Analysis
-
max time kernel
154s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:07
Behavioral task
behavioral1
Sample
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe
Resource
win10v2004-20221111-en
General
-
Target
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe
-
Size
255KB
-
MD5
88f4d95cd04a4e8243ccb4c0d11bb9ca
-
SHA1
c819d5a1d9857db7f951630b774c60f62566e8d5
-
SHA256
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2
-
SHA512
5c377d65bcb89a49b348845ea012e5020c88bdbf667be132c5695f1051c5df17c94c018b5872ec9b60cb08264af539bc4da629f2030a54b5731cca8f873005c2
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJU:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIJ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ukdpefuifm.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ukdpefuifm.exe -
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ukdpefuifm.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ukdpefuifm.exe -
Executes dropped EXE 5 IoCs
Processes:
ukdpefuifm.exefilacfzbdywkdph.exerjfsmwoc.exeforvuyxwxytpo.exerjfsmwoc.exepid process 1336 ukdpefuifm.exe 676 filacfzbdywkdph.exe 660 rjfsmwoc.exe 1164 forvuyxwxytpo.exe 1260 rjfsmwoc.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\ukdpefuifm.exe upx \Windows\SysWOW64\filacfzbdywkdph.exe upx C:\Windows\SysWOW64\ukdpefuifm.exe upx C:\Windows\SysWOW64\filacfzbdywkdph.exe upx C:\Windows\SysWOW64\ukdpefuifm.exe upx \Windows\SysWOW64\rjfsmwoc.exe upx C:\Windows\SysWOW64\rjfsmwoc.exe upx \Windows\SysWOW64\forvuyxwxytpo.exe upx C:\Windows\SysWOW64\forvuyxwxytpo.exe upx C:\Windows\SysWOW64\rjfsmwoc.exe upx C:\Windows\SysWOW64\forvuyxwxytpo.exe upx C:\Windows\SysWOW64\filacfzbdywkdph.exe upx \Windows\SysWOW64\rjfsmwoc.exe upx C:\Windows\SysWOW64\rjfsmwoc.exe upx behavioral1/memory/2028-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1336-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/676-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/660-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1260-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2028-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Program Files\DisconnectStart.doc.exe upx C:\Program Files\DisconnectStart.doc.exe upx behavioral1/memory/1336-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/676-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/660-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1260-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\SplitUnprotect.doc.exe upx -
Loads dropped DLL 5 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exepid process 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 1336 ukdpefuifm.exe -
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ukdpefuifm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
filacfzbdywkdph.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qozyonsd = "ukdpefuifm.exe" filacfzbdywkdph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nejfdftt = "filacfzbdywkdph.exe" filacfzbdywkdph.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "forvuyxwxytpo.exe" filacfzbdywkdph.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run filacfzbdywkdph.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ukdpefuifm.exerjfsmwoc.exerjfsmwoc.exedescription ioc process File opened (read-only) \??\w: ukdpefuifm.exe File opened (read-only) \??\f: rjfsmwoc.exe File opened (read-only) \??\f: rjfsmwoc.exe File opened (read-only) \??\g: rjfsmwoc.exe File opened (read-only) \??\m: rjfsmwoc.exe File opened (read-only) \??\i: rjfsmwoc.exe File opened (read-only) \??\q: rjfsmwoc.exe File opened (read-only) \??\u: rjfsmwoc.exe File opened (read-only) \??\s: ukdpefuifm.exe File opened (read-only) \??\y: rjfsmwoc.exe File opened (read-only) \??\k: ukdpefuifm.exe File opened (read-only) \??\b: rjfsmwoc.exe File opened (read-only) \??\h: rjfsmwoc.exe File opened (read-only) \??\r: rjfsmwoc.exe File opened (read-only) \??\m: ukdpefuifm.exe File opened (read-only) \??\t: ukdpefuifm.exe File opened (read-only) \??\o: rjfsmwoc.exe File opened (read-only) \??