Analysis
-
max time kernel
247s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:03
Behavioral task
behavioral1
Sample
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe
Resource
win7-20221111-en
General
-
Target
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe
-
Size
255KB
-
MD5
0118fafb572f326409e0a7c487ede3ae
-
SHA1
59454507736c67fc557bfcb89802c5b407f5c604
-
SHA256
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528
-
SHA512
70cfbaeaf7fd4ae5be1bfe24e91959f36eb49e4354e243484e8a50d356b33c730cf07a13ecc976578ec8d4f19af73315f92ccc154881fd5e4728fda601aa8924
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJs:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ivydmkkbpk.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ivydmkkbpk.exe -
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ivydmkkbpk.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ivydmkkbpk.exe -
Executes dropped EXE 5 IoCs
Processes:
ivydmkkbpk.exejsxtaycnpawaoqp.exegamikthk.exergytjkyaxdbvr.exegamikthk.exepid process 1856 ivydmkkbpk.exe 912 jsxtaycnpawaoqp.exe 1280 gamikthk.exe 776 rgytjkyaxdbvr.exe 1320 gamikthk.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule behavioral1/memory/1372-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\ivydmkkbpk.exe upx behavioral1/memory/1372-57-0x0000000003460000-0x0000000003500000-memory.dmp upx behavioral1/memory/1372-58-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\ivydmkkbpk.exe upx C:\Windows\SysWOW64\jsxtaycnpawaoqp.exe upx \Windows\SysWOW64\gamikthk.exe upx C:\Windows\SysWOW64\gamikthk.exe upx \Windows\SysWOW64\rgytjkyaxdbvr.exe upx \Windows\SysWOW64\jsxtaycnpawaoqp.exe upx C:\Windows\SysWOW64\ivydmkkbpk.exe upx C:\Windows\SysWOW64\gamikthk.exe upx C:\Windows\SysWOW64\jsxtaycnpawaoqp.exe upx C:\Windows\SysWOW64\rgytjkyaxdbvr.exe upx behavioral1/memory/1856-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/912-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1280-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gamikthk.exe upx behavioral1/memory/776-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\gamikthk.exe upx C:\Windows\SysWOW64\rgytjkyaxdbvr.exe upx behavioral1/memory/1372-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1320-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/776-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1856-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/912-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1280-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1320-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exepid process 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1856 ivydmkkbpk.exe -
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ivydmkkbpk.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
jsxtaycnpawaoqp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run jsxtaycnpawaoqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lsvjseua = "ivydmkkbpk.exe" jsxtaycnpawaoqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\blzryvzd = "jsxtaycnpawaoqp.exe" jsxtaycnpawaoqp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "rgytjkyaxdbvr.exe" jsxtaycnpawaoqp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ivydmkkbpk.exegamikthk.exegamikthk.exedescription ioc process File opened (read-only) \??\s: ivydmkkbpk.exe File opened (read-only) \??\h: gamikthk.exe File opened (read-only) \??\v: gamikthk.exe File opened (read-only) \??\h: gamikthk.exe File opened (read-only) \??\r: ivydmkkbpk.exe File opened (read-only) \??\t: ivydmkkbpk.exe File opened (read-only) \??\x: ivydmkkbpk.exe File opened (read-only) \??\y: ivydmkkbpk.exe File opened (read-only) \??\b: gamikthk.exe File opened (read-only) \??\i: gamikthk.exe File opened (read-only) \??\p: gamikthk.exe File opened (read-only) \??\g: gamikthk.exe File opened (read-only) \??\w: gamikthk.exe File opened (read-only) \??\f: gamikthk.exe File opened (read-only) \??\j: ivydmkkbpk.exe File opened (read-only) \??\j: gamikthk.exe File opened (read-only) \??\t: gamikthk.exe File opened (read-only) \??\z: gamikthk.exe File opened (read-only) \??\o: ivydmkkbpk.exe File opened (read-only) \??\k: gamikthk.exe File opened (read-only) \??\n: gamikthk.exe File opened (read-only) \??\b: ivydmkkbpk.exe File opened (read-only) \??\f: ivydmkkbpk.exe File opened (read-only) \??\g: ivydmkkbpk.exe File opened (read-only) \??\i: gamikthk.exe File opened (read-only) \??\t: gamikthk.exe File opened (read-only) \??\x: gamikthk.exe File opened (read-only) \??