Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:04
Behavioral task
behavioral1
Sample
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe
Resource
win7-20220901-en
General
-
Target
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe
-
Size
255KB
-
MD5
3abd70c8cd60300e6377176260cfb128
-
SHA1
b1606d59a29b6210b5848a9f3b265dfa241a50ce
-
SHA256
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49
-
SHA512
dcf20d9d5f8af30f909183e209f09cc916f4aa6dcb57b7d22204b1995ae42ae1ff7739fdf6f2f84e0cc0762fbfb6bd88b66cd7e7454933e73e58b72c88f19417
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJz:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" yfftikpyql.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yfftikpyql.exe -
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yfftikpyql.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yfftikpyql.exe -
Executes dropped EXE 6 IoCs
Processes:
yfftikpyql.exesqbmwjmxumzepxg.exesadunlyw.exexqlbospdeobwe.exexqlbospdeobwe.exesadunlyw.exepid process 2012 yfftikpyql.exe 2032 sqbmwjmxumzepxg.exe 1164 sadunlyw.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 1508 sadunlyw.exe -
Processes:
resource yara_rule behavioral1/memory/1700-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\yfftikpyql.exe upx C:\Windows\SysWOW64\yfftikpyql.exe upx C:\Windows\SysWOW64\yfftikpyql.exe upx \Windows\SysWOW64\sqbmwjmxumzepxg.exe upx C:\Windows\SysWOW64\sqbmwjmxumzepxg.exe upx C:\Windows\SysWOW64\sqbmwjmxumzepxg.exe upx \Windows\SysWOW64\sadunlyw.exe upx C:\Windows\SysWOW64\sadunlyw.exe upx C:\Windows\SysWOW64\sadunlyw.exe upx \Windows\SysWOW64\xqlbospdeobwe.exe upx C:\Windows\SysWOW64\xqlbospdeobwe.exe upx C:\Windows\SysWOW64\xqlbospdeobwe.exe upx behavioral1/memory/2012-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2032-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\xqlbospdeobwe.exe upx \Windows\SysWOW64\xqlbospdeobwe.exe upx behavioral1/memory/664-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\sadunlyw.exe upx C:\Windows\SysWOW64\sadunlyw.exe upx behavioral1/memory/572-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1508-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1700-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2012-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2032-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/664-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/572-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1508-108-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx -
Loads dropped DLL 6 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.execmd.exeyfftikpyql.exepid process 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1528 cmd.exe 2012 yfftikpyql.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yfftikpyql.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
sqbmwjmxumzepxg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run sqbmwjmxumzepxg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\usnpekrg = "yfftikpyql.exe" sqbmwjmxumzepxg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bknxngcz = "sqbmwjmxumzepxg.exe" sqbmwjmxumzepxg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xqlbospdeobwe.exe" sqbmwjmxumzepxg.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
sadunlyw.exeyfftikpyql.exesadunlyw.exedescription ioc process File opened (read-only) \??\q: sadunlyw.exe File opened (read-only) \??\k: yfftikpyql.exe File opened (read-only) \??\z: yfftikpyql.exe File opened (read-only) \??\f: sadunlyw.exe File opened (read-only) \??\z: sadunlyw.exe File opened (read-only) \??\e: sadunlyw.exe File opened (read-only) \??\j: sadunlyw.exe File opened (read-only) \??\v: yfftikpyql.exe File opened (read-only) \??\x: sadunlyw.exe File opened (read-only) \??\s: sadunlyw.exe File opened (read-only) \??\h: yfftikpyql.exe File opened (read-only) \??\i: yfftikpyql.exe File opened (read-only) \??\m: yfftikpyql.exe File opened (read-only) \??\b: sadunlyw.exe File opened (read-only) \??\x: sadunlyw.exe File opened (read-only) \??