Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe
Resource
win7-20220812-en
General
-
Target
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe
-
Size
255KB
-
MD5
e16dffcae0434e7e9e5012aa3c96caee
-
SHA1
cfb03b4f0ef8e829a32a3f3a4824308fada5da59
-
SHA256
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef
-
SHA512
d17e1861f11158588180821c2d1de6496ee1ceb6b4c43a739771b29e4fd848fc56da4b7ea343aef48a6708de4ce8f20574b6840bc8870acb53f07b500507de96
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJb:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ecrqacizxl.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ecrqacizxl.exe -
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ecrqacizxl.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ecrqacizxl.exe -
Executes dropped EXE 5 IoCs
Processes:
ecrqacizxl.exefyitkndetalbzzk.exeelslctjg.exemevdmqbppkqxe.exeelslctjg.exepid process 240 ecrqacizxl.exe 1756 fyitkndetalbzzk.exe 1000 elslctjg.exe 2004 mevdmqbppkqxe.exe 320 elslctjg.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\ecrqacizxl.exe upx C:\Windows\SysWOW64\ecrqacizxl.exe upx C:\Windows\SysWOW64\ecrqacizxl.exe upx \Windows\SysWOW64\fyitkndetalbzzk.exe upx C:\Windows\SysWOW64\fyitkndetalbzzk.exe upx \Windows\SysWOW64\elslctjg.exe upx C:\Windows\SysWOW64\fyitkndetalbzzk.exe upx \Windows\SysWOW64\mevdmqbppkqxe.exe upx C:\Windows\SysWOW64\elslctjg.exe upx C:\Windows\SysWOW64\elslctjg.exe upx C:\Windows\SysWOW64\mevdmqbppkqxe.exe upx C:\Windows\SysWOW64\elslctjg.exe upx C:\Windows\SysWOW64\mevdmqbppkqxe.exe upx \Windows\SysWOW64\elslctjg.exe upx behavioral1/memory/1908-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/240-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1756-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1000-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2004-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/320-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1908-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/240-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1756-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1000-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/320-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2004-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exepid process 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 240 ecrqacizxl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ecrqacizxl.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fyitkndetalbzzk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xwflekgs = "fyitkndetalbzzk.exe" fyitkndetalbzzk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "mevdmqbppkqxe.exe" fyitkndetalbzzk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run fyitkndetalbzzk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vubeaqfb = "ecrqacizxl.exe" fyitkndetalbzzk.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
elslctjg.exeecrqacizxl.exeelslctjg.exedescription ioc process File opened (read-only) \??\l: elslctjg.exe File opened (read-only) \??\m: ecrqacizxl.exe File opened (read-only) \??\p: ecrqacizxl.exe File opened (read-only) \??\s: ecrqacizxl.exe File opened (read-only) \??\b: elslctjg.exe File opened (read-only) \??\k: elslctjg.exe File opened (read-only) \??\v: elslctjg.exe File opened (read-only) \??\o: ecrqacizxl.exe File opened (read-only) \??\r: ecrqacizxl.exe File opened (read-only) \??\w: elslctjg.exe File opened (read-only) \??\a: elslctjg.exe File opened (read-only) \??\h: ecrqacizxl.exe File opened (read-only) \??\j: ecrqacizxl.exe File opened (read-only) \??\z: ecrqacizxl.exe File opened (read-only) \??\z: elslctjg.exe File opened (read-only) \??\v: ecrqacizxl.exe File opened (read-only) \??\g: elslctjg.exe File opened (read-only) \??\j: elslctjg.exe File opened (read-only) \??\u: elslctjg.exe File opened (read-only) \??\m: elslctjg.exe File opened (read-only) \??\u: elslctjg.exe File opened (read-only) \??\x: elslctjg.exe File opened (read-only) \??\l: ecrqacizxl.exe File opened (read-only) \??\y: ecrqacizxl.exe File opened (read-only) \??\i: elslctjg.exe File opened (read-only) \??\o: elslctjg.exe File opened (read-only) \??\f: elslctjg.exe File opened (read-only) \??\g: ecrqacizxl.exe File opened (read-only) \??\k: ecrqacizxl.exe File opened (read-only) \??\b: elslctjg.exe File opened (read-only) \??\t: ecrqacizxl.exe File opened (read-only) \??\b: ecrqacizxl.exe File opened (read-only) \??\x: elslctjg.exe File opened (read-only) \??\n: ecrqacizxl.exe File opened (read-only) \??\h: elslctjg.exe File opened (read-only) \??