1c6e7076a7
SHA2566eac58d1204f9069fe78bb756b249af221113151d1c23a3d9fb761bafee76e2d
SHA5127332abfc5864623aa3097f905dca9ecc60a0362d06f04eb7e72b40f9606ca609c9ff60bd60262c1e83edb7a65408270b15aeda5250d23bf9ef2942193bccf2b6
-
Filesize
255KB
MD5f55597fe141dcba79af049977fbaba75
SHA10223641849104e77eb97ff228b098d1c6e7076a7
SHA2566eac58d1204f9069fe78bb756b249af221113151d1c23a3d9fb761bafee76e2d
SHA5127332abfc5864623aa3097f905dca9ecc60a0362d06f04eb7e72b40f9606ca609c9ff60bd60262c1e83edb7a65408270b15aeda5250d23bf9ef2942193bccf2b6
-
Filesize
255KB
MD556b27b4c6869496d19eaafc8dc65484f
SHA1c69d14ab52ae2665e56a43f2d89b0448203e709b
SHA256c23afcc5b9845f878662f27727c22ed4faf44f5d8c87b3f0f69661129b9860f3
SHA5129351e954e83a35ab3553a94f8390c1b7052a7e62a04cb54a2580bf61aa957b838f4b513ecf153c19ab9ce501d06cd721b6a3fa8940fd60d12ff1add6245aea11
-
Filesize
255KB
MD556b27b4c6869496d19eaafc8dc65484f
SHA1c69d14ab52ae2665e56a43f2d89b0448203e709b
SHA256c23afcc5b9845f878662f27727c22ed4faf44f5d8c87b3f0f69661129b9860f3
SHA5129351e954e83a35ab3553a94f8390c1b7052a7e62a04cb54a2580bf61aa957b838f4b513ecf153c19ab9ce501d06cd721b6a3fa8940fd60d12ff1add6245aea11
-
Filesize
255KB
MD556b27b4c6869496d19eaafc8dc65484f
SHA1c69d14ab52ae2665e56a43f2d89b0448203e709b
SHA256c23afcc5b9845f878662f27727c22ed4faf44f5d8c87b3f0f69661129b9860f3
SHA5129351e954e83a35ab3553a94f8390c1b7052a7e62a04cb54a2580bf61aa957b838f4b513ecf153c19ab9ce501d06cd721b6a3fa8940fd60d12ff1add6245aea11
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5289e4fc5b480fb6e2ca782ad49808254
SHA18a1258d4f25ceedce5f01fc4c7a624658c21bf69
SHA256de6ac6c7c883eeb5155d260c216fe9df6ef8133b660813e3635649da36c2c5fb
SHA5126530ccf9d6c96847de41b7adf3cae1929959ce433ecd26d124d84dc2ad9bceb0f3924f2ab8e55b1287c86e3be023938411e9d94f5159a12e9fec50f435509bbf
-
Filesize
255KB
MD5c482e7f7f9a7c6d3a043f7bdbaf4c33a
SHA14f32649a33b22bcf9559dfadffacb383636d939a
SHA2565571973193a3315dadbbdedff1876e1f4f620be32a09b4756d9436cb8b1331e5
SHA51209dd8997d5d4ac546fb89901de1579aec518cc09e7b699fe10e65d6dcf30b3bda969986a6ed9a047b39892abdf7858cc5668505f15d767bdb7328084c62491e8
-
Filesize
255KB
MD5f55597fe141dcba79af049977fbaba75
SHA10223641849104e77eb97ff228b098d1c6e7076a7
SHA2566eac58d1204f9069fe78bb756b249af221113151d1c23a3d9fb761bafee76e2d
SHA5127332abfc5864623aa3097f905dca9ecc60a0362d06f04eb7e72b40f9606ca609c9ff60bd60262c1e83edb7a65408270b15aeda5250d23bf9ef2942193bccf2b6
-
Filesize
255KB
MD556b27b4c6869496d19eaafc8dc65484f
SHA1c69d14ab52ae2665e56a43f2d89b0448203e709b
SHA256c23afcc5b9845f878662f27727c22ed4faf44f5d8c87b3f0f69661129b9860f3
SHA5129351e954e83a35ab3553a94f8390c1b7052a7e62a04cb54a2580bf61aa957b838f4b513ecf153c19ab9ce501d06cd721b6a3fa8940fd60d12ff1add6245aea11
-
Filesize
255KB
MD556b27b4c6869496d19eaafc8dc65484f
SHA1c69d14ab52ae2665e56a43f2d89b0448203e709b
SHA256c23afcc5b9845f878662f27727c22ed4faf44f5d8c87b3f0f69661129b9860f3
SHA5129351e954e83a35ab3553a94f8390c1b7052a7e62a04cb54a2580bf61aa957b838f4b513ecf153c19ab9ce501d06cd721b6a3fa8940fd60d12ff1add6245aea11