Analysis
-
max time kernel
178s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe
Resource
win7-20221111-en
General
-
Target
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe
-
Size
255KB
-
MD5
95e254528b785a7a6fd2ca0ffd60c264
-
SHA1
677667fcdc9827c38eb5c1567b782c9154f5adae
-
SHA256
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039
-
SHA512
0ef9986794a52905dbc07a1a7f6f426de15e506956d81298e94002aa1a8b80edb0a75469318c1ed4b10dc29e715c65e2fc68c122c012a6fa90248c824648b4ec
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ+:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIt
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" yxmrugkoxz.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yxmrugkoxz.exe -
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yxmrugkoxz.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yxmrugkoxz.exe -
Executes dropped EXE 5 IoCs
Processes:
yxmrugkoxz.exehkihoratjcpmxbi.exewligxxwd.exeznpzrshxvivjf.exewligxxwd.exepid process 2004 yxmrugkoxz.exe 1488 hkihoratjcpmxbi.exe 1192 wligxxwd.exe 1492 znpzrshxvivjf.exe 1120 wligxxwd.exe -
Processes:
resource yara_rule \Windows\SysWOW64\yxmrugkoxz.exe upx C:\Windows\SysWOW64\yxmrugkoxz.exe upx \Windows\SysWOW64\hkihoratjcpmxbi.exe upx C:\Windows\SysWOW64\yxmrugkoxz.exe upx C:\Windows\SysWOW64\hkihoratjcpmxbi.exe upx \Windows\SysWOW64\wligxxwd.exe upx C:\Windows\SysWOW64\wligxxwd.exe upx \Windows\SysWOW64\znpzrshxvivjf.exe upx C:\Windows\SysWOW64\hkihoratjcpmxbi.exe upx C:\Windows\SysWOW64\znpzrshxvivjf.exe upx C:\Windows\SysWOW64\wligxxwd.exe upx \Windows\SysWOW64\wligxxwd.exe upx C:\Windows\SysWOW64\znpzrshxvivjf.exe upx C:\Windows\SysWOW64\wligxxwd.exe upx behavioral1/memory/936-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2004-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1488-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1192-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1492-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1120-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/936-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Program Files\UninstallClear.doc.exe upx C:\Program Files\UninstallClear.doc.exe upx behavioral1/memory/2004-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1488-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1192-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1492-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1120-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exepid process 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 2004 yxmrugkoxz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yxmrugkoxz.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
hkihoratjcpmxbi.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hkihoratjcpmxbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nryrsrye = "yxmrugkoxz.exe" hkihoratjcpmxbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\pbnqllko = "hkihoratjcpmxbi.exe" hkihoratjcpmxbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "znpzrshxvivjf.exe" hkihoratjcpmxbi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
yxmrugkoxz.exewligxxwd.exewligxxwd.exedescription ioc process File opened (read-only) \??\u: yxmrugkoxz.exe File opened (read-only) \??\y: yxmrugkoxz.exe File opened (read-only) \??\u: wligxxwd.exe File opened (read-only) \??\g: wligxxwd.exe File opened (read-only) \??\z: wligxxwd.exe File opened (read-only) \??\e: wligxxwd.exe File opened (read-only) \??\f: wligxxwd.exe File opened (read-only) \??\h: yxmrugkoxz.exe File opened (read-only) \??\z: yxmrugkoxz.exe File opened (read-only) \??\i: wligxxwd.exe File opened (read-only) \??\l: wligxxwd.exe File opened (read-only) \??\z: wligxxwd.exe File opened (read-only) \??\w: wligxxwd.exe File opened (read-only) \??\y: wligxxwd.exe File opened (read-only) \??\g: yxmrugkoxz.exe File opened (read-only) \??