\r: rjfsmwoc.exe File opened (read-only) \??\x: rjfsmwoc.exe File opened (read-only) \??\a: rjfsmwoc.exe File opened (read-only) \??\w: rjfsmwoc.exe File opened (read-only) \??\j: ukdpefuifm.exe File opened (read-only) \??\v: ukdpefuifm.exe File opened (read-only) \??\k: rjfsmwoc.exe File opened (read-only) \??\v: rjfsmwoc.exe File opened (read-only) \??\j: rjfsmwoc.exe File opened (read-only) \??\k: rjfsmwoc.exe File opened (read-only) \??\s: rjfsmwoc.exe File opened (read-only) \??\z: ukdpefuifm.exe File opened (read-only) \??\a: rjfsmwoc.exe File opened (read-only) \??\g: rjfsmwoc.exe File opened (read-only) \??\a: ukdpefuifm.exe File opened (read-only) \??\o: ukdpefuifm.exe File opened (read-only) \??\u: ukdpefuifm.exe File opened (read-only) \??\s: rjfsmwoc.exe File opened (read-only) \??\v: rjfsmwoc.exe File opened (read-only) \??\h: ukdpefuifm.exe File opened (read-only) \??\n: ukdpefuifm.exe File opened (read-only) \??\q: rjfsmwoc.exe File opened (read-only) \??\z: rjfsmwoc.exe File opened (read-only) \??\x: ukdpefuifm.exe File opened (read-only) \??\y: rjfsmwoc.exe File opened (read-only) \??\p: ukdpefuifm.exe File opened (read-only) \??\q: ukdpefuifm.exe File opened (read-only) \??\b: rjfsmwoc.exe File opened (read-only) \??\w: rjfsmwoc.exe File opened (read-only) \??\e: rjfsmwoc.exe File opened (read-only) \??\i: ukdpefuifm.exe File opened (read-only) \??\l: ukdpefuifm.exe File opened (read-only) \??\i: rjfsmwoc.exe File opened (read-only) \??\l: rjfsmwoc.exe File opened (read-only) \??\e: rjfsmwoc.exe File opened (read-only) \??\h: rjfsmwoc.exe File opened (read-only) \??\g: ukdpefuifm.exe File opened (read-only) \??\r: ukdpefuifm.exe File opened (read-only) \??\j: rjfsmwoc.exe File opened (read-only) \??\o: rjfsmwoc.exe File opened (read-only) \??\e: ukdpefuifm.exe File opened (read-only) \??\f: ukdpefuifm.exe File opened (read-only) \??\y: ukdpefuifm.exe File opened (read-only) \??\l: rjfsmwoc.exe File opened (read-only) \??\p: rjfsmwoc.exe File opened (read-only) \??\t: rjfsmwoc.exe File opened (read-only) \??\z: rjfsmwoc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
ukdpefuifm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" ukdpefuifm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" ukdpefuifm.exe -
AutoIT Executable 13 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2028-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1336-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/676-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/660-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2028-84-0x0000000003330000-0x00000000033D0000-memory.dmp autoit_exe behavioral1/memory/1164-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1260-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2028-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1336-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/676-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/660-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1260-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1164-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exedescription ioc process File created C:\Windows\SysWOW64\filacfzbdywkdph.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification C:\Windows\SysWOW64\filacfzbdywkdph.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File created C:\Windows\SysWOW64\forvuyxwxytpo.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification C:\Windows\SysWOW64\forvuyxwxytpo.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll ukdpefuifm.exe File created C:\Windows\SysWOW64\ukdpefuifm.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification C:\Windows\SysWOW64\ukdpefuifm.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File created C:\Windows\SysWOW64\rjfsmwoc.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification C:\Windows\SysWOW64\rjfsmwoc.exe 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe -
Drops file in Program Files directory 29 IoCs
Processes:
rjfsmwoc.exerjfsmwoc.exedescription ioc process File opened for modification C:\Program Files\DisconnectStart.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files\SplitUnprotect.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rjfsmwoc.exe File opened for modification C:\Program Files\DisconnectStart.nal rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe File created \??\c:\Program Files\DisconnectStart.doc.exe rjfsmwoc.exe File created \??\c:\Program Files\SplitUnprotect.doc.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files\SplitUnprotect.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files\SplitUnprotect.nal rjfsmwoc.exe File opened for modification C:\Program Files\DisconnectStart.nal rjfsmwoc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal rjfsmwoc.exe File opened for modification \??\c:\Program Files\SplitUnprotect.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rjfsmwoc.exe File opened for modification C:\Program Files\DisconnectStart.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files\SplitUnprotect.nal rjfsmwoc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rjfsmwoc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files\DisconnectStart.doc.exe rjfsmwoc.exe File opened for modification \??\c:\Program Files\DisconnectStart.doc.exe rjfsmwoc.exe File opened for modification C:\Program Files\SplitUnprotect.doc.exe rjfsmwoc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe rjfsmwoc.exe -
Drops file in Windows directory 5 IoCs
Processes:
WINWORD.EXE15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeexplorer.exedescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEexplorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXE15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB2B1204793389A53BAB9D5329AD7C5" 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ukdpefuifm.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh ukdpefuifm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ukdpefuifm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" ukdpefuifm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" ukdpefuifm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACAFABDF961F19883083B4781EA3993B08B03FD42160332E1CA459908A2" 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat ukdpefuifm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs ukdpefuifm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1432 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exerjfsmwoc.exeforvuyxwxytpo.exefilacfzbdywkdph.exerjfsmwoc.exepid process 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 1260 rjfsmwoc.exe 1260 rjfsmwoc.exe 1260 rjfsmwoc.exe 1260 rjfsmwoc.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe Token: 33 944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 944 AUDIODG.EXE Token: 33 944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 944 AUDIODG.EXE Token: SeShutdownPrivilege 1556 explorer.exe Token: SeShutdownPrivilege 1556 explorer.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exerjfsmwoc.exeforvuyxwxytpo.exefilacfzbdywkdph.exerjfsmwoc.exeexplorer.exeWINWORD.EXEpid process 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 1260 rjfsmwoc.exe 1260 rjfsmwoc.exe 1260 rjfsmwoc.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1432 WINWORD.EXE 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1432 WINWORD.EXE 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe -
Suspicious use of SendNotifyMessage 47 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exerjfsmwoc.exeforvuyxwxytpo.exefilacfzbdywkdph.exeexplorer.exepid process 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 1336 ukdpefuifm.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 660 rjfsmwoc.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 1164 forvuyxwxytpo.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 676 filacfzbdywkdph.