\y: sadunlyw.exe File opened (read-only) \??\n: yfftikpyql.exe File opened (read-only) \??\h: sadunlyw.exe File opened (read-only) \??\v: sadunlyw.exe File opened (read-only) \??\p: sadunlyw.exe File opened (read-only) \??\j: yfftikpyql.exe File opened (read-only) \??\s: yfftikpyql.exe File opened (read-only) \??\g: sadunlyw.exe File opened (read-only) \??\o: sadunlyw.exe File opened (read-only) \??\n: sadunlyw.exe File opened (read-only) \??\q: yfftikpyql.exe File opened (read-only) \??\n: sadunlyw.exe File opened (read-only) \??\v: sadunlyw.exe File opened (read-only) \??\t: sadunlyw.exe File opened (read-only) \??\z: sadunlyw.exe File opened (read-only) \??\a: yfftikpyql.exe File opened (read-only) \??\g: yfftikpyql.exe File opened (read-only) \??\l: yfftikpyql.exe File opened (read-only) \??\l: sadunlyw.exe File opened (read-only) \??\m: sadunlyw.exe File opened (read-only) \??\i: sadunlyw.exe File opened (read-only) \??\m: sadunlyw.exe File opened (read-only) \??\p: sadunlyw.exe File opened (read-only) \??\x: yfftikpyql.exe File opened (read-only) \??\y: yfftikpyql.exe File opened (read-only) \??\k: sadunlyw.exe File opened (read-only) \??\u: sadunlyw.exe File opened (read-only) \??\k: sadunlyw.exe File opened (read-only) \??\e: sadunlyw.exe File opened (read-only) \??\s: sadunlyw.exe File opened (read-only) \??\l: sadunlyw.exe File opened (read-only) \??\r: sadunlyw.exe File opened (read-only) \??\u: sadunlyw.exe File opened (read-only) \??\b: yfftikpyql.exe File opened (read-only) \??\o: yfftikpyql.exe File opened (read-only) \??\p: yfftikpyql.exe File opened (read-only) \??\q: sadunlyw.exe File opened (read-only) \??\r: yfftikpyql.exe File opened (read-only) \??\u: yfftikpyql.exe File opened (read-only) \??\j: sadunlyw.exe File opened (read-only) \??\w: sadunlyw.exe File opened (read-only) \??\o: sadunlyw.exe File opened (read-only) \??\w: sadunlyw.exe File opened (read-only) \??\f: yfftikpyql.exe File opened (read-only) \??\a: sadunlyw.exe File opened (read-only) \??\r: sadunlyw.exe File opened (read-only) \??\g: sadunlyw.exe File opened (read-only) \??\w: yfftikpyql.exe File opened (read-only) \??\i: sadunlyw.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
yfftikpyql.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" yfftikpyql.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" yfftikpyql.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1700-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1700-77-0x0000000003320000-0x00000000033C0000-memory.dmp autoit_exe behavioral1/memory/2012-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2032-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1164-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1700-86-0x0000000003320000-0x00000000033C0000-memory.dmp autoit_exe behavioral1/memory/664-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/572-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1508-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1700-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1164-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2012-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2032-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/664-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/572-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1508-108-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exeyfftikpyql.exedescription ioc process File opened for modification C:\Windows\SysWOW64\sadunlyw.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File created C:\Windows\SysWOW64\xqlbospdeobwe.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File created C:\Windows\SysWOW64\yfftikpyql.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File opened for modification C:\Windows\SysWOW64\yfftikpyql.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File created C:\Windows\SysWOW64\sqbmwjmxumzepxg.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File opened for modification C:\Windows\SysWOW64\sqbmwjmxumzepxg.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File created C:\Windows\SysWOW64\sadunlyw.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File opened for modification C:\Windows\SysWOW64\xqlbospdeobwe.exe 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll yfftikpyql.exe -