\p: elslctjg.exe File opened (read-only) \??\r: elslctjg.exe File opened (read-only) \??\h: elslctjg.exe File opened (read-only) \??\p: elslctjg.exe File opened (read-only) \??\t: elslctjg.exe File opened (read-only) \??\a: ecrqacizxl.exe File opened (read-only) \??\x: ecrqacizxl.exe File opened (read-only) \??\g: elslctjg.exe File opened (read-only) \??\j: elslctjg.exe File opened (read-only) \??\s: elslctjg.exe File opened (read-only) \??\w: ecrqacizxl.exe File opened (read-only) \??\q: elslctjg.exe File opened (read-only) \??\s: elslctjg.exe File opened (read-only) \??\n: elslctjg.exe File opened (read-only) \??\o: elslctjg.exe File opened (read-only) \??\q: elslctjg.exe File opened (read-only) \??\f: ecrqacizxl.exe File opened (read-only) \??\q: ecrqacizxl.exe File opened (read-only) \??\l: elslctjg.exe File opened (read-only) \??\n: elslctjg.exe File opened (read-only) \??\t: elslctjg.exe File opened (read-only) \??\e: elslctjg.exe File opened (read-only) \??\e: elslctjg.exe File opened (read-only) \??\k: elslctjg.exe File opened (read-only) \??\v: elslctjg.exe File opened (read-only) \??\i: elslctjg.exe File opened (read-only) \??\y: elslctjg.exe File opened (read-only) \??\z: elslctjg.exe File opened (read-only) \??\m: elslctjg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ecrqacizxl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ecrqacizxl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ecrqacizxl.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1908-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/240-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1756-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1000-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/320-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1908-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/240-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1756-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1000-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/320-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exedescription ioc process File created C:\Windows\SysWOW64\elslctjg.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File created C:\Windows\SysWOW64\mevdmqbppkqxe.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ecrqacizxl.exe File created C:\Windows\SysWOW64\ecrqacizxl.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\SysWOW64\ecrqacizxl.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\SysWOW64\fyitkndetalbzzk.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File created C:\Windows\SysWOW64\fyitkndetalbzzk.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\SysWOW64\elslctjg.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\SysWOW64\mevdmqbppkqxe.exe 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe -
Drops file in Program Files directory 14 IoCs
Processes:
elslctjg.exeelslctjg.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe elslctjg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe elslctjg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal elslctjg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe elslctjg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe elslctjg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal elslctjg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe elslctjg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal elslctjg.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXE88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXE88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33462C7B9D5282276A4676D3702F2DAD7C8664AC" 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ecrqacizxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ecrqacizxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg ecrqacizxl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ecrqacizxl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1292 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exeelslctjg.exefyitkndetalbzzk.exemevdmqbppkqxe.exeelslctjg.exepid process 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1000 elslctjg.exe 1000 elslctjg.exe 1000 elslctjg.exe 1000 elslctjg.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 320 elslctjg.exe 320 elslctjg.exe 320 elslctjg.exe 320 elslctjg.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 1756 fyitkndetalbzzk.