Analysis
-
max time kernel
153s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:06
Behavioral task
behavioral1
Sample
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
Resource
win10v2004-20221111-en
General
-
Target
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe
-
Size
255KB
-
MD5
fe0dd9cb32d051ea951039e26bb4caaa
-
SHA1
480ad468a290f7742f985ef8e7e7faa671ee8ac2
-
SHA256
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7
-
SHA512
730feb5233dd5e3ad1532d5fd179005e90c21dde18d6b3a289e6f696f14583f8557517bf8f84ac881adfb2fe298d8e7b137232b98d79183aa983382405c8aa77
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJh:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI8
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" jprfdlehcq.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jprfdlehcq.exe -
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" jprfdlehcq.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" jprfdlehcq.exe -
Executes dropped EXE 5 IoCs
Processes:
jprfdlehcq.exewbrcenuwnlhlggd.exexckneoxgovcqr.exegkpomctv.exegkpomctv.exepid process 1176 jprfdlehcq.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 896 gkpomctv.exe 1496 gkpomctv.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\jprfdlehcq.exe upx \Windows\SysWOW64\wbrcenuwnlhlggd.exe upx C:\Windows\SysWOW64\jprfdlehcq.exe upx C:\Windows\SysWOW64\jprfdlehcq.exe upx C:\Windows\SysWOW64\wbrcenuwnlhlggd.exe upx C:\Windows\SysWOW64\wbrcenuwnlhlggd.exe upx \Windows\SysWOW64\gkpomctv.exe upx behavioral1/memory/1224-71-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\xckneoxgovcqr.exe upx C:\Windows\SysWOW64\gkpomctv.exe upx C:\Windows\SysWOW64\gkpomctv.exe upx \Windows\SysWOW64\gkpomctv.exe upx C:\Windows\SysWOW64\xckneoxgovcqr.exe upx \Windows\SysWOW64\xckneoxgovcqr.exe upx C:\Windows\SysWOW64\gkpomctv.exe upx behavioral1/memory/1176-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/520-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/896-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1248-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1496-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1224-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1176-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/520-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/896-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1248-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.execmd.exejprfdlehcq.exepid process 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1508 cmd.exe 1176 jprfdlehcq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" jprfdlehcq.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wbrcenuwnlhlggd.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wbrcenuwnlhlggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\keqkppzs = "jprfdlehcq.exe" wbrcenuwnlhlggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ukuagjeo = "wbrcenuwnlhlggd.exe" wbrcenuwnlhlggd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xckneoxgovcqr.exe" wbrcenuwnlhlggd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
jprfdlehcq.exegkpomctv.exegkpomctv.exedescription ioc process File opened (read-only) \??\a: jprfdlehcq.exe File opened (read-only) \??\u: jprfdlehcq.exe File opened (read-only) \??\w: jprfdlehcq.exe File opened (read-only) \??\z: gkpomctv.exe File opened (read-only) \??\f: jprfdlehcq.exe File opened (read-only) \??\h: jprfdlehcq.exe File opened (read-only) \??\i: jprfdlehcq.exe File opened (read-only) \??\j: jprfdlehcq.exe File opened (read-only) \??\b: gkpomctv.exe File opened (read-only) \??\i: gkpomctv.exe File opened (read-only) \??\r: gkpomctv.exe File opened (read-only) \??