Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
Resource
win10v2004-20221111-en
General
-
Target
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe
-
Size
255KB
-
MD5
e81ae6bf902b5f9948886395b8bcbe80
-
SHA1
eff4bf340bba164d00e05a3d575c68634669f920
-
SHA256
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007
-
SHA512
4bab12495fb5b4f07bd8a85234f14590c365f6159eb35d79879b88bd3c43af9948ca468b53cee2f1bfc9c8e5d9a390fc058fb1fb13dd6d7fef34877c7da27ef6
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ5:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" xhjfbvcpcf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xhjfbvcpcf.exe -
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xhjfbvcpcf.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhjfbvcpcf.exe -
Executes dropped EXE 5 IoCs
Processes:
xhjfbvcpcf.exejawrscfr.exejzhacxthqaidxqy.exevujevagelgkio.exejawrscfr.exepid process 240 xhjfbvcpcf.exe 1528 jawrscfr.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 980 jawrscfr.exe -
Processes:
resource yara_rule \Windows\SysWOW64\xhjfbvcpcf.exe upx \Windows\SysWOW64\jzhacxthqaidxqy.exe upx C:\Windows\SysWOW64\xhjfbvcpcf.exe upx C:\Windows\SysWOW64\xhjfbvcpcf.exe upx \Windows\SysWOW64\jawrscfr.exe upx \Windows\SysWOW64\vujevagelgkio.exe upx C:\Windows\SysWOW64\jzhacxthqaidxqy.exe upx C:\Windows\SysWOW64\jawrscfr.exe upx C:\Windows\SysWOW64\jawrscfr.exe upx C:\Windows\SysWOW64\vujevagelgkio.exe upx C:\Windows\SysWOW64\jzhacxthqaidxqy.exe upx C:\Windows\SysWOW64\vujevagelgkio.exe upx behavioral1/memory/1912-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1368-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1552-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1528-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/240-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\jawrscfr.exe upx \Windows\SysWOW64\jawrscfr.exe upx behavioral1/memory/1912-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/980-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/240-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1528-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1368-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1552-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/980-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Users\Admin\Documents\CompressDeny.doc.exe upx C:\Users\Admin\Documents\OutSubmit.doc.exe upx -
Loads dropped DLL 5 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exepid process 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 240 xhjfbvcpcf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xhjfbvcpcf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
jzhacxthqaidxqy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jmiaqnpp = "jzhacxthqaidxqy.exe" jzhacxthqaidxqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "vujevagelgkio.exe" jzhacxthqaidxqy.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run jzhacxthqaidxqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fvitislg = "xhjfbvcpcf.exe" jzhacxthqaidxqy.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
xhjfbvcpcf.exejawrscfr.exejawrscfr.exedescription ioc process File opened (read-only) \??\n: xhjfbvcpcf.exe File opened (read-only) \??\u: xhjfbvcpcf.exe File opened (read-only) \??\a: jawrscfr.exe File opened (read-only) \??\n: jawrscfr.exe File opened (read-only) \??\r: jawrscfr.exe File opened (read-only) \??\f: jawrscfr.exe File opened (read-only) \??\j: jawrscfr.exe File opened (read-only) \??\q: xhjfbvcpcf.exe File opened (read-only) \??\x: xhjfbvcpcf.exe File opened (read-only) \??\z: jawrscfr.exe File opened (read-only) \??\r: jawrscfr.exe File opened (read-only) \??\b: jawrscfr.exe File opened (read-only) \??\i: jawrscfr.exe File opened (read-only) \??\m: jawrscfr.exe File opened (read-only) \??\f: jawrscfr.exe File opened (read-only) \??\g: jawrscfr.exe File opened (read-only) \??\j: jawrscfr.exe File opened (read-only) \??\w: jawrscfr.exe File opened (read-only) \??\f: xhjfbvcpcf.exe File opened (read-only) \??\j: xhjfbvcpcf.exe File opened (read-only) \??\m: xhjfbvcpcf.exe File opened (read-only) \??