Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:06
Behavioral task
behavioral1
Sample
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe
Resource
win10v2004-20221111-en
General
-
Target
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe
-
Size
255KB
-
MD5
f44a1675a9a7394032ce07ab9f4fd112
-
SHA1
d4e578dae6f63917cdb886776df3f77ca92fc697
-
SHA256
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c
-
SHA512
c14eab876165291a62ca3e8faffe7c7751b32acb384e026e4dbba30a7be3b7e6247bfab3d3ee9e9b2fa325f61c95319ef297acbfe2f86fef4826de42e5b3a26a
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJn:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fsnbaqbzte.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fsnbaqbzte.exe -
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fsnbaqbzte.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fsnbaqbzte.exe -
Executes dropped EXE 6 IoCs
Processes:
fsnbaqbzte.exevzpdbertlymcmug.exefrbtaiop.exengnfthtlpncbu.exefrbtaiop.exengnfthtlpncbu.exepid process 2044 fsnbaqbzte.exe 1616 vzpdbertlymcmug.exe 1552 frbtaiop.exe 1264 ngnfthtlpncbu.exe 976 frbtaiop.exe 1168 ngnfthtlpncbu.exe -
Processes:
resource yara_rule \Windows\SysWOW64\fsnbaqbzte.exe upx C:\Windows\SysWOW64\fsnbaqbzte.exe upx \Windows\SysWOW64\vzpdbertlymcmug.exe upx C:\Windows\SysWOW64\fsnbaqbzte.exe upx \Windows\SysWOW64\frbtaiop.exe upx C:\Windows\SysWOW64\frbtaiop.exe upx C:\Windows\SysWOW64\vzpdbertlymcmug.exe upx \Windows\SysWOW64\ngnfthtlpncbu.exe upx C:\Windows\SysWOW64\frbtaiop.exe upx C:\Windows\SysWOW64\ngnfthtlpncbu.exe upx C:\Windows\SysWOW64\ngnfthtlpncbu.exe upx C:\Windows\SysWOW64\vzpdbertlymcmug.exe upx C:\Windows\SysWOW64\frbtaiop.exe upx \Windows\SysWOW64\frbtaiop.exe upx behavioral1/memory/2044-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1616-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1264-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1552-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/976-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1168-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1044-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\ngnfthtlpncbu.exe upx C:\Windows\SysWOW64\ngnfthtlpncbu.exe upx behavioral1/memory/1044-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1616-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1552-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1264-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/976-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1168-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx C:\Users\Admin\AppData\Roaming\CompleteApprove.doc.exe upx -
Loads dropped DLL 6 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.execmd.exepid process 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 2044 fsnbaqbzte.exe 688 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fsnbaqbzte.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
vzpdbertlymcmug.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vzpdbertlymcmug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nmxvptox = "fsnbaqbzte.exe" vzpdbertlymcmug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\fthrfmdh = "vzpdbertlymcmug.exe" vzpdbertlymcmug.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ngnfthtlpncbu.exe" vzpdbertlymcmug.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
frbtaiop.exefrbtaiop.exefsnbaqbzte.exedescription ioc process File opened (read-only) \??\r: frbtaiop.exe File opened (read-only) \??\w: frbtaiop.exe File opened (read-only) \??\x: frbtaiop.exe File opened (read-only) \??\l: fsnbaqbzte.exe File opened (read-only) \??\j: frbtaiop.exe File opened (read-only) \??\k: frbtaiop.exe File opened (read-only) \??\a: frbtaiop.exe File opened (read-only) \??\t: frbtaiop.exe File opened (read-only) \??\z: frbtaiop.exe File opened (read-only) \??\z: frbtaiop.exe File opened (read-only) \??\l: frbtaiop.exe File opened (read-only) \??\b: frbtaiop.exe File opened (read-only) \??\i: fsnbaqbzte.exe File opened (read-only) \??\v: fsnbaqbzte.exe File opened (read-only) \??\x: frbtaiop.exe File opened (read-only) \??