\h: ivydmkkbpk.exe File opened (read-only) \??\k: ivydmkkbpk.exe File opened (read-only) \??\u: gamikthk.exe File opened (read-only) \??\l: ivydmkkbpk.exe File opened (read-only) \??\m: ivydmkkbpk.exe File opened (read-only) \??\r: gamikthk.exe File opened (read-only) \??\l: gamikthk.exe File opened (read-only) \??\u: ivydmkkbpk.exe File opened (read-only) \??\a: gamikthk.exe File opened (read-only) \??\j: gamikthk.exe File opened (read-only) \??\o: gamikthk.exe File opened (read-only) \??\e: gamikthk.exe File opened (read-only) \??\g: gamikthk.exe File opened (read-only) \??\w: gamikthk.exe File opened (read-only) \??\y: gamikthk.exe File opened (read-only) \??\e: ivydmkkbpk.exe File opened (read-only) \??\v: ivydmkkbpk.exe File opened (read-only) \??\s: gamikthk.exe File opened (read-only) \??\i: ivydmkkbpk.exe File opened (read-only) \??\u: gamikthk.exe File opened (read-only) \??\y: gamikthk.exe File opened (read-only) \??\m: gamikthk.exe File opened (read-only) \??\r: gamikthk.exe File opened (read-only) \??\w: ivydmkkbpk.exe File opened (read-only) \??\z: ivydmkkbpk.exe File opened (read-only) \??\n: ivydmkkbpk.exe File opened (read-only) \??\p: ivydmkkbpk.exe File opened (read-only) \??\p: gamikthk.exe File opened (read-only) \??\x: gamikthk.exe File opened (read-only) \??\z: gamikthk.exe File opened (read-only) \??\a: gamikthk.exe File opened (read-only) \??\b: gamikthk.exe File opened (read-only) \??\q: gamikthk.exe File opened (read-only) \??\a: ivydmkkbpk.exe File opened (read-only) \??\q: ivydmkkbpk.exe File opened (read-only) \??\f: gamikthk.exe File opened (read-only) \??\m: gamikthk.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ivydmkkbpk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ivydmkkbpk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ivydmkkbpk.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1372-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1372-58-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1856-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/912-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1280-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/776-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1372-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1320-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/776-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1856-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/912-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1280-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1320-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exedescription ioc process File created C:\Windows\SysWOW64\gamikthk.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\gamikthk.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File created C:\Windows\SysWOW64\rgytjkyaxdbvr.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File created C:\Windows\SysWOW64\ivydmkkbpk.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File created C:\Windows\SysWOW64\jsxtaycnpawaoqp.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\jsxtaycnpawaoqp.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\rgytjkyaxdbvr.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ivydmkkbpk.exe File opened for modification C:\Windows\SysWOW64\ivydmkkbpk.exe 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXE7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEivydmkkbpk.exeexplorer.exe7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ivydmkkbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ivydmkkbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf ivydmkkbpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABFF9CEFE65F2E2830E3A31869839E6B38F028A42160338E1B8459A09D1" 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc ivydmkkbpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ivydmkkbpk.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1944 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exejsxtaycnpawaoqp.exegamikthk.exergytjkyaxdbvr.exegamikthk.exepid process 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 1280 gamikthk.exe 1280 gamikthk.exe 1280 gamikthk.exe 1280 gamikthk.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 1320 gamikthk.exe 1320 gamikthk.exe 1320 gamikthk.exe 1320 gamikthk.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 912 jsxtaycnpawaoqp.