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1432 WINWORD.EXE 1432 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exeukdpefuifm.exeWINWORD.EXEdescription pid process target process PID 2028 wrote to memory of 1336 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe ukdpefuifm.exe PID 2028 wrote to memory of 1336 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe ukdpefuifm.exe PID 2028 wrote to memory of 1336 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe ukdpefuifm.exe PID 2028 wrote to memory of 1336 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe ukdpefuifm.exe PID 2028 wrote to memory of 676 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe filacfzbdywkdph.exe PID 2028 wrote to memory of 676 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe filacfzbdywkdph.exe PID 2028 wrote to memory of 676 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe filacfzbdywkdph.exe PID 2028 wrote to memory of 676 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe filacfzbdywkdph.exe PID 2028 wrote to memory of 660 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe rjfsmwoc.exe PID 2028 wrote to memory of 660 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe rjfsmwoc.exe PID 2028 wrote to memory of 660 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe rjfsmwoc.exe PID 2028 wrote to memory of 660 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe rjfsmwoc.exe PID 2028 wrote to memory of 1164 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe forvuyxwxytpo.exe PID 2028 wrote to memory of 1164 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe forvuyxwxytpo.exe PID 2028 wrote to memory of 1164 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe forvuyxwxytpo.exe PID 2028 wrote to memory of 1164 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe forvuyxwxytpo.exe PID 1336 wrote to memory of 1260 1336 ukdpefuifm.exe rjfsmwoc.exe PID 1336 wrote to memory of 1260 1336 ukdpefuifm.exe rjfsmwoc.exe PID 1336 wrote to memory of 1260 1336 ukdpefuifm.exe rjfsmwoc.exe PID 1336 wrote to memory of 1260 1336 ukdpefuifm.exe rjfsmwoc.exe PID 2028 wrote to memory of 1432 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe WINWORD.EXE PID 2028 wrote to memory of 1432 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe WINWORD.EXE PID 2028 wrote to memory of 1432 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe WINWORD.EXE PID 2028 wrote to memory of 1432 2028 15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe WINWORD.EXE PID 1432 wrote to memory of 1888 1432 WINWORD.EXE splwow64.exe PID 1432 wrote to memory of 1888 1432 WINWORD.EXE splwow64.exe PID 1432 wrote to memory of 1888 1432 WINWORD.EXE splwow64.exe PID 1432 wrote to memory of 1888 1432 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe"C:\Users\Admin\AppData\Local\Temp\15374c0ab314edc72f35a43bfa02f56a41eb7ed98d4fc03f226b59212e201ea2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\ukdpefuifm.exeukdpefuifm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\rjfsmwoc.exeC:\Windows\system32\rjfsmwoc.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1260
-
-
-
C:\Windows\SysWOW64\filacfzbdywkdph.exefilacfzbdywkdph.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:676
-
-
C:\Windows\SysWOW64\rjfsmwoc.exerjfsmwoc.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:660
-
-
C:\Windows\SysWOW64\forvuyxwxytpo.exeforvuyxwxytpo.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1164
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1888
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1556
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5941⤵
- Suspicious use of AdjustPrivilegeToken
PID:944
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5b063423429a58cc3bda312657d9668da
SHA1aa123ccf42a5edd9c106670eb1f3778aecb2667b
SHA2565f10fb9ae50080641b1b33b5e0220778d1e3a7ac759cd601971b9b46ac4f1dc7
SHA512a7f8c78b6c2289c7e1bf7eb5a2636b55a692810b9209accf9a0c48b656279b43a32806821970114d94447d2422ad48a67d1c0d50d407b6b636d87acbca7b9ca2
-
Filesize
255KB
MD5ad3372d1ad5c6b358ed6754751ef51b1
SHA1cb3b92a46cabcf538176c842a30636f52fcf8f10
SHA256755c576cf2e6e5fc33cabfd21a32a7474aaba0019118fefd13fc9a2e8a3f047f
SHA5126c6aa2d0a4dcced0ae889ad39633ab585ae999a74052c8b5df665b057f60d1494e345f3a5b7aea5b7c1e26ed7f31997c85cf61635d8268e4029217c115e8fa96
