Analysis
-
max time kernel
172s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe
Resource
win7-20221111-en
General
-
Target
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe
-
Size
255KB
-
MD5
29091989086425a6d3a63e48c680b4a9
-
SHA1
4af28fb42da89139ec542da17d7163b67f5e6311
-
SHA256
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8
-
SHA512
f5faf616867096b621b00d49c7701cf7c81a4cfdfa41a74c9f30ee1bbedce082186dd135190caf9e2c37b765296c793dcb9a2fa3ede5a88947f2a02f2c9914a8
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ+:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIf
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" iwswlohgxv.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iwswlohgxv.exe -
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" iwswlohgxv.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iwswlohgxv.exe -
Executes dropped EXE 5 IoCs
Processes:
iwswlohgxv.exelfibmhaw.exevwxzltumxnxtbaw.exefkfbutctydsre.exelfibmhaw.exepid process 1516 iwswlohgxv.exe 524 lfibmhaw.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 996 lfibmhaw.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule behavioral1/memory/1708-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\iwswlohgxv.exe upx behavioral1/memory/1708-57-0x0000000002F60000-0x0000000003000000-memory.dmp upx \Windows\SysWOW64\vwxzltumxnxtbaw.exe upx C:\Windows\SysWOW64\iwswlohgxv.exe upx C:\Windows\SysWOW64\iwswlohgxv.exe upx \Windows\SysWOW64\lfibmhaw.exe upx C:\Windows\SysWOW64\vwxzltumxnxtbaw.exe upx C:\Windows\SysWOW64\lfibmhaw.exe upx \Windows\SysWOW64\fkfbutctydsre.exe upx behavioral1/memory/1516-74-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\fkfbutctydsre.exe upx C:\Windows\SysWOW64\lfibmhaw.exe upx C:\Windows\SysWOW64\vwxzltumxnxtbaw.exe upx behavioral1/memory/1496-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\fkfbutctydsre.exe upx behavioral1/memory/564-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/524-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1708-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\lfibmhaw.exe upx C:\Windows\SysWOW64\lfibmhaw.exe upx behavioral1/memory/996-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1516-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/524-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/564-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1496-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/996-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exeiwswlohgxv.exepid process 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1516 iwswlohgxv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iwswlohgxv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
vwxzltumxnxtbaw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "fkfbutctydsre.exe" vwxzltumxnxtbaw.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vwxzltumxnxtbaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lyxuaffr = "iwswlohgxv.exe" vwxzltumxnxtbaw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rliekeoy = "vwxzltumxnxtbaw.exe" vwxzltumxnxtbaw.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
lfibmhaw.exeiwswlohgxv.exelfibmhaw.exedescription ioc process File opened (read-only) \??\i: lfibmhaw.exe File opened (read-only) \??\p: lfibmhaw.exe File opened (read-only) \??\a: iwswlohgxv.exe File opened (read-only) \??\w: iwswlohgxv.exe File opened (read-only) \??\h: lfibmhaw.exe File opened (read-only) \??\u: lfibmhaw.exe File opened (read-only) \??\f: lfibmhaw.exe File opened (read-only) \??\m: lfibmhaw.exe File opened (read-only) \??\a: lfibmhaw.exe File opened (read-only) \??\f: lfibmhaw.exe File opened (read-only) \??\h: lfibmhaw.exe File opened (read-only) \??\n: lfibmhaw.exe File opened (read-only) \??\r: iwswlohgxv.exe File opened (read-only) \??\a: lfibmhaw.exe File opened (read-only) \??\x: lfibmhaw.exe File opened (read-only) \??\q: iwswlohgxv.exe File opened (read-only) \??\l: lfibmhaw.exe File opened (read-only) \??\s: iwswlohgxv.exe File opened (read-only) \??\j: lfibmhaw.exe File opened (read-only) \??\k: iwswlohgxv.exe File opened (read-only) \??\p: iwswlohgxv.exe File opened (read-only) \??\v: iwswlohgxv.exe File opened (read-only) \??\t: lfibmhaw.exe File opened (read-only) \??\k: lfibmhaw.exe File opened (read-only) \??\t: iwswlohgxv.exe File opened (read-only) \??\o: lfibmhaw.exe File opened (read-only) \??\s: lfibmhaw.exe File opened (read-only) \??\g: lfibmhaw.exe File opened (read-only) \??\l: lfibmhaw.exe File opened (read-only) \??\t: lfibmhaw.exe File opened (read-only) \??