\i: yxmrugkoxz.exe File opened (read-only) \??\k: yxmrugkoxz.exe File opened (read-only) \??\x: yxmrugkoxz.exe File opened (read-only) \??\b: wligxxwd.exe File opened (read-only) \??\v: wligxxwd.exe File opened (read-only) \??\u: wligxxwd.exe File opened (read-only) \??\e: yxmrugkoxz.exe File opened (read-only) \??\p: yxmrugkoxz.exe File opened (read-only) \??\r: yxmrugkoxz.exe File opened (read-only) \??\g: wligxxwd.exe File opened (read-only) \??\n: wligxxwd.exe File opened (read-only) \??\r: wligxxwd.exe File opened (read-only) \??\h: wligxxwd.exe File opened (read-only) \??\n: wligxxwd.exe File opened (read-only) \??\e: wligxxwd.exe File opened (read-only) \??\h: wligxxwd.exe File opened (read-only) \??\q: wligxxwd.exe File opened (read-only) \??\o: wligxxwd.exe File opened (read-only) \??\r: wligxxwd.exe File opened (read-only) \??\t: wligxxwd.exe File opened (read-only) \??\b: yxmrugkoxz.exe File opened (read-only) \??\n: yxmrugkoxz.exe File opened (read-only) \??\y: wligxxwd.exe File opened (read-only) \??\t: yxmrugkoxz.exe File opened (read-only) \??\m: wligxxwd.exe File opened (read-only) \??\a: wligxxwd.exe File opened (read-only) \??\q: wligxxwd.exe File opened (read-only) \??\k: wligxxwd.exe File opened (read-only) \??\o: wligxxwd.exe File opened (read-only) \??\j: yxmrugkoxz.exe File opened (read-only) \??\k: wligxxwd.exe File opened (read-only) \??\i: wligxxwd.exe File opened (read-only) \??\m: wligxxwd.exe File opened (read-only) \??\p: wligxxwd.exe File opened (read-only) \??\v: wligxxwd.exe File opened (read-only) \??\p: wligxxwd.exe File opened (read-only) \??\l: wligxxwd.exe File opened (read-only) \??\m: yxmrugkoxz.exe File opened (read-only) \??\w: yxmrugkoxz.exe File opened (read-only) \??\w: wligxxwd.exe File opened (read-only) \??\x: wligxxwd.exe File opened (read-only) \??\b: wligxxwd.exe File opened (read-only) \??\j: wligxxwd.exe File opened (read-only) \??\a: yxmrugkoxz.exe File opened (read-only) \??\l: yxmrugkoxz.exe File opened (read-only) \??\o: yxmrugkoxz.exe File opened (read-only) \??\v: yxmrugkoxz.exe File opened (read-only) \??\a: wligxxwd.exe File opened (read-only) \??\s: wligxxwd.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
yxmrugkoxz.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" yxmrugkoxz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" yxmrugkoxz.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/936-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1488-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1192-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1492-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1120-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/936-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1488-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1192-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1492-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1120-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exedescription ioc process File created C:\Windows\SysWOW64\hkihoratjcpmxbi.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\SysWOW64\hkihoratjcpmxbi.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File created C:\Windows\SysWOW64\wligxxwd.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\SysWOW64\yxmrugkoxz.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\SysWOW64\wligxxwd.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File created C:\Windows\SysWOW64\znpzrshxvivjf.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\SysWOW64\znpzrshxvivjf.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll yxmrugkoxz.exe File created C:\Windows\SysWOW64\yxmrugkoxz.exe 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe -
Drops file in Program Files directory 22 IoCs
Processes:
wligxxwd.exewligxxwd.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wligxxwd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wligxxwd.exe File opened for modification C:\Program Files\UninstallClear.nal wligxxwd.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wligxxwd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal wligxxwd.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wligxxwd.exe File created \??\c:\Program Files\UninstallClear.doc.exe wligxxwd.exe File created \??\c:\Program Files\UninstallClear.doc.exe wligxxwd.exe File opened for modification \??\c:\Program Files\UninstallClear.doc.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe wligxxwd.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal wligxxwd.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe wligxxwd.exe File opened for modification \??\c:\Program Files\UninstallClear.doc.exe wligxxwd.exe File opened for modification C:\Program Files\UninstallClear.doc.exe wligxxwd.exe File opened for modification C:\Program Files\UninstallClear.doc.exe wligxxwd.exe File opened for modification C:\Program Files\UninstallClear.nal wligxxwd.exe -
Drops file in Windows directory 5 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEyxmrugkoxz.exe7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs yxmrugkoxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" yxmrugkoxz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" yxmrugkoxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf yxmrugkoxz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yxmrugkoxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" yxmrugkoxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABDFABFF964F191837F3A43869A3E95B0FC028C4268034FE2BD429B08A3" 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yxmrugkoxz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1300 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exehkihoratjcpmxbi.exeznpzrshxvivjf.exewligxxwd.exewligxxwd.exepid process 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1120 wligxxwd.exe 1120 wligxxwd.exe 1120 wligxxwd.exe 1120 wligxxwd.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1488 hkihoratjcpmxbi.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exehkihoratjcpmxbi.exewligxxwd.exeznpzrshxvivjf.exewligxxwd.exepid process 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1120 wligxxwd.exe 1120 wligxxwd.exe 1120 wligxxwd.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exehkihoratjcpmxbi.exewligxxwd.exeznpzrshxvivjf.exewligxxwd.exepid process 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 2004 yxmrugkoxz.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1488 hkihoratjcpmxbi.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1192 wligxxwd.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1492 znpzrshxvivjf.exe 1120 wligxxwd.exe 1120 wligxxwd.exe 1120 wligxxwd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1300 WINWORD.EXE 1300 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exeyxmrugkoxz.exeWINWORD.EXEdescription pid process target process PID 936 wrote to memory of 2004 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe yxmrugkoxz.exe PID 936 wrote to memory of 2004 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe yxmrugkoxz.exe PID 936 wrote to memory of 2004 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe yxmrugkoxz.exe PID 936 wrote to memory of 2004 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe yxmrugkoxz.exe PID 936 wrote to memory of 1488 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe hkihoratjcpmxbi.exe PID 936 wrote to memory of 1488 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe hkihoratjcpmxbi.exe PID 936 wrote to memory of 1488 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe hkihoratjcpmxbi.exe PID 936 wrote to memory of 1488 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe hkihoratjcpmxbi.exe PID 936 wrote to memory of 1192 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe wligxxwd.exe PID 936 wrote to memory of 1192 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe wligxxwd.exe PID 936 wrote to memory of 1192 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe wligxxwd.exe PID 936 wrote to memory of 1192 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe wligxxwd.exe PID 936 wrote to memory of 1492 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe znpzrshxvivjf.exe PID 936 wrote to memory of 1492 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe znpzrshxvivjf.exe PID 936 wrote to memory of 1492 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe znpzrshxvivjf.exe PID 936 wrote to memory of 1492 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe znpzrshxvivjf.exe PID 2004 wrote to memory of 1120 2004 yxmrugkoxz.exe wligxxwd.exe PID 2004 wrote to memory of 1120 2004 yxmrugkoxz.exe wligxxwd.exe PID 2004 wrote to memory of 1120 2004 yxmrugkoxz.exe wligxxwd.exe PID 2004 wrote to memory of 1120 2004 yxmrugkoxz.exe wligxxwd.exe PID 936 wrote to memory of 1300 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe WINWORD.EXE PID 936 wrote to memory of 1300 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe WINWORD.EXE PID 936 wrote to memory of 1300 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe WINWORD.EXE PID 936 wrote to memory of 1300 936 7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe WINWORD.EXE PID 1300 wrote to memory of 996 1300 WINWORD.EXE splwow64.exe PID 1300 wrote to memory of 996 1300 WINWORD.EXE splwow64.exe PID 1300 wrote to memory of 996 1300 WINWORD.EXE splwow64.exe PID 1300 wrote to memory of 996 1300 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe"C:\Users\Admin\AppData\Local\Temp\7c79ba0b8b6b54564071c59b31af97f878a4729f72309d1ec971c2c5dbb8d039.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\yxmrugkoxz.exeyxmrugkoxz.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\wligxxwd.exeC:\Windows\system32\wligxxwd.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1120 -
C:\Windows\SysWOW64\hkihoratjcpmxbi.exehkihoratjcpmxbi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488 -
C:\Windows\SysWOW64\wligxxwd.exewligxxwd.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1192 -
C:\Windows\SysWOW64\znpzrshxvivjf.exeznpzrshxvivjf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1492 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:996
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5253395860c531433c460dcc170847ced
SHA16dad5eac61cfe7b55d1431c3a9fe0634daaab770
SHA256bd94997c637980ea9de771285864ee6584d60acf0ce6ee35257ec4d03d399c6f
SHA512842fc7cbb87d52ec11fc5809f3748d53514dce421c8d04da5f1b813ebf331095883302c2ceb7bf185f4c548b03b49609c526dd5c5a59da772e42b94f34c64267
-
Filesize
255KB
MD5241d9f6e9372eb6e78256c126dee92af
SHA10a179282b083b39f55db5c4ac541ffa263d8bd48
SHA2563b371f049d04e6cacb33aa1811380ea0d6873693e0d39733c54662ae868f4553
SHA5124b8c4d3175f8195d26a009ba3c314373e75fe2935cffa2fe1132cbb6c3fcd936bb69fd57891b793a446854d24ea08204b5c093e4250a6ee2a80df44fede1a5ad
-
Filesize
255KB
MD5dee58a7e42c8a53a8e75358f4f29d62c
SHA1b8757c6833b65b5582aa6e2897f8abd40940866c
SHA2567fbbe53e0215061d83d42779f93b1d0e6f2c0f6f548b4ac8c952dcb2d3c9f097
SHA5126ea529031a35059c4c0d1c9e6cde300628478afd3fe423f26613c5f00a34406d01c8730d4fc10b4e90c493f4362ebe73b50bf83897ee5371413b6072bf5caa13
-
Filesize
255KB
MD5dee58a7e42c8a53a8e75358f4f29d62c
SHA1b8757c6833b65b5582aa6e2897f8abd40940866c
SHA2567fbbe53e0215061d83d42779f93b1d0e6f2c0f6f548b4ac8c952dcb2d3c9f097
SHA5126ea529031a35059c4c0d1c9e6cde300628478afd3fe423f26613c5f00a34406d01c8730d4fc10b4e90c493f4362ebe73b50bf83897ee5371413b6072bf5caa13
-
Filesize
255KB
MD5bc398bd450cfc733fe1e3f6b0c088a23
SHA1f5e86d238760c4499ea1e466bbbadac96a46512b