\g: jprfdlehcq.exe File opened (read-only) \??\k: jprfdlehcq.exe File opened (read-only) \??\l: jprfdlehcq.exe File opened (read-only) \??\v: gkpomctv.exe File opened (read-only) \??\h: gkpomctv.exe File opened (read-only) \??\s: gkpomctv.exe File opened (read-only) \??\x: gkpomctv.exe File opened (read-only) \??\y: gkpomctv.exe File opened (read-only) \??\a: gkpomctv.exe File opened (read-only) \??\w: gkpomctv.exe File opened (read-only) \??\h: gkpomctv.exe File opened (read-only) \??\j: gkpomctv.exe File opened (read-only) \??\k: gkpomctv.exe File opened (read-only) \??\e: gkpomctv.exe File opened (read-only) \??\f: gkpomctv.exe File opened (read-only) \??\y: gkpomctv.exe File opened (read-only) \??\p: jprfdlehcq.exe File opened (read-only) \??\u: gkpomctv.exe File opened (read-only) \??\w: gkpomctv.exe File opened (read-only) \??\o: jprfdlehcq.exe File opened (read-only) \??\q: jprfdlehcq.exe File opened (read-only) \??\l: gkpomctv.exe File opened (read-only) \??\p: gkpomctv.exe File opened (read-only) \??\q: gkpomctv.exe File opened (read-only) \??\m: jprfdlehcq.exe File opened (read-only) \??\v: jprfdlehcq.exe File opened (read-only) \??\u: gkpomctv.exe File opened (read-only) \??\j: gkpomctv.exe File opened (read-only) \??\o: gkpomctv.exe File opened (read-only) \??\y: jprfdlehcq.exe File opened (read-only) \??\s: gkpomctv.exe File opened (read-only) \??\x: gkpomctv.exe File opened (read-only) \??\z: gkpomctv.exe File opened (read-only) \??\b: gkpomctv.exe File opened (read-only) \??\t: gkpomctv.exe File opened (read-only) \??\b: jprfdlehcq.exe File opened (read-only) \??\t: jprfdlehcq.exe File opened (read-only) \??\a: gkpomctv.exe File opened (read-only) \??\m: gkpomctv.exe File opened (read-only) \??\p: gkpomctv.exe File opened (read-only) \??\i: gkpomctv.exe File opened (read-only) \??\l: gkpomctv.exe File opened (read-only) \??\x: jprfdlehcq.exe File opened (read-only) \??\f: gkpomctv.exe File opened (read-only) \??\n: gkpomctv.exe File opened (read-only) \??\o: gkpomctv.exe File opened (read-only) \??\e: jprfdlehcq.exe File opened (read-only) \??\e: gkpomctv.exe File opened (read-only) \??\g: gkpomctv.exe File opened (read-only) \??\q: gkpomctv.exe File opened (read-only) \??\g: gkpomctv.exe File opened (read-only) \??\m: gkpomctv.exe File opened (read-only) \??\n: gkpomctv.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
jprfdlehcq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" jprfdlehcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" jprfdlehcq.exe -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1224-71-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1176-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/520-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/896-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1248-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1496-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1224-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1176-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/520-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/896-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1248-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exejprfdlehcq.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wbrcenuwnlhlggd.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\xckneoxgovcqr.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll jprfdlehcq.exe File created C:\Windows\SysWOW64\jprfdlehcq.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\wbrcenuwnlhlggd.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\gkpomctv.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\xckneoxgovcqr.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\SysWOW64\jprfdlehcq.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File created C:\Windows\SysWOW64\gkpomctv.exe 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe -
Drops file in Program Files directory 16 IoCs
Processes:
gkpomctv.exegkpomctv.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gkpomctv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe gkpomctv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal gkpomctv.exe -
Drops file in Windows directory 4 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exeWINWORD.EXEjprfdlehcq.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7836BB0FF1C21AAD10BD1D58B089010" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF9FFFF482B851F913DD7287E9DBD95E13D58416744623FD6ED" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh jprfdlehcq.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1945C67A14E7DAC5B8BA7C97EDE234C6" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BC9FACDFE16F1E383753B30819E3E96B08102F84360034CE1C942E708D5" 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf jprfdlehcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 624 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exejprfdlehcq.exewbrcenuwnlhlggd.exexckneoxgovcqr.exegkpomctv.exegkpomctv.exepid process 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1496 gkpomctv.exe 1496 gkpomctv.exe 1496 gkpomctv.exe 1496 gkpomctv.exe 896 gkpomctv.exe 896 gkpomctv.exe 896 gkpomctv.exe 896 gkpomctv.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe Token: SeShutdownPrivilege 1676 explorer.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exejprfdlehcq.exewbrcenuwnlhlggd.exexckneoxgovcqr.exegkpomctv.exegkpomctv.exeexplorer.exepid process 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 896 gkpomctv.exe 896 gkpomctv.exe 896 gkpomctv.exe 1496 gkpomctv.exe 1496 gkpomctv.exe 1496 gkpomctv.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exejprfdlehcq.exewbrcenuwnlhlggd.exexckneoxgovcqr.exeexplorer.exepid process 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 1176 jprfdlehcq.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 520 wbrcenuwnlhlggd.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1248 xckneoxgovcqr.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe 1676 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 624 WINWORD.EXE 624 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exewbrcenuwnlhlggd.execmd.exejprfdlehcq.exeWINWORD.EXEdescription pid process target process PID 1224 wrote to memory of 1176 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe jprfdlehcq.exe PID 1224 wrote to memory of 1176 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe jprfdlehcq.exe PID 1224 wrote to memory of 1176 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe jprfdlehcq.exe PID 1224 wrote to memory of 1176 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe jprfdlehcq.exe PID 1224 wrote to memory of 520 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wbrcenuwnlhlggd.exe PID 1224 wrote to memory of 520 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wbrcenuwnlhlggd.exe PID 1224 wrote to memory of 520 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wbrcenuwnlhlggd.exe PID 1224 wrote to memory of 520 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe wbrcenuwnlhlggd.exe PID 520 wrote to memory of 1508 520 wbrcenuwnlhlggd.exe cmd.exe PID 520 wrote to memory of 1508 520 wbrcenuwnlhlggd.exe cmd.exe PID 520 wrote to memory of 1508 520 wbrcenuwnlhlggd.exe cmd.exe PID 520 wrote to memory of 1508 520 wbrcenuwnlhlggd.exe cmd.exe PID 1224 wrote to memory of 