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: 33 1300 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1300 AUDIODG.EXE Token: 33 1300 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1300 AUDIODG.EXE Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe Token: SeShutdownPrivilege 436 explorer.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exejsxtaycnpawaoqp.exegamikthk.exergytjkyaxdbvr.exegamikthk.exeexplorer.exepid process 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 1280 gamikthk.exe 1280 gamikthk.exe 1280 gamikthk.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 1320 gamikthk.exe 1320 gamikthk.exe 1320 gamikthk.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exejsxtaycnpawaoqp.exegamikthk.exergytjkyaxdbvr.exeexplorer.exepid process 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 1856 ivydmkkbpk.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 912 jsxtaycnpawaoqp.exe 1280 gamikthk.exe 1280 gamikthk.exe 1280 gamikthk.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 776 rgytjkyaxdbvr.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe 436 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1944 WINWORD.EXE 1944 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exeivydmkkbpk.exeWINWORD.EXEdescription pid process target process PID 1372 wrote to memory of 1856 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ivydmkkbpk.exe PID 1372 wrote to memory of 1856 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ivydmkkbpk.exe PID 1372 wrote to memory of 1856 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ivydmkkbpk.exe PID 1372 wrote to memory of 1856 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe ivydmkkbpk.exe PID 1372 wrote to memory of 912 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jsxtaycnpawaoqp.exe PID 1372 wrote to memory of 912 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jsxtaycnpawaoqp.exe PID 1372 wrote to memory of 912 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jsxtaycnpawaoqp.exe PID 1372 wrote to memory of 912 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe jsxtaycnpawaoqp.exe PID 1372 wrote to memory of 1280 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe gamikthk.exe PID 1372 wrote to memory of 1280 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe gamikthk.exe PID 1372 wrote to memory of 1280 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe gamikthk.exe PID 1372 wrote to memory of 1280 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe gamikthk.exe PID 1372 wrote to memory of 776 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe rgytjkyaxdbvr.exe PID 1372 wrote to memory of 776 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe rgytjkyaxdbvr.exe PID 1372 wrote to memory of 776 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe rgytjkyaxdbvr.exe PID 1372 wrote to memory of 776 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe rgytjkyaxdbvr.exe PID 1856 wrote to memory of 1320 1856 ivydmkkbpk.exe gamikthk.exe PID 1856 wrote to memory of 1320 1856 ivydmkkbpk.exe gamikthk.exe PID 1856 wrote to memory of 1320 1856 ivydmkkbpk.exe gamikthk.exe PID 1856 wrote to memory of 1320 1856 ivydmkkbpk.exe gamikthk.exe PID 1372 wrote to memory of 1944 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE PID 1372 wrote to memory of 1944 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE PID 1372 wrote to memory of 1944 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE PID 1372 wrote to memory of 1944 1372 7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe WINWORD.EXE PID 1944 wrote to memory of 1696 1944 WINWORD.EXE splwow64.exe PID 1944 wrote to memory of 1696 1944 WINWORD.EXE splwow64.exe PID 1944 wrote to memory of 1696 1944 WINWORD.EXE splwow64.exe PID 1944 wrote to memory of 1696 1944 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe"C:\Users\Admin\AppData\Local\Temp\7409499c45e353cfeb3857647a336159d9d2e25591eb21d86bcf2c19a6e70528.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\ivydmkkbpk.exeivydmkkbpk.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\gamikthk.exeC:\Windows\system32\gamikthk.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1320
-
-
-
C:\Windows\SysWOW64\rgytjkyaxdbvr.exergytjkyaxdbvr.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:776
-
-
C:\Windows\SysWOW64\gamikthk.exegamikthk.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1280
-
-
C:\Windows\SysWOW64\jsxtaycnpawaoqp.exejsxtaycnpawaoqp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:912
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1696