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: SeShutdownPrivilege 1684 explorer.exe Token: 33 2012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2012 AUDIODG.EXE Token: 33 2012 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2012 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 43 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exefyitkndetalbzzk.exeelslctjg.exemevdmqbppkqxe.exeelslctjg.exeexplorer.exepid process 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1000 elslctjg.exe 1000 elslctjg.exe 1000 elslctjg.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 320 elslctjg.exe 320 elslctjg.exe 320 elslctjg.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SendNotifyMessage 39 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exefyitkndetalbzzk.exeelslctjg.exemevdmqbppkqxe.exeelslctjg.exeexplorer.exepid process 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 240 ecrqacizxl.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1756 fyitkndetalbzzk.exe 1000 elslctjg.exe 1000 elslctjg.exe 1000 elslctjg.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 2004 mevdmqbppkqxe.exe 320 elslctjg.exe 320 elslctjg.exe 320 elslctjg.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe 1684 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1292 WINWORD.EXE 1292 WINWORD.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exeecrqacizxl.exedescription pid process target process PID 1908 wrote to memory of 240 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe ecrqacizxl.exe PID 1908 wrote to memory of 240 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe ecrqacizxl.exe PID 1908 wrote to memory of 240 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe ecrqacizxl.exe PID 1908 wrote to memory of 240 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe ecrqacizxl.exe PID 1908 wrote to memory of 1756 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe fyitkndetalbzzk.exe PID 1908 wrote to memory of 1756 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe fyitkndetalbzzk.exe PID 1908 wrote to memory of 1756 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe fyitkndetalbzzk.exe PID 1908 wrote to memory of 1756 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe fyitkndetalbzzk.exe PID 1908 wrote to memory of 1000 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe elslctjg.exe PID 1908 wrote to memory of 1000 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe elslctjg.exe PID 1908 wrote to memory of 1000 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe elslctjg.exe PID 1908 wrote to memory of 1000 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe elslctjg.exe PID 1908 wrote to memory of 2004 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe mevdmqbppkqxe.exe PID 1908 wrote to memory of 2004 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe mevdmqbppkqxe.exe PID 1908 wrote to memory of 2004 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe mevdmqbppkqxe.exe PID 1908 wrote to memory of 2004 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe mevdmqbppkqxe.exe PID 240 wrote to memory of 320 240 ecrqacizxl.exe elslctjg.exe PID 240 wrote to memory of 320 240 ecrqacizxl.exe elslctjg.exe PID 240 wrote to memory of 320 240 ecrqacizxl.exe elslctjg.exe PID 240 wrote to memory of 320 240 ecrqacizxl.exe elslctjg.exe PID 1908 wrote to memory of 1292 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe WINWORD.EXE PID 1908 wrote to memory of 1292 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe WINWORD.EXE PID 1908 wrote to memory of 1292 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe WINWORD.EXE PID 1908 wrote to memory of 1292 1908 88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe"C:\Users\Admin\AppData\Local\Temp\88b11acbc810715c121447c02765223fd4d981a851cd5cc2b466ea7e75100aef.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\ecrqacizxl.exeecrqacizxl.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\elslctjg.exeC:\Windows\system32\elslctjg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:320
-
-
-
C:\Windows\SysWOW64\fyitkndetalbzzk.exefyitkndetalbzzk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1756
-
-
C:\Windows\SysWOW64\elslctjg.exeelslctjg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1000
-
-
C:\Windows\SysWOW64\mevdmqbppkqxe.exemevdmqbppkqxe.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2004
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1684
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5801⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD510a955386e16dc96b5d51182cdcab984
SHA1863980b5b4e0764ec16e676a48805577903e722b
SHA25671e88b1533b4599c1aa9b71b29667011b9630a4ce2dbe33f9a84f6b87286d03a
SHA5127b156a6abb6b7f060e8f0fa94ec3c0195463a3883896724e3afefc6285c55114e836eb1b7fa1bf06c446f6657c18b47b48de63a5d206750f12e16629313e9cd3