896 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe gkpomctv.exe PID 1224 wrote to memory of 896 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe gkpomctv.exe PID 1224 wrote to memory of 896 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe gkpomctv.exe PID 1224 wrote to memory of 896 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe gkpomctv.exe PID 1508 wrote to memory of 1248 1508 cmd.exe xckneoxgovcqr.exe PID 1508 wrote to memory of 1248 1508 cmd.exe xckneoxgovcqr.exe PID 1508 wrote to memory of 1248 1508 cmd.exe xckneoxgovcqr.exe PID 1508 wrote to memory of 1248 1508 cmd.exe xckneoxgovcqr.exe PID 1176 wrote to memory of 1496 1176 jprfdlehcq.exe gkpomctv.exe PID 1176 wrote to memory of 1496 1176 jprfdlehcq.exe gkpomctv.exe PID 1176 wrote to memory of 1496 1176 jprfdlehcq.exe gkpomctv.exe PID 1176 wrote to memory of 1496 1176 jprfdlehcq.exe gkpomctv.exe PID 1224 wrote to memory of 624 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE PID 1224 wrote to memory of 624 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE PID 1224 wrote to memory of 624 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE PID 1224 wrote to memory of 624 1224 236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe WINWORD.EXE PID 624 wrote to memory of 1624 624 WINWORD.EXE splwow64.exe PID 624 wrote to memory of 1624 624 WINWORD.EXE splwow64.exe PID 624 wrote to memory of 1624 624 WINWORD.EXE splwow64.exe PID 624 wrote to memory of 1624 624 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe"C:\Users\Admin\AppData\Local\Temp\236f632c6d7ef073225c01a49f554c7b56604e1895bd097522e9dc7a510822e7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\jprfdlehcq.exejprfdlehcq.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\gkpomctv.exeC:\Windows\system32\gkpomctv.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1496
-
-
-
C:\Windows\SysWOW64\wbrcenuwnlhlggd.exewbrcenuwnlhlggd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.execmd.exe /c xckneoxgovcqr.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\xckneoxgovcqr.exexckneoxgovcqr.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1248
-
-
-
-
C:\Windows\SysWOW64\gkpomctv.exegkpomctv.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:896
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1624
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1676
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5481⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5370582ed9df35cad0d659b49a8526f04
SHA1722eb5e9113290b54636bfc683134eb5707440b1
SHA2569e58dad5eb228f95f08e2e5b2abcc0204407b84047196d77a66e3504609cb5db
SHA512cddc424f7d8fdc41ef032ef2d367abce9ee5913cdc2a8d3d8d9e6964082a98a40b4c2ae84b08a7f10ee00019fb50f9bb77e99af828056a67c9ee60a6f7afde21
-
Filesize
255KB
MD54e9c041c33bacfd824994fc83b72466b
SHA1a841d3709e2beac2f64c79efe6dbb6578dc31588
SHA25613cc7b49f3404b45ce06db6cc7d068d6727e8ccd15bb753ed752e4dd2b10f937
SHA51211f1a3041b46ab485f51921eb1880c38eb55a4d265af9f0efd54a4b13d7d27d837d99b8e7bc0487239f14124d8ba7f0a9040726d492ab0393d48bf642a24c2e0
-
Filesize
255KB
MD518052217c8c243e88947031a5cb4006a
SHA1c12ec0a2dfb97f7a4f83b000e7ece65fadcfeea9
SHA2560d951deca6df57a8835ebe2c87025c58e711cd5dbee48eeb90bebf3e08e2ee10
SHA512ec417b3c0871bc0af25c6062387cfc832136b89252c745356c70d5d0ec179042093da170264085c9da73a315bb569dd0cd32003134ee2d65e2bfc4b5bf08de5b
-
Filesize
255KB
MD518052217c8c243e88947031a5cb4006a
SHA1c12ec0a2dfb97f7a4f83b000e7ece65fadcfeea9
SHA2560d951deca6df57a8835ebe2c87025c58e711cd5dbee48eeb90bebf3e08e2ee10
SHA512ec417b3c0871bc0af25c6062387cfc832136b89252c745356c70d5d0ec179042093da170264085c9da73a315bb569dd0cd32003134ee2d65e2bfc4b5bf08de5b