\b: xhjfbvcpcf.exe File opened (read-only) \??\e: jawrscfr.exe File opened (read-only) \??\v: jawrscfr.exe File opened (read-only) \??\e: jawrscfr.exe File opened (read-only) \??\g: jawrscfr.exe File opened (read-only) \??\p: jawrscfr.exe File opened (read-only) \??\y: jawrscfr.exe File opened (read-only) \??\n: jawrscfr.exe File opened (read-only) \??\o: jawrscfr.exe File opened (read-only) \??\t: xhjfbvcpcf.exe File opened (read-only) \??\w: xhjfbvcpcf.exe File opened (read-only) \??\m: jawrscfr.exe File opened (read-only) \??\v: jawrscfr.exe File opened (read-only) \??\l: xhjfbvcpcf.exe File opened (read-only) \??\o: xhjfbvcpcf.exe File opened (read-only) \??\r: xhjfbvcpcf.exe File opened (read-only) \??\s: xhjfbvcpcf.exe File opened (read-only) \??\q: jawrscfr.exe File opened (read-only) \??\k: jawrscfr.exe File opened (read-only) \??\h: xhjfbvcpcf.exe File opened (read-only) \??\k: xhjfbvcpcf.exe File opened (read-only) \??\p: jawrscfr.exe File opened (read-only) \??\y: jawrscfr.exe File opened (read-only) \??\p: xhjfbvcpcf.exe File opened (read-only) \??\v: xhjfbvcpcf.exe File opened (read-only) \??\l: jawrscfr.exe File opened (read-only) \??\t: jawrscfr.exe File opened (read-only) \??\w: jawrscfr.exe File opened (read-only) \??\b: jawrscfr.exe File opened (read-only) \??\h: jawrscfr.exe File opened (read-only) \??\s: jawrscfr.exe File opened (read-only) \??\o: jawrscfr.exe File opened (read-only) \??\a: jawrscfr.exe File opened (read-only) \??\l: jawrscfr.exe File opened (read-only) \??\e: xhjfbvcpcf.exe File opened (read-only) \??\i: xhjfbvcpcf.exe File opened (read-only) \??\u: jawrscfr.exe File opened (read-only) \??\x: jawrscfr.exe File opened (read-only) \??\z: xhjfbvcpcf.exe File opened (read-only) \??\u: jawrscfr.exe File opened (read-only) \??\t: jawrscfr.exe File opened (read-only) \??\x: jawrscfr.exe File opened (read-only) \??\k: jawrscfr.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
xhjfbvcpcf.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" xhjfbvcpcf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" xhjfbvcpcf.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1912-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1368-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1552-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1528-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/240-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1912-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/980-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/240-89-0x0000000003860000-0x0000000003900000-memory.dmp autoit_exe behavioral1/memory/240-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1528-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1368-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1552-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/980-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exedescription ioc process File created C:\Windows\SysWOW64\jawrscfr.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\jawrscfr.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\vujevagelgkio.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\vujevagelgkio.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\xhjfbvcpcf.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\xhjfbvcpcf.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File created C:\Windows\SysWOW64\jzhacxthqaidxqy.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\jzhacxthqaidxqy.exe 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll xhjfbvcpcf.exe -
Drops file in Program Files directory 14 IoCs
Processes:
jawrscfr.exejawrscfr.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jawrscfr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jawrscfr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal jawrscfr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal jawrscfr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal jawrscfr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jawrscfr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe jawrscfr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe jawrscfr.exe -