-
Filesize
255KB
MD529432cb5af5355d74bfd872825bbe64e
SHA1f1e407533f78742caa966454c575eafbf0b4d244
SHA2564194e2ae17d4f08e7f27c2278759f3970460140941c2841dc1f1584db3da9114
SHA512860785e74f4bb4f9a118cd2048163f6ceb4188d62ff3b26a3b18cbe3e2bc4d8da9e85816159c189b0bc79e83dd96868596a4af874e5d6a8b5334691e3a3b5dae
-
Filesize
255KB
MD575a7a931514dc68bb7d1c7bf74fe4a84
SHA1bd122134e391024df67bd9ce6096308f01f4bed4
SHA2567851b115c7dd4ba019748cb229f81ea24c40d6a3fcc576236e05a8f602d3de56
SHA512987e3789284fff6809defedf71da455c1495f7a3504fa2834fe5f93778314db17bf8118b6f3893adfed66b5c825d3719db33e28ce6d24b881fdbb849ff2e3a7e
-
Filesize
255KB
MD575a7a931514dc68bb7d1c7bf74fe4a84
SHA1bd122134e391024df67bd9ce6096308f01f4bed4
SHA2567851b115c7dd4ba019748cb229f81ea24c40d6a3fcc576236e05a8f602d3de56
SHA512987e3789284fff6809defedf71da455c1495f7a3504fa2834fe5f93778314db17bf8118b6f3893adfed66b5c825d3719db33e28ce6d24b881fdbb849ff2e3a7e
-
Filesize
255KB
MD5d49cc961053024bd390837fe58dce126
SHA1ec51ef9effce1d30db8fdcbae6d1e40fe065a0f4
SHA2563930927cb9d1a4b5bd294cf5fb16617427f42b854a40d6a1ead6e88fceb9f41e
SHA512680cefa9ba3d17cf459770bcd7a65017434a62a2d16128d1fce68fda08ac4710938b7c61b03d45d14acd5fb4310dec8e7e73cbe1b7609a07548e74af2848f878
-
Filesize
255KB
MD5d49cc961053024bd390837fe58dce126
SHA1ec51ef9effce1d30db8fdcbae6d1e40fe065a0f4
SHA2563930927cb9d1a4b5bd294cf5fb16617427f42b854a40d6a1ead6e88fceb9f41e
SHA512680cefa9ba3d17cf459770bcd7a65017434a62a2d16128d1fce68fda08ac4710938b7c61b03d45d14acd5fb4310dec8e7e73cbe1b7609a07548e74af2848f878
-
Filesize
255KB
MD5d49cc961053024bd390837fe58dce126
SHA1ec51ef9effce1d30db8fdcbae6d1e40fe065a0f4
SHA2563930927cb9d1a4b5bd294cf5fb16617427f42b854a40d6a1ead6e88fceb9f41e
SHA512680cefa9ba3d17cf459770bcd7a65017434a62a2d16128d1fce68fda08ac4710938b7c61b03d45d14acd5fb4310dec8e7e73cbe1b7609a07548e74af2848f878
-
Filesize
255KB
MD5ec1ca162abff69e1cea5cd0d5eb973d3
SHA1a9110a3af21a6f565cea8e98f7582dd0bfa5ff10
SHA25625d72c206a5af563acdfb938abfcd23ffba02225fbf49a8409160313b4a0f89a
SHA51216100db58c0935e899c1abcbbb82b17c430e7a459e02c67d61790e4c160df7992b6811f80cb8e1f2b12cc420da9c2b1411c753cab00280b9216b0cf83603634a
-
Filesize
255KB
MD5ec1ca162abff69e1cea5cd0d5eb973d3
SHA1a9110a3af21a6f565cea8e98f7582dd0bfa5ff10
SHA25625d72c206a5af563acdfb938abfcd23ffba02225fbf49a8409160313b4a0f89a
SHA51216100db58c0935e899c1abcbbb82b17c430e7a459e02c67d61790e4c160df7992b6811f80cb8e1f2b12cc420da9c2b1411c753cab00280b9216b0cf83603634a
-
Filesize
255KB
MD57cbd47b2bfba322211c0b287b1b1ab16
SHA108c0d465bd8f2508cb881f9ce43ec26760bc07ba
SHA256cdd1120e8ccfe84f61b1b8af7c6ef133e3d4582d1bb4ac18df856e1ba3e4a836
SHA512732fc69d4e48e380caec7b9f265308f6e11acb13dc3807dc93d23ee06b9534f10e63e415064ee74127858d4b09dff3a0921882f6e882ed6c1d9530849cf40251
-
Filesize
255KB
MD57cbd47b2bfba322211c0b287b1b1ab16
SHA108c0d465bd8f2508cb881f9ce43ec26760bc07ba
SHA256cdd1120e8ccfe84f61b1b8af7c6ef133e3d4582d1bb4ac18df856e1ba3e4a836
SHA512732fc69d4e48e380caec7b9f265308f6e11acb13dc3807dc93d23ee06b9534f10e63e415064ee74127858d4b09dff3a0921882f6e882ed6c1d9530849cf40251
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD575a7a931514dc68bb7d1c7bf74fe4a84
SHA1bd122134e391024df67bd9ce6096308f01f4bed4
SHA2567851b115c7dd4ba019748cb229f81ea24c40d6a3fcc576236e05a8f602d3de56
SHA512987e3789284fff6809defedf71da455c1495f7a3504fa2834fe5f93778314db17bf8118b6f3893adfed66b5c825d3719db33e28ce6d24b881fdbb849ff2e3a7e
-
Filesize
255KB
MD5d49cc961053024bd390837fe58dce126
SHA1ec51ef9effce1d30db8fdcbae6d1e40fe065a0f4
SHA2563930927cb9d1a4b5bd294cf5fb16617427f42b854a40d6a1ead6e88fceb9f41e
SHA512680cefa9ba3d17cf459770bcd7a65017434a62a2d16128d1fce68fda08ac4710938b7c61b03d45d14acd5fb4310dec8e7e73cbe1b7609a07548e74af2848f878
-
Filesize
255KB
MD5d49cc961053024bd390837fe58dce126
SHA1ec51ef9effce1d30db8fdcbae6d1e40fe065a0f4
SHA2563930927cb9d1a4b5bd294cf5fb16617427f42b854a40d6a1ead6e88fceb9f41e
SHA512680cefa9ba3d17cf459770bcd7a65017434a62a2d16128d1fce68fda08ac4710938b7c61b03d45d14acd5fb4310dec8e7e73cbe1b7609a07548e74af2848f878
-
Filesize
255KB
MD5ec1ca162abff69e1cea5cd0d5eb973d3
SHA1a9110a3af21a6f565cea8e98f7582dd0bfa5ff10
SHA25625d72c206a5af563acdfb938abfcd23ffba02225fbf49a8409160313b4a0f89a
SHA51216100db58c0935e899c1abcbbb82b17c430e7a459e02c67d61790e4c160df7992b6811f80cb8e1f2b12cc420da9c2b1411c753cab00280b9216b0cf83603634a
-
Filesize
255KB
MD57cbd47b2bfba322211c0b287b1b1ab16
SHA108c0d465bd8f2508cb881f9ce43ec26760bc07ba
SHA256cdd1120e8ccfe84f61b1b8af7c6ef133e3d4582d1bb4ac18df856e1ba3e4a836
SHA512732fc69d4e48e380caec7b9f265308f6e11acb13dc3807dc93d23ee06b9534f10e63e415064ee74127858d4b09dff3a0921882f6e882ed6c1d9530849cf40251