\h: iwswlohgxv.exe File opened (read-only) \??\g: lfibmhaw.exe File opened (read-only) \??\i: lfibmhaw.exe File opened (read-only) \??\w: lfibmhaw.exe File opened (read-only) \??\b: lfibmhaw.exe File opened (read-only) \??\r: lfibmhaw.exe File opened (read-only) \??\q: lfibmhaw.exe File opened (read-only) \??\r: lfibmhaw.exe File opened (read-only) \??\x: lfibmhaw.exe File opened (read-only) \??\m: iwswlohgxv.exe File opened (read-only) \??\x: iwswlohgxv.exe File opened (read-only) \??\z: iwswlohgxv.exe File opened (read-only) \??\f: iwswlohgxv.exe File opened (read-only) \??\o: iwswlohgxv.exe File opened (read-only) \??\e: lfibmhaw.exe File opened (read-only) \??\k: lfibmhaw.exe File opened (read-only) \??\q: lfibmhaw.exe File opened (read-only) \??\v: lfibmhaw.exe File opened (read-only) \??\n: iwswlohgxv.exe File opened (read-only) \??\j: lfibmhaw.exe File opened (read-only) \??\n: lfibmhaw.exe File opened (read-only) \??\o: lfibmhaw.exe File opened (read-only) \??\u: lfibmhaw.exe File opened (read-only) \??\g: iwswlohgxv.exe File opened (read-only) \??\y: iwswlohgxv.exe File opened (read-only) \??\m: lfibmhaw.exe File opened (read-only) \??\y: lfibmhaw.exe File opened (read-only) \??\i: iwswlohgxv.exe File opened (read-only) \??\y: lfibmhaw.exe File opened (read-only) \??\z: lfibmhaw.exe File opened (read-only) \??\z: lfibmhaw.exe File opened (read-only) \??\b: iwswlohgxv.exe File opened (read-only) \??\l: iwswlohgxv.exe File opened (read-only) \??\p: lfibmhaw.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
iwswlohgxv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" iwswlohgxv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" iwswlohgxv.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1516-74-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1496-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/564-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1708-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1516-90-0x0000000003CB0000-0x0000000003D50000-memory.dmp autoit_exe behavioral1/memory/996-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1516-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/524-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/564-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1496-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/996-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exeiwswlohgxv.exedescription ioc process File created C:\Windows\SysWOW64\iwswlohgxv.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File created C:\Windows\SysWOW64\vwxzltumxnxtbaw.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\SysWOW64\lfibmhaw.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\SysWOW64\iwswlohgxv.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\SysWOW64\vwxzltumxnxtbaw.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File created C:\Windows\SysWOW64\lfibmhaw.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File created C:\Windows\SysWOW64\fkfbutctydsre.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\SysWOW64\fkfbutctydsre.exe 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll iwswlohgxv.exe -
Drops file in Program Files directory 15 IoCs
Processes:
lfibmhaw.exelfibmhaw.exedescription ioc process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lfibmhaw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lfibmhaw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lfibmhaw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lfibmhaw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lfibmhaw.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXE82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEiwswlohgxv.exeexplorer.exe82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs iwswlohgxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc iwswlohgxv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7FD68C3FF6C22DDD208D0A88A7F9013" 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg iwswlohgxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iwswlohgxv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C67D1590DABEB8CF7CE1ED9137B9" 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33352D7F9D5182586A3076A6702E2CD97C8665DF" 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 960 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exefkfbutctydsre.exevwxzltumxnxtbaw.exeiwswlohgxv.exelfibmhaw.exelfibmhaw.exepid process 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe Token: SeShutdownPrivilege 1096 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exeiwswlohgxv.exefkfbutctydsre.exevwxzltumxnxtbaw.exelfibmhaw.exeexplorer.exelfibmhaw.exepid process 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 996 lfibmhaw.exe 1096 explorer.exe 1096 explorer.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe -
Suspicious use of SendNotifyMessage 50 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exeiwswlohgxv.exefkfbutctydsre.exevwxzltumxnxtbaw.exelfibmhaw.exeexplorer.exelfibmhaw.exepid process 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1516 iwswlohgxv.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 1496 fkfbutctydsre.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 564 vwxzltumxnxtbaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 524 lfibmhaw.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 996 lfibmhaw.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe 1096 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 960 WINWORD.EXE 960 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exeiwswlohgxv.exeWINWORD.EXEdescription pid process target process PID 1708 wrote to memory of 1516 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe iwswlohgxv.exe PID 1708 wrote to memory of 1516 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe iwswlohgxv.exe PID 1708 wrote to memory of 1516 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe iwswlohgxv.exe PID 1708 wrote to memory of 1516 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe iwswlohgxv.exe PID 1708 wrote to memory of 564 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe vwxzltumxnxtbaw.exe PID 1708 wrote to memory of 564 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe vwxzltumxnxtbaw.exe PID 1708 wrote to memory of 564 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe vwxzltumxnxtbaw.exe PID 1708 wrote to memory of 564 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe vwxzltumxnxtbaw.exe PID 1708 wrote to memory of 524 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe lfibmhaw.exe PID 1708 wrote to memory of 524 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe lfibmhaw.exe PID 1708 wrote to memory of 524 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe lfibmhaw.exe PID 1708 wrote to memory of 524 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe lfibmhaw.exe PID 1708 wrote to memory of 1496 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe fkfbutctydsre.exe PID 1708 wrote to memory of 1496 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe fkfbutctydsre.exe PID 1708 wrote to memory of 1496 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe fkfbutctydsre.exe PID 1708 wrote to memory of 1496 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe fkfbutctydsre.exe PID 1708 wrote to memory of 960 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe WINWORD.EXE PID 1708 wrote to memory of 960 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe WINWORD.EXE PID 1708 wrote to memory of 960 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe WINWORD.EXE PID 1708 wrote to memory of 960 1708 82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe WINWORD.EXE PID 1516 wrote to memory of 996 1516 iwswlohgxv.exe lfibmhaw.exe PID 1516 wrote to memory of 996 1516 iwswlohgxv.exe lfibmhaw.exe PID 1516 wrote to memory of 996 1516 iwswlohgxv.exe lfibmhaw.exe PID 1516 wrote to memory of 996 1516 iwswlohgxv.exe lfibmhaw.exe PID 960 wrote to memory of 772 960 WINWORD.EXE splwow64.exe PID 960 wrote to memory of 772 960 WINWORD.EXE splwow64.exe PID 960 wrote to memory of 772 960 WINWORD.EXE splwow64.exe PID 960 wrote to memory of 772 960 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe"C:\Users\Admin\AppData\Local\Temp\82652d8fa981f813639208ad313c783ee5d7c808afeb18fb98c79f584656a0a8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\iwswlohgxv.exeiwswlohgxv.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\lfibmhaw.exeC:\Windows\system32\lfibmhaw.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996 -
C:\Windows\SysWOW64\vwxzltumxnxtbaw.exevwxzltumxnxtbaw.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:564 -
C:\Windows\SysWOW64\lfibmhaw.exelfibmhaw.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:524 -
C:\Windows\SysWOW64\fkfbutctydsre.exefkfbutctydsre.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1496 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:772
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1096
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5941⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD52d619abd11897dc5d7154f4fc2d29258