Drops file in Windows directory 5 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exeWINWORD.EXExhjfbvcpcf.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc xhjfbvcpcf.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F768B3FE6D22DCD279D1D48A759114" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFF9BEF965F19883083A32819F3999B38E028A4361033DE2BD459A09A3" 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg xhjfbvcpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" xhjfbvcpcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1776 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exejawrscfr.exejzhacxthqaidxqy.exevujevagelgkio.exejawrscfr.exepid process 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 980 jawrscfr.exe 980 jawrscfr.exe 980 jawrscfr.exe 980 jawrscfr.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exejawrscfr.exejzhacxthqaidxqy.exevujevagelgkio.exejawrscfr.exepid process 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 980 jawrscfr.exe 980 jawrscfr.exe 980 jawrscfr.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exejawrscfr.exejzhacxthqaidxqy.exevujevagelgkio.exejawrscfr.exepid process 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 240 xhjfbvcpcf.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1528 jawrscfr.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1368 jzhacxthqaidxqy.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 1552 vujevagelgkio.exe 980 jawrscfr.exe 980 jawrscfr.exe 980 jawrscfr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1776 WINWORD.EXE 1776 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exexhjfbvcpcf.exeWINWORD.EXEdescription pid process target process PID 1912 wrote to memory of 240 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xhjfbvcpcf.exe PID 1912 wrote to memory of 240 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xhjfbvcpcf.exe PID 1912 wrote to memory of 240 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xhjfbvcpcf.exe PID 1912 wrote to memory of 240 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe xhjfbvcpcf.exe PID 1912 wrote to memory of 1368 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jzhacxthqaidxqy.exe PID 1912 wrote to memory of 1368 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jzhacxthqaidxqy.exe PID 1912 wrote to memory of 1368 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jzhacxthqaidxqy.exe PID 1912 wrote to memory of 1368 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jzhacxthqaidxqy.exe PID 1912 wrote to memory of 1528 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jawrscfr.exe PID 1912 wrote to memory of 1528 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jawrscfr.exe PID 1912 wrote to memory of 1528 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jawrscfr.exe PID 1912 wrote to memory of 1528 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe jawrscfr.exe PID 1912 wrote to memory of 1552 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe vujevagelgkio.exe PID 1912 wrote to memory of 1552 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe vujevagelgkio.exe PID 1912 wrote to memory of 1552 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe vujevagelgkio.exe PID 1912 wrote to memory of 1552 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe vujevagelgkio.exe PID 240 wrote to memory of 980 240 xhjfbvcpcf.exe jawrscfr.exe PID 240 wrote to memory of 980 240 xhjfbvcpcf.exe jawrscfr.exe PID 240 wrote to memory of 980 240 xhjfbvcpcf.exe jawrscfr.exe PID 240 wrote to memory of 980 240 xhjfbvcpcf.exe jawrscfr.exe PID 1912 wrote to memory of 1776 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE PID 1912 wrote to memory of 1776 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE PID 1912 wrote to memory of 1776 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE PID 1912 wrote to memory of 1776 1912 74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe WINWORD.EXE PID 1776 wrote to memory of 1708 1776 WINWORD.EXE splwow64.exe PID 1776 wrote to memory of 1708 1776 WINWORD.EXE splwow64.exe PID 1776 wrote to memory of 1708 1776 WINWORD.EXE splwow64.exe PID 1776 wrote to memory of 1708 1776 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe"C:\Users\Admin\AppData\Local\Temp\74a8727f832233c76a36fe100fc505e98265f5c5c0231c10ca28e2b0496a3007.