\w: fsnbaqbzte.exe File opened (read-only) \??\e: frbtaiop.exe File opened (read-only) \??\g: frbtaiop.exe File opened (read-only) \??\f: frbtaiop.exe File opened (read-only) \??\g: frbtaiop.exe File opened (read-only) \??\k: frbtaiop.exe File opened (read-only) \??\s: fsnbaqbzte.exe File opened (read-only) \??\u: fsnbaqbzte.exe File opened (read-only) \??\u: frbtaiop.exe File opened (read-only) \??\y: frbtaiop.exe File opened (read-only) \??\o: fsnbaqbzte.exe File opened (read-only) \??\p: frbtaiop.exe File opened (read-only) \??\h: frbtaiop.exe File opened (read-only) \??\r: frbtaiop.exe File opened (read-only) \??\a: fsnbaqbzte.exe File opened (read-only) \??\b: fsnbaqbzte.exe File opened (read-only) \??\j: fsnbaqbzte.exe File opened (read-only) \??\l: frbtaiop.exe File opened (read-only) \??\o: frbtaiop.exe File opened (read-only) \??\i: frbtaiop.exe File opened (read-only) \??\o: frbtaiop.exe File opened (read-only) \??\f: fsnbaqbzte.exe File opened (read-only) \??\p: fsnbaqbzte.exe File opened (read-only) \??\x: fsnbaqbzte.exe File opened (read-only) \??\p: frbtaiop.exe File opened (read-only) \??\v: frbtaiop.exe File opened (read-only) \??\u: frbtaiop.exe File opened (read-only) \??\w: frbtaiop.exe File opened (read-only) \??\r: fsnbaqbzte.exe File opened (read-only) \??\q: frbtaiop.exe File opened (read-only) \??\e: frbtaiop.exe File opened (read-only) \??\s: frbtaiop.exe File opened (read-only) \??\n: frbtaiop.exe File opened (read-only) \??\v: frbtaiop.exe File opened (read-only) \??\h: fsnbaqbzte.exe File opened (read-only) \??\q: fsnbaqbzte.exe File opened (read-only) \??\m: frbtaiop.exe File opened (read-only) \??\y: fsnbaqbzte.exe File opened (read-only) \??\z: fsnbaqbzte.exe File opened (read-only) \??\f: frbtaiop.exe File opened (read-only) \??\b: frbtaiop.exe File opened (read-only) \??\e: fsnbaqbzte.exe File opened (read-only) \??\k: fsnbaqbzte.exe File opened (read-only) \??\m: fsnbaqbzte.exe File opened (read-only) \??\n: fsnbaqbzte.exe File opened (read-only) \??\h: frbtaiop.exe File opened (read-only) \??\j: frbtaiop.exe File opened (read-only) \??\a: frbtaiop.exe File opened (read-only) \??\i: frbtaiop.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
fsnbaqbzte.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" fsnbaqbzte.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" fsnbaqbzte.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2044-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1616-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1264-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1552-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/976-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1168-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1044-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1044-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1616-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1552-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1264-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/976-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1168-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.exedescription ioc process File opened for modification C:\Windows\SysWOW64\fsnbaqbzte.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File opened for modification C:\Windows\SysWOW64\vzpdbertlymcmug.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File created C:\Windows\SysWOW64\frbtaiop.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File created C:\Windows\SysWOW64\ngnfthtlpncbu.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File opened for modification C:\Windows\SysWOW64\ngnfthtlpncbu.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll fsnbaqbzte.exe File created C:\Windows\SysWOW64\fsnbaqbzte.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File created C:\Windows\SysWOW64\vzpdbertlymcmug.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File opened for modification C:\Windows\SysWOW64\frbtaiop.exe 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe -
Drops file in Program Files directory 14 IoCs
Processes:
frbtaiop.exefrbtaiop.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal frbtaiop.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal frbtaiop.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe frbtaiop.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe frbtaiop.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe frbtaiop.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal frbtaiop.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe frbtaiop.exe -
Drops file in Windows directory 5 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEfsnbaqbzte.exe1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg fsnbaqbzte.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" fsnbaqbzte.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf fsnbaqbzte.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33452D7B9C2783226A4677D170242DAD7CF364DC" 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs fsnbaqbzte.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCAF9BEFE14F1E2830B3B4481993E95B0FA03FD4365033AE1BA459E08D4" 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" fsnbaqbzte.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7846BB8FF6C22DED10BD1D18A0F9062" 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 888 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.exefrbtaiop.exevzpdbertlymcmug.exengnfthtlpncbu.exengnfthtlpncbu.exefrbtaiop.exepid process 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 976 frbtaiop.exe 976 frbtaiop.exe 976 frbtaiop.exe 976 frbtaiop.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1616 vzpdbertlymcmug.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.exefrbtaiop.exevzpdbertlymcmug.exengnfthtlpncbu.exefrbtaiop.exengnfthtlpncbu.exepid process 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 976 frbtaiop.exe 976 frbtaiop.exe 976 frbtaiop.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.exefrbtaiop.exevzpdbertlymcmug.exengnfthtlpncbu.exefrbtaiop.exengnfthtlpncbu.exepid process 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 2044 fsnbaqbzte.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1552 frbtaiop.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1616 vzpdbertlymcmug.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 1264 ngnfthtlpncbu.exe 976 frbtaiop.exe 976 frbtaiop.exe 976 frbtaiop.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe 1168 ngnfthtlpncbu.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 888 WINWORD.EXE 888 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exefsnbaqbzte.exevzpdbertlymcmug.execmd.exeWINWORD.EXEdescription pid process target process PID 1044 wrote to memory of 2044 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe fsnbaqbzte.exe PID 1044 wrote to memory of 2044 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe fsnbaqbzte.exe PID 1044 wrote to memory of 2044 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe fsnbaqbzte.exe PID 1044 wrote to memory of 2044 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe fsnbaqbzte.exe PID 1044 wrote to memory of 1616 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe vzpdbertlymcmug.exe PID 1044 wrote to memory of 1616 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe vzpdbertlymcmug.exe PID 1044 wrote to memory of 1616 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe vzpdbertlymcmug.exe PID 1044 wrote to memory of 1616 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe vzpdbertlymcmug.exe PID 1044 wrote to memory of 1552 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe frbtaiop.exe PID 1044 wrote to memory of 1552 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe frbtaiop.exe PID 1044 wrote to memory of 1552 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe frbtaiop.exe PID 1044 wrote to memory of 1552 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe frbtaiop.exe PID 1044 wrote to memory of 1264 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe ngnfthtlpncbu.exe PID 1044 wrote to memory of 1264 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe ngnfthtlpncbu.exe PID 1044 wrote to memory of 1264 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe ngnfthtlpncbu.exe PID 1044 wrote to memory of 1264 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe ngnfthtlpncbu.exe PID 2044 wrote to memory of 976 2044 fsnbaqbzte.exe frbtaiop.exe PID 2044 wrote to memory of 976 2044 fsnbaqbzte.exe frbtaiop.exe PID 2044 wrote to memory of 976 2044 fsnbaqbzte.exe frbtaiop.exe PID 2044 wrote to memory of 976 2044 fsnbaqbzte.exe frbtaiop.exe PID 1616 wrote to memory of 688 1616 vzpdbertlymcmug.exe cmd.exe PID 1616 wrote to memory of 688 1616 vzpdbertlymcmug.exe cmd.exe PID 1616 wrote to memory of 688 1616 vzpdbertlymcmug.exe cmd.exe PID 1616 wrote to memory of 688 1616 vzpdbertlymcmug.exe cmd.exe PID 688 wrote to memory of 1168 688 cmd.exe ngnfthtlpncbu.exe PID 688 wrote to memory of 1168 688 cmd.exe ngnfthtlpncbu.exe PID 688 wrote to memory of 1168 688 cmd.exe ngnfthtlpncbu.exe PID 688 wrote to memory of 1168 688 cmd.exe ngnfthtlpncbu.exe PID 1044 wrote to memory of 888 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe WINWORD.EXE PID 1044 wrote to memory of 888 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe WINWORD.EXE PID 1044 wrote to memory of 888 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe WINWORD.EXE PID 1044 wrote to memory of 888 1044 1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe WINWORD.EXE PID 888 wrote to memory of 1772 888 WINWORD.EXE splwow64.exe PID 888 wrote to memory of 1772 888 WINWORD.EXE splwow64.exe PID 888 wrote to memory of 1772 888 WINWORD.EXE splwow64.exe PID 888 wrote to memory of 1772 888 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe"C:\Users\Admin\AppData\Local\Temp\1a0ddc66b62771262dd5cb37f834eb6abf77f7cb08184a34e3ecb746443e369c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\fsnbaqbzte.exefsnbaqbzte.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\frbtaiop.exeC:\Windows\system32\frbtaiop.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:976
-
-
-
C:\Windows\SysWOW64\vzpdbertlymcmug.exevzpdbertlymcmug.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ngnfthtlpncbu.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\ngnfthtlpncbu.exengnfthtlpncbu.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1168
-
-
-
-
C:\Windows\SysWOW64\frbtaiop.exefrbtaiop.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1552
-
-
C:\Windows\SysWOW64\ngnfthtlpncbu.exengnfthtlpncbu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1264
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1772
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD52792676326634c2ede9e43caa09ecd31
SHA15f1169546046111720f192e3d731b68d57212ce8
SHA2561da983e26ec1fdb493ab3ae362df4d3d0124e4a39e2c4dd2c07814bc02cf58c9
SHA51222526b4bf035f16abba1ff31803360d77b31bfc11f3d583524da9dc761c6f1427cc5d5094eac083d2b77ae2673d1e4641374fd6ec52dcc80b975c7752dcc1f2d
-
Filesize
255KB
MD5f41c88bbe03058d7f8467fa78d06b658
SHA120223a6281e0eaf4c83feaaa7bab8fa331a05fd1
SHA256a3e2417c9cbd74ef99c0281fc7e094a642e47bce544c4acfda7dfd1513cd4cd7
SHA5128f1af26e9cfc42901e1b820cb9d157316a7d690e9f9aef4e118fc8e407c93e44e54de58cd9fa542a0e968b3690f75fd7ffd5d9be9412d241f6672b66cea7e368
-
Filesize
255KB
MD5fd5864ffd7923634738cf96710c65181
SHA116db2d55bc2e60e3d715f61b041592727fd86b31
SHA2568945831d552a4d5d27361769a8a532ad258a432185f78276adbfbbb7fc5300f1
SHA5128c65cf813130fbab14fc2b534c688142c222af7eef1ee310c473482ce9c5ef9ab449473cdaae3dec2ed7800432a634d8345f7be5d721d90441a82d26230c50bc
-
Filesize
255KB
MD5a031b6c456eeed0846d8fcc6306ef926
SHA119976dcf9e145dcea483742d18f2a1f330747c63
SHA25657ea6f94f1b45953ccc26cd5093b6023ae192a3f28f91759cf516a1c4125c0dc
SHA512cab1ec9406937755bed8bb614366012c4c8566751f13f831c676ea7ed29bba4c91c26a0a745ae8897771937277994929fee711fe763be24a66b4112018ca6804
-
Filesize
255KB
MD5a031b6c456eeed0846d8fcc6306ef926
SHA119976dcf9e145dcea483742d18f2a1f330747c63
SHA25657ea6f94f1b45953ccc26cd5093b6023ae192a3f28f91759cf516a1c4125c0dc
SHA512cab1ec9406937755bed8bb614366012c4c8566751f13f831c676ea7ed29bba4c91c26a0a745ae8897771937277994929fee711fe763be24a66b4112018ca6804
-
Filesize
255KB
MD5a031b6c456eeed0846d8fcc6306ef926
SHA119976dcf9e145dcea483742d18f2a1f330747c63
SHA25657ea6f94f1b45953ccc26cd5093b6023ae192a3f28f91759cf516a1c4125c0dc