SHA256395b361b9bc06e9f9218796be28be287a694b848000ce061611527bb20fad962
SHA51224cfcf8ee764f77d1aa4b5d8edaa9fefc64798b49d65a3670cfe591e1e8bfe53d2c11ba4de7b3d8ec9288efc81d90c31e6186a26d5961bc0cc8eab687d189da6
-
Filesize
255KB
MD5bc398bd450cfc733fe1e3f6b0c088a23
SHA1f5e86d238760c4499ea1e466bbbadac96a46512b
SHA256395b361b9bc06e9f9218796be28be287a694b848000ce061611527bb20fad962
SHA51224cfcf8ee764f77d1aa4b5d8edaa9fefc64798b49d65a3670cfe591e1e8bfe53d2c11ba4de7b3d8ec9288efc81d90c31e6186a26d5961bc0cc8eab687d189da6
-
Filesize
255KB
MD5bc398bd450cfc733fe1e3f6b0c088a23
SHA1f5e86d238760c4499ea1e466bbbadac96a46512b
SHA256395b361b9bc06e9f9218796be28be287a694b848000ce061611527bb20fad962
SHA51224cfcf8ee764f77d1aa4b5d8edaa9fefc64798b49d65a3670cfe591e1e8bfe53d2c11ba4de7b3d8ec9288efc81d90c31e6186a26d5961bc0cc8eab687d189da6
-
Filesize
255KB
MD5e678c99010f0c404548b6ad2a3e476ea
SHA16fd9ddd8622410e7509c27f1ea91116e79855cd7
SHA25639242de430af0a2b3a31545dc8c098455eb217517a7edb1ce671dd26c135571f
SHA51228cff9432cdf87c9fb72628da243d88e1ee98dffee600cbfe76b8a46383421ed8dee3b25f968b618a39dd3867d047cec3850c57f6cd9737e9dbb1da9b93cad82
-
Filesize
255KB
MD5e678c99010f0c404548b6ad2a3e476ea
SHA16fd9ddd8622410e7509c27f1ea91116e79855cd7
SHA25639242de430af0a2b3a31545dc8c098455eb217517a7edb1ce671dd26c135571f
SHA51228cff9432cdf87c9fb72628da243d88e1ee98dffee600cbfe76b8a46383421ed8dee3b25f968b618a39dd3867d047cec3850c57f6cd9737e9dbb1da9b93cad82
-
Filesize
255KB
MD54774f9d94b668eb706351f2b4b404c2b
SHA1ba7a689a13d962f3f875bf8fc522d58d539fa4af
SHA256c7fa2455e8a9a69b4caf6598fa1f8143a7cbfdadfbb498c9dcc12d5a78a9c280
SHA512cc37382342b379f2239823d989f1c548fe329a67f6d7cead86ebeccdb31e536792a68bc10cfe2f8888353ad20b679b1367d332d618bdf9511c4e8c83b565ab8c
-
Filesize
255KB
MD54774f9d94b668eb706351f2b4b404c2b
SHA1ba7a689a13d962f3f875bf8fc522d58d539fa4af
SHA256c7fa2455e8a9a69b4caf6598fa1f8143a7cbfdadfbb498c9dcc12d5a78a9c280
SHA512cc37382342b379f2239823d989f1c548fe329a67f6d7cead86ebeccdb31e536792a68bc10cfe2f8888353ad20b679b1367d332d618bdf9511c4e8c83b565ab8c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5241d9f6e9372eb6e78256c126dee92af
SHA10a179282b083b39f55db5c4ac541ffa263d8bd48
SHA2563b371f049d04e6cacb33aa1811380ea0d6873693e0d39733c54662ae868f4553
SHA5124b8c4d3175f8195d26a009ba3c314373e75fe2935cffa2fe1132cbb6c3fcd936bb69fd57891b793a446854d24ea08204b5c093e4250a6ee2a80df44fede1a5ad
-
Filesize
255KB
MD5dee58a7e42c8a53a8e75358f4f29d62c
SHA1b8757c6833b65b5582aa6e2897f8abd40940866c
SHA2567fbbe53e0215061d83d42779f93b1d0e6f2c0f6f548b4ac8c952dcb2d3c9f097
SHA5126ea529031a35059c4c0d1c9e6cde300628478afd3fe423f26613c5f00a34406d01c8730d4fc10b4e90c493f4362ebe73b50bf83897ee5371413b6072bf5caa13
-
Filesize
255KB
MD5bc398bd450cfc733fe1e3f6b0c088a23
SHA1f5e86d238760c4499ea1e466bbbadac96a46512b
SHA256395b361b9bc06e9f9218796be28be287a694b848000ce061611527bb20fad962
SHA51224cfcf8ee764f77d1aa4b5d8edaa9fefc64798b49d65a3670cfe591e1e8bfe53d2c11ba4de7b3d8ec9288efc81d90c31e6186a26d5961bc0cc8eab687d189da6
-
Filesize
255KB
MD5bc398bd450cfc733fe1e3f6b0c088a23
SHA1f5e86d238760c4499ea1e466bbbadac96a46512b
SHA256395b361b9bc06e9f9218796be28be287a694b848000ce061611527bb20fad962
SHA51224cfcf8ee764f77d1aa4b5d8edaa9fefc64798b49d65a3670cfe591e1e8bfe53d2c11ba4de7b3d8ec9288efc81d90c31e6186a26d5961bc0cc8eab687d189da6
-
Filesize
255KB
MD5e678c99010f0c404548b6ad2a3e476ea
SHA16fd9ddd8622410e7509c27f1ea91116e79855cd7
SHA25639242de430af0a2b3a31545dc8c098455eb217517a7edb1ce671dd26c135571f
SHA51228cff9432cdf87c9fb72628da243d88e1ee98dffee600cbfe76b8a46383421ed8dee3b25f968b618a39dd3867d047cec3850c57f6cd9737e9dbb1da9b93cad82
-
Filesize
255KB
MD54774f9d94b668eb706351f2b4b404c2b
SHA1ba7a689a13d962f3f875bf8fc522d58d539fa4af
SHA256c7fa2455e8a9a69b4caf6598fa1f8143a7cbfdadfbb498c9dcc12d5a78a9c280
SHA512cc37382342b379f2239823d989f1c548fe329a67f6d7cead86ebeccdb31e536792a68bc10cfe2f8888353ad20b679b1367d332d618bdf9511c4e8c83b565ab8c