Drops file in Program Files directory 15 IoCs
Processes:
sadunlyw.exesadunlyw.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal sadunlyw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal sadunlyw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal sadunlyw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe sadunlyw.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe sadunlyw.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe sadunlyw.exe -
Drops file in Windows directory 5 IoCs
Processes:
WINWORD.EXE5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEyfftikpyql.exe5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf yfftikpyql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc yfftikpyql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" yfftikpyql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yfftikpyql.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1839C67A15ECDBB3B8CA7CE3EDE437BC" 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" yfftikpyql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg yfftikpyql.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1724 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exeyfftikpyql.exesqbmwjmxumzepxg.exesadunlyw.exexqlbospdeobwe.exexqlbospdeobwe.exesadunlyw.exepid process 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 1508 sadunlyw.exe 1508 sadunlyw.exe 1508 sadunlyw.exe 1508 sadunlyw.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 2032 sqbmwjmxumzepxg.exe 664 xqlbospdeobwe.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exeyfftikpyql.exesqbmwjmxumzepxg.exesadunlyw.exexqlbospdeobwe.exexqlbospdeobwe.exesadunlyw.exepid process 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 1508 sadunlyw.exe 1508 sadunlyw.exe 1508 sadunlyw.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exeyfftikpyql.exesqbmwjmxumzepxg.exesadunlyw.exexqlbospdeobwe.exexqlbospdeobwe.exesadunlyw.exepid process 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2012 yfftikpyql.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 2032 sqbmwjmxumzepxg.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 1164 sadunlyw.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 664 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 572 xqlbospdeobwe.exe 1508 sadunlyw.exe 1508 sadunlyw.exe 1508 sadunlyw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1724 WINWORD.EXE 1724 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exesqbmwjmxumzepxg.execmd.exeyfftikpyql.exeWINWORD.EXEdescription pid process target process PID 1700 wrote to memory of 2012 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe yfftikpyql.exe PID 1700 wrote to memory of 2012 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe yfftikpyql.exe PID 1700 wrote to memory of 2012 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe yfftikpyql.exe PID 1700 wrote to memory of 2012 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe yfftikpyql.exe PID 1700 wrote to memory of 2032 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sqbmwjmxumzepxg.exe PID 1700 wrote to memory of 2032 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sqbmwjmxumzepxg.exe PID 1700 wrote to memory of 2032 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sqbmwjmxumzepxg.exe PID 1700 wrote to memory of 2032 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sqbmwjmxumzepxg.exe PID 1700 wrote to memory of 1164 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sadunlyw.exe PID 1700 wrote to memory of 1164 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sadunlyw.exe PID 1700 wrote to memory of 1164 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sadunlyw.exe PID 1700 wrote to memory of 1164 