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:436
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5501⤵
- Suspicious use of AdjustPrivilegeToken
PID:1300
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD56745104a140a8f16e306f429f2fa57cf
SHA1dba8b408bedd6ee00e674d64d8a09ee23d5cb310
SHA256729bf24fe670c5f3b4b022bd1e7b0ac2733cf85e7c777279ba2a85bdf7b91591
SHA512bf4e806b0afb34458704ce75558375a9233166fa12b9d7b11641fc874c0b7865d9ab53c0092f815d82efeed851eb7789aa87be5293aabd0eac3c026c95f6f1c1
-
Filesize
255KB
MD56745104a140a8f16e306f429f2fa57cf
SHA1dba8b408bedd6ee00e674d64d8a09ee23d5cb310
SHA256729bf24fe670c5f3b4b022bd1e7b0ac2733cf85e7c777279ba2a85bdf7b91591
SHA512bf4e806b0afb34458704ce75558375a9233166fa12b9d7b11641fc874c0b7865d9ab53c0092f815d82efeed851eb7789aa87be5293aabd0eac3c026c95f6f1c1
-
Filesize
255KB
MD56745104a140a8f16e306f429f2fa57cf
SHA1dba8b408bedd6ee00e674d64d8a09ee23d5cb310
SHA256729bf24fe670c5f3b4b022bd1e7b0ac2733cf85e7c777279ba2a85bdf7b91591
SHA512bf4e806b0afb34458704ce75558375a9233166fa12b9d7b11641fc874c0b7865d9ab53c0092f815d82efeed851eb7789aa87be5293aabd0eac3c026c95f6f1c1
-
Filesize
255KB
MD5b3c97d418eb8493184f6b702f69ca9a9
SHA19556fe973448b71987fccb16c5a66ff45bd09232
SHA256eacf480ad5ed60befc39d629ddcd848faf2e32cbed363e1f414b239da9d69601
SHA51284463e58fe0e969122843c7fae9b97801e3639b7e633ccef46e7f69b7f15643e8e822619b16b6457132cfd45edea27716f93e219e17313e650d42b108da3efae
-
Filesize
255KB
MD5b3c97d418eb8493184f6b702f69ca9a9
SHA19556fe973448b71987fccb16c5a66ff45bd09232
SHA256eacf480ad5ed60befc39d629ddcd848faf2e32cbed363e1f414b239da9d69601
SHA51284463e58fe0e969122843c7fae9b97801e3639b7e633ccef46e7f69b7f15643e8e822619b16b6457132cfd45edea27716f93e219e17313e650d42b108da3efae
-
Filesize
255KB
MD577be3dcdf9d1e5dc12ed5b4490a6178a
SHA1e65c0c75cce9ee06b6e33ee5761aafec037edf87
SHA256680ec3c1e71aff8770af5636b1cebb2dd561cc7dd719a3b4b5f446f4f554fc6d
SHA5129c47b4cd1265aa0844c478fa73bef8d3f0018fe9e575ea5134658e33dbfa1af4888dc9ea2aa411054079806e09a9bc74739112e98c76798a2cec2c4308e58ccb
-
Filesize
255KB
MD577be3dcdf9d1e5dc12ed5b4490a6178a
SHA1e65c0c75cce9ee06b6e33ee5761aafec037edf87
SHA256680ec3c1e71aff8770af5636b1cebb2dd561cc7dd719a3b4b5f446f4f554fc6d
SHA5129c47b4cd1265aa0844c478fa73bef8d3f0018fe9e575ea5134658e33dbfa1af4888dc9ea2aa411054079806e09a9bc74739112e98c76798a2cec2c4308e58ccb
-
Filesize
255KB
MD546f7172ad5caae5d653419e5d47f99a0
SHA1b2c188c010be20bcf33321aea61d9c9e3d2801cf
SHA256b048bab1e239ee3e7372733ec871aa082eb1cb5f832787577b0c824e435ffd9e
SHA5122b672176fbdd244459b3b4b0dd868c934d4d00f61c2e11e424a07879a648be0deca2c1dee1749ab67b19635f5bf9ed554a6d5aa47b64692c918c96659de7b79e
-
Filesize
255KB
MD546f7172ad5caae5d653419e5d47f99a0
SHA1b2c188c010be20bcf33321aea61d9c9e3d2801cf
SHA256b048bab1e239ee3e7372733ec871aa082eb1cb5f832787577b0c824e435ffd9e
SHA5122b672176fbdd244459b3b4b0dd868c934d4d00f61c2e11e424a07879a648be0deca2c1dee1749ab67b19635f5bf9ed554a6d5aa47b64692c918c96659de7b79e
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD56745104a140a8f16e306f429f2fa57cf
SHA1dba8b408bedd6ee00e674d64d8a09ee23d5cb310
SHA256729bf24fe670c5f3b4b022bd1e7b0ac2733cf85e7c777279ba2a85bdf7b91591
SHA512bf4e806b0afb34458704ce75558375a9233166fa12b9d7b11641fc874c0b7865d9ab53c0092f815d82efeed851eb7789aa87be5293aabd0eac3c026c95f6f1c1
-
Filesize
255KB
MD56745104a140a8f16e306f429f2fa57cf
SHA1dba8b408bedd6ee00e674d64d8a09ee23d5cb310
SHA256729bf24fe670c5f3b4b022bd1e7b0ac2733cf85e7c777279ba2a85bdf7b91591
SHA512bf4e806b0afb34458704ce75558375a9233166fa12b9d7b11641fc874c0b7865d9ab53c0092f815d82efeed851eb7789aa87be5293aabd0eac3c026c95f6f1c1
-
Filesize
255KB
MD5b3c97d418eb8493184f6b702f69ca9a9
SHA19556fe973448b71987fccb16c5a66ff45bd09232
SHA256eacf480ad5ed60befc39d629ddcd848faf2e32cbed363e1f414b239da9d69601
SHA51284463e58fe0e969122843c7fae9b97801e3639b7e633ccef46e7f69b7f15643e8e822619b16b6457132cfd45edea27716f93e219e17313e650d42b108da3efae
-
Filesize
255KB
MD577be3dcdf9d1e5dc12ed5b4490a6178a
SHA1e65c0c75cce9ee06b6e33ee5761aafec037edf87
SHA256680ec3c1e71aff8770af5636b1cebb2dd561cc7dd719a3b4b5f446f4f554fc6d
SHA5129c47b4cd1265aa0844c478fa73bef8d3f0018fe9e575ea5134658e33dbfa1af4888dc9ea2aa411054079806e09a9bc74739112e98c76798a2cec2c4308e58ccb
-
Filesize
255KB
MD546f7172ad5caae5d653419e5d47f99a0
SHA1b2c188c010be20bcf33321aea61d9c9e3d2801cf
SHA256b048bab1e239ee3e7372733ec871aa082eb1cb5f832787577b0c824e435ffd9e
SHA5122b672176fbdd244459b3b4b0dd868c934d4d00f61c2e11e424a07879a648be0deca2c1dee1749ab67b19635f5bf9ed554a6d5aa47b64692c918c96659de7b79e