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\xhjfbvcpcf.exexhjfbvcpcf.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\jawrscfr.exeC:\Windows\system32\jawrscfr.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\jzhacxthqaidxqy.exejzhacxthqaidxqy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\jawrscfr.exejawrscfr.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\vujevagelgkio.exevujevagelgkio.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hidden Files and Directories
2Modify Registry
7Disabling Security Tools
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\CompressDeny.doc.exeFilesize
255KB
MD544e79825331a5cb1137147122724055a
SHA1a08c051e229166b35956c73d0293e3d6122fc95d
SHA256edec0733367629cb3200f2dcbd12b32f68792c2680bd99d7a80e842af21ee558
SHA5124979067c51100fd46681c9655e46c4cc67592101ce1e2d0b1c3c73732665d81dd0fe7c679dfaa7f1497146017c418256d433248c43b73822bdb4cff98fb350ec
-
C:\Users\Admin\Documents\OutSubmit.doc.exeFilesize
255KB
MD593b8c1a82f88ed9dd9e425a4fec9b19c
SHA14fd1dd8bbb5b481224aa385cae71fd6f4ce5176c
SHA2566f5380819ef800d7d5356bc25689667e8ed50b847a5efd30f73fccbd98d6a865
SHA5129b2a79dacbc6bbadbbb3387597b4e084f77109f56c4d3dd387b5b79cfc328465cb94b7ec5212d30c88b5eea76c602cbfde23db1a71a75ab109a80f85b441e3a8
-
C:\Windows\SysWOW64\jawrscfr.exeFilesize
255KB
MD5172f218ab0db4fd3b28afd67c62e7a8b
SHA12ec622650b75c2d5f9a3e0ade25ee847a0b09ee1
SHA2568c9e0ef854597131bb5bdfc30b6ebad81aabfee5015b70de21056bf48b7752ce
SHA512a941feedfca3ef4b2862cca228c50f290a0f3bca1e006b490e79cc873ecaa815d6f480549bb0555c9588746572d8dd580d9cab0e27f82205dee399687398c7bb
-
C:\Windows\SysWOW64\jawrscfr.exeFilesize
255KB
MD5172f218ab0db4fd3b28afd67c62e7a8b
SHA12ec622650b75c2d5f9a3e0ade25ee847a0b09ee1
SHA2568c9e0ef854597131bb5bdfc30b6ebad81aabfee5015b70de21056bf48b7752ce
SHA512a941feedfca3ef4b2862cca228c50f290a0f3bca1e006b490e79cc873ecaa815d6f480549bb0555c9588746572d8dd580d9cab0e27f82205dee399687398c7bb
-
C:\Windows\SysWOW64\jawrscfr.exeFilesize
255KB
MD5172f218ab0db4fd3b28afd67c62e7a8b
SHA12ec622650b75c2d5f9a3e0ade25ee847a0b09ee1
SHA2568c9e0ef854597131bb5bdfc30b6ebad81aabfee5015b70de21056bf48b7752ce
SHA512a941feedfca3ef4b2862cca228c50f290a0f3bca1e006b490e79cc873ecaa815d6f480549bb0555c9588746572d8dd580d9cab0e27f82205dee399687398c7bb
-
C:\Windows\SysWOW64\jzhacxthqaidxqy.exeFilesize
255KB
MD5d5bee022a3172e7be149fb5c92deb057
SHA1001bdef0a4dd81ce2b9725f412675d6b022ea604
SHA256b5c6bf63b9dbed546e8b7933a6096d5e8123e7dec61f09be8734cff3c089d230
SHA51266bfb5bed4316d04f77a72b9cea638ecffb5c1b0222b7e95cc12b0cb2dcb84914f455add5490f3f2a78bb48f2b5856b50d7eab4f81c07f58f2139e24c1c44470
-
C:\Windows\SysWOW64\jzhacxthqaidxqy.exeFilesize
255KB
MD5d5bee022a3172e7be149fb5c92deb057
SHA1001bdef0a4dd81ce2b9725f412675d6b022ea604
SHA256b5c6bf63b9dbed546e8b7933a6096d5e8123e7dec61f09be8734cff3c089d230
SHA51266bfb5bed4316d04f77a72b9cea638ecffb5c1b0222b7e95cc12b0cb2dcb84914f455add5490f3f2a78bb48f2b5856b50d7eab4f81c07f58f2139e24c1c44470
-
C:\Windows\SysWOW64\vujevagelgkio.exeFilesize
255KB
MD55bf82bc3956f6866ac901ee018df3432
SHA1b267997cf166598e585af53b8f3b77825937bc86
SHA256166b7a257a6621f80e51b3684247fb8a48b9a75ae9d098eccc7add55e9794c71
SHA51248f7c74e004f559566bf5c391b0327517800fc7688a15b3af8e300b0004dea9a5ecc64e3814464da50c3ca44f08aea493c89acdaf178eb26eb26ef22dbf2a262
-
C:\Windows\SysWOW64\vujevagelgkio.exeFilesize
255KB
MD55bf82bc3956f6866ac901ee018df3432
SHA1b267997cf166598e585af53b8f3b77825937bc86
SHA256166b7a257a6621f80e51b3684247fb8a48b9a75ae9d098eccc7add55e9794c71
SHA51248f7c74e004f559566bf5c391b0327517800fc7688a15b3af8e300b0004dea9a5ecc64e3814464da50c3ca44f08aea493c89acdaf178eb26eb26ef22dbf2a262
-
C:\Windows\SysWOW64\xhjfbvcpcf.exeFilesize
255KB
MD50e4b88adcc9aa71ccf01df42a1b74288
SHA18e4ffa47e5a39ce144a1fc0d347e716f0f02657e
SHA256fd5de1f935ba9f110c60c7bdbf0b01b5d45fe6b8c38ca61903db725f3b72d6b7