SHA15bfdf9bd96410820a9ded614a198f60135406a49
SHA2562efe0e163bea70606bba391b4b797836540ea9054fbbe1e59280b4b30a9f11dc
SHA5129808dd18aee7e026f390ae47494a25f3d672a66b710ea138f0c7f656198fe5339e4f11beb1bd48d69a3fa6f8aa026e386a376e91a56e0d1db369c26d809d2829
-
Filesize
255KB
MD52d619abd11897dc5d7154f4fc2d29258
SHA15bfdf9bd96410820a9ded614a198f60135406a49
SHA2562efe0e163bea70606bba391b4b797836540ea9054fbbe1e59280b4b30a9f11dc
SHA5129808dd18aee7e026f390ae47494a25f3d672a66b710ea138f0c7f656198fe5339e4f11beb1bd48d69a3fa6f8aa026e386a376e91a56e0d1db369c26d809d2829
-
Filesize
255KB
MD5339458c2ddd664304a73216e63966f10
SHA1d11ebf33c7714f33cc134b0b9072ee21e9971041
SHA2568a3141c865113ed65c28423d2fe9b5bd6e232cbfed4939c8a616f175a84a43f2
SHA5124202a8247a2ee88bae8dc7ecd0ec93b831b451736180d09e50ed31da7c6463a197083ee970606c1494cf1b6798afa53664318b1a6c9bf28edcf3875add4e8980
-
Filesize
255KB
MD5339458c2ddd664304a73216e63966f10
SHA1d11ebf33c7714f33cc134b0b9072ee21e9971041
SHA2568a3141c865113ed65c28423d2fe9b5bd6e232cbfed4939c8a616f175a84a43f2
SHA5124202a8247a2ee88bae8dc7ecd0ec93b831b451736180d09e50ed31da7c6463a197083ee970606c1494cf1b6798afa53664318b1a6c9bf28edcf3875add4e8980
-
Filesize
255KB
MD5b14e009164feb2e5a6f9a9e17dfcc641
SHA1ed3d0f8205b92d41f1b731987b6e4831b5201527
SHA256905cf9df88deb32ec88acb218314d70e7193a7f553a93515a42d380490f39a41
SHA51205e39ca39421b379a2eee9c8c43c576b58aef8421232422f3d3c457b091ba98f44cf40c9d387cf69344f5dca5f91ecfe2fe2c0163a8437852aa58423b92050c3
-
Filesize
255KB
MD5b14e009164feb2e5a6f9a9e17dfcc641
SHA1ed3d0f8205b92d41f1b731987b6e4831b5201527
SHA256905cf9df88deb32ec88acb218314d70e7193a7f553a93515a42d380490f39a41
SHA51205e39ca39421b379a2eee9c8c43c576b58aef8421232422f3d3c457b091ba98f44cf40c9d387cf69344f5dca5f91ecfe2fe2c0163a8437852aa58423b92050c3
-
Filesize
255KB
MD5b14e009164feb2e5a6f9a9e17dfcc641
SHA1ed3d0f8205b92d41f1b731987b6e4831b5201527
SHA256905cf9df88deb32ec88acb218314d70e7193a7f553a93515a42d380490f39a41
SHA51205e39ca39421b379a2eee9c8c43c576b58aef8421232422f3d3c457b091ba98f44cf40c9d387cf69344f5dca5f91ecfe2fe2c0163a8437852aa58423b92050c3
-
Filesize
255KB
MD51d06572377fa6f719aeed18cef0510a4
SHA1bb1a8865bcf8d024b6edd8ed7636cacb33cdef6c
SHA256c6ff66ca9fac0d0661ad3d1fa38e12ef581f7e5b7c3c5f530d50b0724d4c0fdf
SHA512b68789524af878d67f2da8721bb87b409b6c96e13ecc084c59affe0937169708137981d38918f5533087ba08793171cc264c541072debfb332f9de10d9d21791
-
Filesize
255KB
MD51d06572377fa6f719aeed18cef0510a4
SHA1bb1a8865bcf8d024b6edd8ed7636cacb33cdef6c
SHA256c6ff66ca9fac0d0661ad3d1fa38e12ef581f7e5b7c3c5f530d50b0724d4c0fdf
SHA512b68789524af878d67f2da8721bb87b409b6c96e13ecc084c59affe0937169708137981d38918f5533087ba08793171cc264c541072debfb332f9de10d9d21791
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5248d9c48dd89091b0fb255f9910c1182
SHA172e523233e368cd07912e60aa031b302665f5232
SHA25612cae61cc01842013b9370cca7e6611a3f0d793cc5e93336f5598b641754938c
SHA51232d99147de5c932c87a0cbf1d359c2b6da2de4139aaa6906ba2112d55699c15936484fd3ed2a22cdbb318fed590dff3fa706bcbb66fd5aca681c66bdcd0d11e9
-
Filesize
255KB
MD52d619abd11897dc5d7154f4fc2d29258
SHA15bfdf9bd96410820a9ded614a198f60135406a49
SHA2562efe0e163bea70606bba391b4b797836540ea9054fbbe1e59280b4b30a9f11dc
SHA5129808dd18aee7e026f390ae47494a25f3d672a66b710ea138f0c7f656198fe5339e4f11beb1bd48d69a3fa6f8aa026e386a376e91a56e0d1db369c26d809d2829
-
Filesize
255KB
MD5339458c2ddd664304a73216e63966f10
SHA1d11ebf33c7714f33cc134b0b9072ee21e9971041
SHA2568a3141c865113ed65c28423d2fe9b5bd6e232cbfed4939c8a616f175a84a43f2
SHA5124202a8247a2ee88bae8dc7ecd0ec93b831b451736180d09e50ed31da7c6463a197083ee970606c1494cf1b6798afa53664318b1a6c9bf28edcf3875add4e8980
-
Filesize
255KB
MD5b14e009164feb2e5a6f9a9e17dfcc641
SHA1ed3d0f8205b92d41f1b731987b6e4831b5201527
SHA256905cf9df88deb32ec88acb218314d70e7193a7f553a93515a42d380490f39a41
SHA51205e39ca39421b379a2eee9c8c43c576b58aef8421232422f3d3c457b091ba98f44cf40c9d387cf69344f5dca5f91ecfe2fe2c0163a8437852aa58423b92050c3
-
Filesize
255KB
MD5b14e009164feb2e5a6f9a9e17dfcc641
SHA1ed3d0f8205b92d41f1b731987b6e4831b5201527
SHA256905cf9df88deb32ec88acb218314d70e7193a7f553a93515a42d380490f39a41
SHA51205e39ca39421b379a2eee9c8c43c576b58aef8421232422f3d3c457b091ba98f44cf40c9d387cf69344f5dca5f91ecfe2fe2c0163a8437852aa58423b92050c3
-
Filesize
255KB
MD51d06572377fa6f719aeed18cef0510a4
SHA1bb1a8865bcf8d024b6edd8ed7636cacb33cdef6c
SHA256c6ff66ca9fac0d0661ad3d1fa38e12ef581f7e5b7c3c5f530d50b0724d4c0fdf
SHA512b68789524af878d67f2da8721bb87b409b6c96e13ecc084c59affe0937169708137981d38918f5533087ba08793171cc264c541072debfb332f9de10d9d21791