-
Filesize
255KB
MD518052217c8c243e88947031a5cb4006a
SHA1c12ec0a2dfb97f7a4f83b000e7ece65fadcfeea9
SHA2560d951deca6df57a8835ebe2c87025c58e711cd5dbee48eeb90bebf3e08e2ee10
SHA512ec417b3c0871bc0af25c6062387cfc832136b89252c745356c70d5d0ec179042093da170264085c9da73a315bb569dd0cd32003134ee2d65e2bfc4b5bf08de5b
-
Filesize
255KB
MD53c12c86d98f8f99ba7197e9134ba814f
SHA19e0b87529b8a94db1364c3469f076db2c1283744
SHA25654ea0a9faa6a1771ba88da53e8f176c1549b97178c6643636938ba58893b31f7
SHA512892bc3e7ea4a4df91b20f5dd75a7b85d11f6a20b0f53e9c0d6cbbbf1394ae97bf6c0063ffc7ac8fbaec359fbfca9099d35218af2e2841ed9ea05272ea639514e
-
Filesize
255KB
MD53c12c86d98f8f99ba7197e9134ba814f
SHA19e0b87529b8a94db1364c3469f076db2c1283744
SHA25654ea0a9faa6a1771ba88da53e8f176c1549b97178c6643636938ba58893b31f7
SHA512892bc3e7ea4a4df91b20f5dd75a7b85d11f6a20b0f53e9c0d6cbbbf1394ae97bf6c0063ffc7ac8fbaec359fbfca9099d35218af2e2841ed9ea05272ea639514e
-
Filesize
255KB
MD52cd7783dd2dc535c728f95b220a27f3c
SHA198e1264334cb727bbdea60ba2582a8829c3300b0
SHA2568914fc30b89783bf9ec7df0897eff976ac101f3c7d42fc2b2db75365cee62887
SHA512fd0dec4bd83ac04c583a5871b6336755a75643a2ca00ac3a298a14a4267f0d76865a438193a9278c01eab0e397b9fd32ae2afa2026cf080ffd2d8efcc71f4878
-
Filesize
255KB
MD52cd7783dd2dc535c728f95b220a27f3c
SHA198e1264334cb727bbdea60ba2582a8829c3300b0
SHA2568914fc30b89783bf9ec7df0897eff976ac101f3c7d42fc2b2db75365cee62887
SHA512fd0dec4bd83ac04c583a5871b6336755a75643a2ca00ac3a298a14a4267f0d76865a438193a9278c01eab0e397b9fd32ae2afa2026cf080ffd2d8efcc71f4878
-
Filesize
255KB
MD550385e50dc262d4a6d983b0eee7b2b21
SHA16c604a4c36b5856b2ab16a08b6976c9ce835794b
SHA25626af4473516f6396cc061ca683551931ec0b44213f7d8359737c504af8044e2f
SHA51254481b793ff5f044c49edc967a4943c639c0034e07c9010983a498bf38cce41ca7353ac00c4cf185477c00115a09d28a7c91331be500f3b881454e72a0c98f67
-
Filesize
255KB
MD550385e50dc262d4a6d983b0eee7b2b21
SHA16c604a4c36b5856b2ab16a08b6976c9ce835794b
SHA25626af4473516f6396cc061ca683551931ec0b44213f7d8359737c504af8044e2f
SHA51254481b793ff5f044c49edc967a4943c639c0034e07c9010983a498bf38cce41ca7353ac00c4cf185477c00115a09d28a7c91331be500f3b881454e72a0c98f67
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD518052217c8c243e88947031a5cb4006a
SHA1c12ec0a2dfb97f7a4f83b000e7ece65fadcfeea9
SHA2560d951deca6df57a8835ebe2c87025c58e711cd5dbee48eeb90bebf3e08e2ee10
SHA512ec417b3c0871bc0af25c6062387cfc832136b89252c745356c70d5d0ec179042093da170264085c9da73a315bb569dd0cd32003134ee2d65e2bfc4b5bf08de5b
-
Filesize
255KB
MD518052217c8c243e88947031a5cb4006a
SHA1c12ec0a2dfb97f7a4f83b000e7ece65fadcfeea9
SHA2560d951deca6df57a8835ebe2c87025c58e711cd5dbee48eeb90bebf3e08e2ee10
SHA512ec417b3c0871bc0af25c6062387cfc832136b89252c745356c70d5d0ec179042093da170264085c9da73a315bb569dd0cd32003134ee2d65e2bfc4b5bf08de5b
-
Filesize
255KB
MD53c12c86d98f8f99ba7197e9134ba814f
SHA19e0b87529b8a94db1364c3469f076db2c1283744
SHA25654ea0a9faa6a1771ba88da53e8f176c1549b97178c6643636938ba58893b31f7
SHA512892bc3e7ea4a4df91b20f5dd75a7b85d11f6a20b0f53e9c0d6cbbbf1394ae97bf6c0063ffc7ac8fbaec359fbfca9099d35218af2e2841ed9ea05272ea639514e
-
Filesize
255KB
MD52cd7783dd2dc535c728f95b220a27f3c
SHA198e1264334cb727bbdea60ba2582a8829c3300b0
SHA2568914fc30b89783bf9ec7df0897eff976ac101f3c7d42fc2b2db75365cee62887
SHA512fd0dec4bd83ac04c583a5871b6336755a75643a2ca00ac3a298a14a4267f0d76865a438193a9278c01eab0e397b9fd32ae2afa2026cf080ffd2d8efcc71f4878
-
Filesize
255KB
MD550385e50dc262d4a6d983b0eee7b2b21
SHA16c604a4c36b5856b2ab16a08b6976c9ce835794b
SHA25626af4473516f6396cc061ca683551931ec0b44213f7d8359737c504af8044e2f
SHA51254481b793ff5f044c49edc967a4943c639c0034e07c9010983a498bf38cce41ca7353ac00c4cf185477c00115a09d28a7c91331be500f3b881454e72a0c98f67