SHA512f98acc53ea8bc528a06c57a675a983e6afe29a70a2574ec9d214d10738555a5c8c432b9889ef86988e6cd144d7330dd22fcebb343724676cb39bb3e051f9416f
-
C:\Windows\SysWOW64\xhjfbvcpcf.exeFilesize
255KB
MD50e4b88adcc9aa71ccf01df42a1b74288
SHA18e4ffa47e5a39ce144a1fc0d347e716f0f02657e
SHA256fd5de1f935ba9f110c60c7bdbf0b01b5d45fe6b8c38ca61903db725f3b72d6b7
SHA512f98acc53ea8bc528a06c57a675a983e6afe29a70a2574ec9d214d10738555a5c8c432b9889ef86988e6cd144d7330dd22fcebb343724676cb39bb3e051f9416f
-
C:\Windows\mydoc.rtfFilesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
\Windows\SysWOW64\jawrscfr.exeFilesize
255KB
MD5172f218ab0db4fd3b28afd67c62e7a8b
SHA12ec622650b75c2d5f9a3e0ade25ee847a0b09ee1
SHA2568c9e0ef854597131bb5bdfc30b6ebad81aabfee5015b70de21056bf48b7752ce
SHA512a941feedfca3ef4b2862cca228c50f290a0f3bca1e006b490e79cc873ecaa815d6f480549bb0555c9588746572d8dd580d9cab0e27f82205dee399687398c7bb
-
\Windows\SysWOW64\jawrscfr.exeFilesize
255KB
MD5172f218ab0db4fd3b28afd67c62e7a8b
SHA12ec622650b75c2d5f9a3e0ade25ee847a0b09ee1
SHA2568c9e0ef854597131bb5bdfc30b6ebad81aabfee5015b70de21056bf48b7752ce
SHA512a941feedfca3ef4b2862cca228c50f290a0f3bca1e006b490e79cc873ecaa815d6f480549bb0555c9588746572d8dd580d9cab0e27f82205dee399687398c7bb
-
\Windows\SysWOW64\jzhacxthqaidxqy.exeFilesize
255KB
MD5d5bee022a3172e7be149fb5c92deb057
SHA1001bdef0a4dd81ce2b9725f412675d6b022ea604
SHA256b5c6bf63b9dbed546e8b7933a6096d5e8123e7dec61f09be8734cff3c089d230
SHA51266bfb5bed4316d04f77a72b9cea638ecffb5c1b0222b7e95cc12b0cb2dcb84914f455add5490f3f2a78bb48f2b5856b50d7eab4f81c07f58f2139e24c1c44470
-
\Windows\SysWOW64\vujevagelgkio.exeFilesize
255KB
MD55bf82bc3956f6866ac901ee018df3432
SHA1b267997cf166598e585af53b8f3b77825937bc86
SHA256166b7a257a6621f80e51b3684247fb8a48b9a75ae9d098eccc7add55e9794c71
SHA51248f7c74e004f559566bf5c391b0327517800fc7688a15b3af8e300b0004dea9a5ecc64e3814464da50c3ca44f08aea493c89acdaf178eb26eb26ef22dbf2a262
-
\Windows\SysWOW64\xhjfbvcpcf.exeFilesize
255KB
MD50e4b88adcc9aa71ccf01df42a1b74288
SHA18e4ffa47e5a39ce144a1fc0d347e716f0f02657e
SHA256fd5de1f935ba9f110c60c7bdbf0b01b5d45fe6b8c38ca61903db725f3b72d6b7
SHA512f98acc53ea8bc528a06c57a675a983e6afe29a70a2574ec9d214d10738555a5c8c432b9889ef86988e6cd144d7330dd22fcebb343724676cb39bb3e051f9416f
-
memory/240-77-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/240-56-0x0000000000000000-mapping.dmp
-
memory/240-95-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/240-89-0x0000000003860000-0x0000000003900000-memory.dmpFilesize
640KB
-
memory/980-90-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/980-82-0x0000000000000000-mapping.dmp
-
memory/980-99-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1368-79-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1368-60-0x0000000000000000-mapping.dmp
-
memory/1368-97-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1528-78-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1528-96-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1528-63-0x0000000000000000-mapping.dmp
-
memory/1552-67-0x0000000000000000-mapping.dmp
-
memory/1552-98-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1552-80-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1708-103-0x0000000000000000-mapping.dmp
-
memory/1708-104-0x000007FEFBB81000-0x000007FEFBB83000-memory.dmpFilesize
8KB
-
memory/1776-91-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1776-93-0x0000000070FED000-0x0000000070FF8000-memory.dmpFilesize
44KB
-
memory/1776-87-0x0000000072581000-0x0000000072584000-memory.dmpFilesize
12KB
-
memory/1776-88-0x0000000070001000-0x0000000070003000-memory.dmpFilesize
8KB
-
memory/1776-85-0x0000000000000000-mapping.dmp
-
memory/1776-106-0x0000000070FED000-0x0000000070FF8000-memory.dmpFilesize
44KB
-
memory/1776-105-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1776-100-0x0000000070FED000-0x0000000070FF8000-memory.dmpFilesize
44KB
-
memory/1912-86-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1912-54-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1912-75-0x0000000000400000-0x00000000004A0000-memory.dmpFilesize
640KB
-
memory/1912-76-0x0000000002460000-0x0000000002500000-memory.dmpFilesize
640KB