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe sadunlyw.exe PID 2032 wrote to memory of 1528 2032 sqbmwjmxumzepxg.exe cmd.exe PID 2032 wrote to memory of 1528 2032 sqbmwjmxumzepxg.exe cmd.exe PID 2032 wrote to memory of 1528 2032 sqbmwjmxumzepxg.exe cmd.exe PID 2032 wrote to memory of 1528 2032 sqbmwjmxumzepxg.exe cmd.exe PID 1700 wrote to memory of 664 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe xqlbospdeobwe.exe PID 1700 wrote to memory of 664 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe xqlbospdeobwe.exe PID 1700 wrote to memory of 664 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe xqlbospdeobwe.exe PID 1700 wrote to memory of 664 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe xqlbospdeobwe.exe PID 1528 wrote to memory of 572 1528 cmd.exe xqlbospdeobwe.exe PID 1528 wrote to memory of 572 1528 cmd.exe xqlbospdeobwe.exe PID 1528 wrote to memory of 572 1528 cmd.exe xqlbospdeobwe.exe PID 1528 wrote to memory of 572 1528 cmd.exe xqlbospdeobwe.exe PID 2012 wrote to memory of 1508 2012 yfftikpyql.exe sadunlyw.exe PID 2012 wrote to memory of 1508 2012 yfftikpyql.exe sadunlyw.exe PID 2012 wrote to memory of 1508 2012 yfftikpyql.exe sadunlyw.exe PID 2012 wrote to memory of 1508 2012 yfftikpyql.exe sadunlyw.exe PID 1700 wrote to memory of 1724 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe WINWORD.EXE PID 1700 wrote to memory of 1724 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe WINWORD.EXE PID 1700 wrote to memory of 1724 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe WINWORD.EXE PID 1700 wrote to memory of 1724 1700 5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe WINWORD.EXE PID 1724 wrote to memory of 1912 1724 WINWORD.EXE splwow64.exe PID 1724 wrote to memory of 1912 1724 WINWORD.EXE splwow64.exe PID 1724 wrote to memory of 1912 1724 WINWORD.EXE splwow64.exe PID 1724 wrote to memory of 1912 1724 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe"C:\Users\Admin\AppData\Local\Temp\5edb013f68a059db7dc018c5468e51c2fb81c7677f21872230fcbea92ca02b49.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\yfftikpyql.exeyfftikpyql.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\sadunlyw.exeC:\Windows\system32\sadunlyw.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508 -
C:\Windows\SysWOW64\sqbmwjmxumzepxg.exesqbmwjmxumzepxg.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd.exe /c xqlbospdeobwe.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\xqlbospdeobwe.exexqlbospdeobwe.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:572 -
C:\Windows\SysWOW64\sadunlyw.exesadunlyw.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1164 -
C:\Windows\SysWOW64\xqlbospdeobwe.exexqlbospdeobwe.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:664 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1912
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD549e8fdc5dc4eedfa63856249f9058140
SHA1a030df0c84c75c5c7ea45ab91db7faa164cd6d6a
SHA256ec611a3f8ded71a0cdc23f5112885d48c6e5d88a8f9336128b4ae2bc18bc2b6c
SHA512c389336d2fd14ea5d7044fa878a3e772e5b7208f58be680745551369ec8d9d3a955be885575c40d813e303067dff22cd3d71f3a214fb2d7f367209a53fda5e87
-
Filesize
255KB
MD5ee762bc8fe9ab3dccc0ea9b9cf45f96f
SHA19598d6593527261c16a3cd3e07b55fd01249efe6
SHA2566d8713d0cef93f4dc385d9a1e87bbc20cbf0c200df450ff12ccc9904ba3bd688
SHA512335955196cca765182bfbca71677bcced9824102ac291261a7852366dfaaf5722f250dd61773e4b715f5373641958b1e4695fdc35a9a5eefa3da585bda895b3c
-
Filesize
255KB
MD5ee762bc8fe9ab3dccc0ea9b9cf45f96f
SHA19598d6593527261c16a3cd3e07b55fd01249efe6
SHA2566d8713d0cef93f4dc385d9a1e87bbc20cbf0c200df450ff12ccc9904ba3bd688
SHA512335955196cca765182bfbca71677bcced9824102ac291261a7852366dfaaf5722f250dd61773e4b715f5373641958b1e4695fdc35a9a5eefa3da585bda895b3c
-
Filesize
255KB
MD5ee762bc8fe9ab3dccc0ea9b9cf45f96f
SHA19598d6593527261c16a3cd3e07b55fd01249efe6
SHA2566d8713d0cef93f4dc385d9a1e87bbc20cbf0c200df450ff12ccc9904ba3bd688
SHA512335955196cca765182bfbca71677bcced9824102ac291261a7852366dfaaf5722f250dd61773e4b715f5373641958b1e4695fdc35a9a5eefa3da585bda895b3c