SHA512cab1ec9406937755bed8bb614366012c4c8566751f13f831c676ea7ed29bba4c91c26a0a745ae8897771937277994929fee711fe763be24a66b4112018ca6804
-
Filesize
255KB
MD50732cd7c3a8ee5a52bf8ed37d00e6b2c
SHA114f25984c8c99e9d33b2171adf03e2e4d37be480
SHA256499123a64aa4f699423899895c0856cde71ba61b0c0be33880286e1f9bd8bf1f
SHA512e15d476786f408a07d8b771c19820b74ef36412411ba9036c34766675f585579bcc1e7ee6fcf10d7739d25de3210f0855bd55f5a8912656d5ffb1e1614ccaad4
-
Filesize
255KB
MD50732cd7c3a8ee5a52bf8ed37d00e6b2c
SHA114f25984c8c99e9d33b2171adf03e2e4d37be480
SHA256499123a64aa4f699423899895c0856cde71ba61b0c0be33880286e1f9bd8bf1f
SHA512e15d476786f408a07d8b771c19820b74ef36412411ba9036c34766675f585579bcc1e7ee6fcf10d7739d25de3210f0855bd55f5a8912656d5ffb1e1614ccaad4
-
Filesize
255KB
MD54309e7ef5780d5292b5c739dcf8daad7
SHA13171e20ba6a238ef90a753665052548e04ec28aa
SHA256ea6fdaab3f1cb36522260ccf10cf7cf07288bfed3db2fae589992ae1e7b2fd92
SHA512b5777c6a38817c2f5353590556aa5bd528e301d1040a0352068dc027f46313ca791c20702bc8be9dde6740798a0cd0743ea764db46e63c2ba083fcfe255c2a9c
-
Filesize
255KB
MD54309e7ef5780d5292b5c739dcf8daad7
SHA13171e20ba6a238ef90a753665052548e04ec28aa
SHA256ea6fdaab3f1cb36522260ccf10cf7cf07288bfed3db2fae589992ae1e7b2fd92
SHA512b5777c6a38817c2f5353590556aa5bd528e301d1040a0352068dc027f46313ca791c20702bc8be9dde6740798a0cd0743ea764db46e63c2ba083fcfe255c2a9c
-
Filesize
255KB
MD54309e7ef5780d5292b5c739dcf8daad7
SHA13171e20ba6a238ef90a753665052548e04ec28aa
SHA256ea6fdaab3f1cb36522260ccf10cf7cf07288bfed3db2fae589992ae1e7b2fd92
SHA512b5777c6a38817c2f5353590556aa5bd528e301d1040a0352068dc027f46313ca791c20702bc8be9dde6740798a0cd0743ea764db46e63c2ba083fcfe255c2a9c
-
Filesize
255KB
MD5ce6cafa5b8ec7247e2d224678c718b5d
SHA10690c3fc2b24c9db1c8fda6cc1ff2a1bd4f2ada0
SHA2565d61d5ef22418026d16d240242911bd45fb47f97f3330ffa4bd1d88a61d91df3
SHA512e33f56b337b4738336df535ee301f390631f1107353a50183c9b57e9c1cdfa4b07c2984053da7dda5e1c1b3673de4ae3f7afb5b08ecb0d01f65b41d233bfaa21
-
Filesize
255KB
MD5ce6cafa5b8ec7247e2d224678c718b5d
SHA10690c3fc2b24c9db1c8fda6cc1ff2a1bd4f2ada0
SHA2565d61d5ef22418026d16d240242911bd45fb47f97f3330ffa4bd1d88a61d91df3
SHA512e33f56b337b4738336df535ee301f390631f1107353a50183c9b57e9c1cdfa4b07c2984053da7dda5e1c1b3673de4ae3f7afb5b08ecb0d01f65b41d233bfaa21
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5a031b6c456eeed0846d8fcc6306ef926
SHA119976dcf9e145dcea483742d18f2a1f330747c63
SHA25657ea6f94f1b45953ccc26cd5093b6023ae192a3f28f91759cf516a1c4125c0dc
SHA512cab1ec9406937755bed8bb614366012c4c8566751f13f831c676ea7ed29bba4c91c26a0a745ae8897771937277994929fee711fe763be24a66b4112018ca6804
-
Filesize
255KB
MD5a031b6c456eeed0846d8fcc6306ef926
SHA119976dcf9e145dcea483742d18f2a1f330747c63
SHA25657ea6f94f1b45953ccc26cd5093b6023ae192a3f28f91759cf516a1c4125c0dc
SHA512cab1ec9406937755bed8bb614366012c4c8566751f13f831c676ea7ed29bba4c91c26a0a745ae8897771937277994929fee711fe763be24a66b4112018ca6804
-
Filesize
255KB
MD50732cd7c3a8ee5a52bf8ed37d00e6b2c
SHA114f25984c8c99e9d33b2171adf03e2e4d37be480
SHA256499123a64aa4f699423899895c0856cde71ba61b0c0be33880286e1f9bd8bf1f
SHA512e15d476786f408a07d8b771c19820b74ef36412411ba9036c34766675f585579bcc1e7ee6fcf10d7739d25de3210f0855bd55f5a8912656d5ffb1e1614ccaad4
-
Filesize
255KB
MD54309e7ef5780d5292b5c739dcf8daad7
SHA13171e20ba6a238ef90a753665052548e04ec28aa
SHA256ea6fdaab3f1cb36522260ccf10cf7cf07288bfed3db2fae589992ae1e7b2fd92
SHA512b5777c6a38817c2f5353590556aa5bd528e301d1040a0352068dc027f46313ca791c20702bc8be9dde6740798a0cd0743ea764db46e63c2ba083fcfe255c2a9c
-
Filesize
255KB
MD54309e7ef5780d5292b5c739dcf8daad7
SHA13171e20ba6a238ef90a753665052548e04ec28aa
SHA256ea6fdaab3f1cb36522260ccf10cf7cf07288bfed3db2fae589992ae1e7b2fd92
SHA512b5777c6a38817c2f5353590556aa5bd528e301d1040a0352068dc027f46313ca791c20702bc8be9dde6740798a0cd0743ea764db46e63c2ba083fcfe255c2a9c
-
Filesize
255KB
MD5ce6cafa5b8ec7247e2d224678c718b5d
SHA10690c3fc2b24c9db1c8fda6cc1ff2a1bd4f2ada0
SHA2565d61d5ef22418026d16d240242911bd45fb47f97f3330ffa4bd1d88a61d91df3
SHA512e33f56b337b4738336df535ee301f390631f1107353a50183c9b57e9c1cdfa4b07c2984053da7dda5e1c1b3673de4ae3f7afb5b08ecb0d01f65b41d233bfaa21