-
Filesize
255KB
MD5f22c67b7181210caaa0ec1700f7e3fe6
SHA1db38ba30abf1d12348e252005f485f78ae351193
SHA25622538839b8648af6f47397a368d2e808c3850bdfa520f389bee1f909f9f1a26a
SHA51257cb63eae91e4dd43585fd21fa298061babaa4a0e541a4419c04f68b7bae0f19455249285e2db3c02fed69fe2707a12c636ab81227a1ab34f3c8791e1f93a9fa
-
Filesize
255KB
MD5f22c67b7181210caaa0ec1700f7e3fe6
SHA1db38ba30abf1d12348e252005f485f78ae351193
SHA25622538839b8648af6f47397a368d2e808c3850bdfa520f389bee1f909f9f1a26a
SHA51257cb63eae91e4dd43585fd21fa298061babaa4a0e541a4419c04f68b7bae0f19455249285e2db3c02fed69fe2707a12c636ab81227a1ab34f3c8791e1f93a9fa
-
Filesize
255KB
MD55c904277d98dbb96bed5aa20478b0ca1
SHA1295d029c12ae471593eb1dc59756466fedcff7a1
SHA25656d5efafee5ffb90777948cfce513ee817a23239bdf96591a1e2ac6c9552164c
SHA512dd5894af29228b5043dc9dcbf593f8d5e08f89f1cdad60859af3754da27deca8a1aad989c1e503b573974acae9738773ca1fb24d9c62dc8d72ac3eb98746da13
-
Filesize
255KB
MD55c904277d98dbb96bed5aa20478b0ca1
SHA1295d029c12ae471593eb1dc59756466fedcff7a1
SHA25656d5efafee5ffb90777948cfce513ee817a23239bdf96591a1e2ac6c9552164c
SHA512dd5894af29228b5043dc9dcbf593f8d5e08f89f1cdad60859af3754da27deca8a1aad989c1e503b573974acae9738773ca1fb24d9c62dc8d72ac3eb98746da13
-
Filesize
255KB
MD55c904277d98dbb96bed5aa20478b0ca1
SHA1295d029c12ae471593eb1dc59756466fedcff7a1
SHA25656d5efafee5ffb90777948cfce513ee817a23239bdf96591a1e2ac6c9552164c
SHA512dd5894af29228b5043dc9dcbf593f8d5e08f89f1cdad60859af3754da27deca8a1aad989c1e503b573974acae9738773ca1fb24d9c62dc8d72ac3eb98746da13
-
Filesize
255KB
MD5e0b1eb224f580aac8db59d8a9cd03613
SHA12537417104db16ddc318db40345d37a3c0691386
SHA256a281359996eb1f8b799a5073ef155d9e1cecddbb822efe2acefaf60f2cb178ba
SHA51281ebd90100942ad36693ffd44d33bd53011f4404b0e220298d63ecda7b58a8d37054fb82ac2b7a49fb1d695403520081f3598dad5a3e9f39b93d2740e42502ce
-
Filesize
255KB
MD5e0b1eb224f580aac8db59d8a9cd03613
SHA12537417104db16ddc318db40345d37a3c0691386
SHA256a281359996eb1f8b799a5073ef155d9e1cecddbb822efe2acefaf60f2cb178ba
SHA51281ebd90100942ad36693ffd44d33bd53011f4404b0e220298d63ecda7b58a8d37054fb82ac2b7a49fb1d695403520081f3598dad5a3e9f39b93d2740e42502ce
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5ee762bc8fe9ab3dccc0ea9b9cf45f96f
SHA19598d6593527261c16a3cd3e07b55fd01249efe6
SHA2566d8713d0cef93f4dc385d9a1e87bbc20cbf0c200df450ff12ccc9904ba3bd688
SHA512335955196cca765182bfbca71677bcced9824102ac291261a7852366dfaaf5722f250dd61773e4b715f5373641958b1e4695fdc35a9a5eefa3da585bda895b3c
-
Filesize
255KB
MD5ee762bc8fe9ab3dccc0ea9b9cf45f96f
SHA19598d6593527261c16a3cd3e07b55fd01249efe6
SHA2566d8713d0cef93f4dc385d9a1e87bbc20cbf0c200df450ff12ccc9904ba3bd688
SHA512335955196cca765182bfbca71677bcced9824102ac291261a7852366dfaaf5722f250dd61773e4b715f5373641958b1e4695fdc35a9a5eefa3da585bda895b3c
-
Filesize
255KB
MD5f22c67b7181210caaa0ec1700f7e3fe6
SHA1db38ba30abf1d12348e252005f485f78ae351193
SHA25622538839b8648af6f47397a368d2e808c3850bdfa520f389bee1f909f9f1a26a
SHA51257cb63eae91e4dd43585fd21fa298061babaa4a0e541a4419c04f68b7bae0f19455249285e2db3c02fed69fe2707a12c636ab81227a1ab34f3c8791e1f93a9fa
-
Filesize
255KB
MD55c904277d98dbb96bed5aa20478b0ca1
SHA1295d029c12ae471593eb1dc59756466fedcff7a1
SHA25656d5efafee5ffb90777948cfce513ee817a23239bdf96591a1e2ac6c9552164c
SHA512dd5894af29228b5043dc9dcbf593f8d5e08f89f1cdad60859af3754da27deca8a1aad989c1e503b573974acae9738773ca1fb24d9c62dc8d72ac3eb98746da13
-
Filesize
255KB
MD55c904277d98dbb96bed5aa20478b0ca1
SHA1295d029c12ae471593eb1dc59756466fedcff7a1
SHA25656d5efafee5ffb90777948cfce513ee817a23239bdf96591a1e2ac6c9552164c
SHA512dd5894af29228b5043dc9dcbf593f8d5e08f89f1cdad60859af3754da27deca8a1aad989c1e503b573974acae9738773ca1fb24d9c62dc8d72ac3eb98746da13
-
Filesize
255KB
MD5e0b1eb224f580aac8db59d8a9cd03613
SHA12537417104db16ddc318db40345d37a3c0691386
SHA256a281359996eb1f8b799a5073ef155d9e1cecddbb822efe2acefaf60f2cb178ba
SHA51281ebd90100942ad36693ffd44d33bd53011f4404b0e220298d63ecda7b58a8d37054fb82ac2b7a49fb1d695403520081f3598dad5a3e9f39b93d2740e42502ce