-
Filesize
255KB
MD5eed2a64e4e75932f703f5b4ee9fea6c2
SHA1f14a4afab2bf25d284983ab85f06e1080c52e6dd
SHA25689bade0de0de60e60aea2c565a9e49ced3792be11d88be47b23c94e5b01adbf0
SHA512e72a309f47806efbdafceb49a420153f9d4eee36c3b9968ee2ecb9c08400cf9fd60cef3a0215c72c80e8872868372ebcddf3514a2ced02e31d033bc6e8c8a30d
-
Filesize
255KB
MD5eed2a64e4e75932f703f5b4ee9fea6c2
SHA1f14a4afab2bf25d284983ab85f06e1080c52e6dd
SHA25689bade0de0de60e60aea2c565a9e49ced3792be11d88be47b23c94e5b01adbf0
SHA512e72a309f47806efbdafceb49a420153f9d4eee36c3b9968ee2ecb9c08400cf9fd60cef3a0215c72c80e8872868372ebcddf3514a2ced02e31d033bc6e8c8a30d
-
Filesize
255KB
MD531cda3ab13d6528bcd0a4fd2b25f2944
SHA1ee2b4275716844e51bee44c41f8f957751339d74
SHA25603c2a5b99f68d9ebbe608f6720ad287a9d04bb5058b96de60bf281180d16a9d8
SHA512b9dd95a963919d8786f5fcef28f6dc3a3a3f78d600ab2d36cdb8332a8fb51d17bdf5f83eb4e9ac57ae5e69059ac57deb485fac89b6c7f83a5cd125d3ce131bab
-
Filesize
255KB
MD531cda3ab13d6528bcd0a4fd2b25f2944
SHA1ee2b4275716844e51bee44c41f8f957751339d74
SHA25603c2a5b99f68d9ebbe608f6720ad287a9d04bb5058b96de60bf281180d16a9d8
SHA512b9dd95a963919d8786f5fcef28f6dc3a3a3f78d600ab2d36cdb8332a8fb51d17bdf5f83eb4e9ac57ae5e69059ac57deb485fac89b6c7f83a5cd125d3ce131bab
-
Filesize
255KB
MD5e1057e9e3f391f4ce154dfbf24ab3d58
SHA1234d56c5b70c28223718428c565ebb9c6fb21d75
SHA2564478338f643c0966d1b0c9b9aa754b4a6df28205cd4684bbdd04118837e22d8a
SHA512a3bf0e84f4abc9105469954c2f45c62b5080965bfcf1f5fccd1d51023af8e05a452bfbd7156c5a26363032561209d9243ae4f08163349d17cde5933282b889e0
-
Filesize
255KB
MD5e1057e9e3f391f4ce154dfbf24ab3d58
SHA1234d56c5b70c28223718428c565ebb9c6fb21d75
SHA2564478338f643c0966d1b0c9b9aa754b4a6df28205cd4684bbdd04118837e22d8a
SHA512a3bf0e84f4abc9105469954c2f45c62b5080965bfcf1f5fccd1d51023af8e05a452bfbd7156c5a26363032561209d9243ae4f08163349d17cde5933282b889e0
-
Filesize
255KB
MD5e1057e9e3f391f4ce154dfbf24ab3d58
SHA1234d56c5b70c28223718428c565ebb9c6fb21d75
SHA2564478338f643c0966d1b0c9b9aa754b4a6df28205cd4684bbdd04118837e22d8a
SHA512a3bf0e84f4abc9105469954c2f45c62b5080965bfcf1f5fccd1d51023af8e05a452bfbd7156c5a26363032561209d9243ae4f08163349d17cde5933282b889e0
-
Filesize
255KB
MD526fd399bd21bf79d6b40d4e89e8f4979
SHA1a18c89a72c2853507b56ecb5c1d2b4d9600a2bfc
SHA256292fcf46c1fb29cf98f86e2909df205e3240df8f85e8b60e272ed2e48ae3a71c
SHA51240dc85782e018db7bc97ee491532a1c08492c3a52cdddb73b6ad12a5a1768e5c06a5fdee0dd49be5cae4e28f91a3849038bc2a9b5ad15e847e2cd3eeb2a77420
-
Filesize
255KB
MD526fd399bd21bf79d6b40d4e89e8f4979
SHA1a18c89a72c2853507b56ecb5c1d2b4d9600a2bfc
SHA256292fcf46c1fb29cf98f86e2909df205e3240df8f85e8b60e272ed2e48ae3a71c
SHA51240dc85782e018db7bc97ee491532a1c08492c3a52cdddb73b6ad12a5a1768e5c06a5fdee0dd49be5cae4e28f91a3849038bc2a9b5ad15e847e2cd3eeb2a77420
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5b063423429a58cc3bda312657d9668da
SHA1aa123ccf42a5edd9c106670eb1f3778aecb2667b
SHA2565f10fb9ae50080641b1b33b5e0220778d1e3a7ac759cd601971b9b46ac4f1dc7
SHA512a7f8c78b6c2289c7e1bf7eb5a2636b55a692810b9209accf9a0c48b656279b43a32806821970114d94447d2422ad48a67d1c0d50d407b6b636d87acbca7b9ca2
-
Filesize
255KB
MD5eed2a64e4e75932f703f5b4ee9fea6c2
SHA1f14a4afab2bf25d284983ab85f06e1080c52e6dd
SHA25689bade0de0de60e60aea2c565a9e49ced3792be11d88be47b23c94e5b01adbf0
SHA512e72a309f47806efbdafceb49a420153f9d4eee36c3b9968ee2ecb9c08400cf9fd60cef3a0215c72c80e8872868372ebcddf3514a2ced02e31d033bc6e8c8a30d
-
Filesize
255KB
MD531cda3ab13d6528bcd0a4fd2b25f2944
SHA1ee2b4275716844e51bee44c41f8f957751339d74
SHA25603c2a5b99f68d9ebbe608f6720ad287a9d04bb5058b96de60bf281180d16a9d8
SHA512b9dd95a963919d8786f5fcef28f6dc3a3a3f78d600ab2d36cdb8332a8fb51d17bdf5f83eb4e9ac57ae5e69059ac57deb485fac89b6c7f83a5cd125d3ce131bab
-
Filesize
255KB
MD5e1057e9e3f391f4ce154dfbf24ab3d58
SHA1234d56c5b70c28223718428c565ebb9c6fb21d75
SHA2564478338f643c0966d1b0c9b9aa754b4a6df28205cd4684bbdd04118837e22d8a
SHA512a3bf0e84f4abc9105469954c2f45c62b5080965bfcf1f5fccd1d51023af8e05a452bfbd7156c5a26363032561209d9243ae4f08163349d17cde5933282b889e0
-
Filesize
255KB
MD5e1057e9e3f391f4ce154dfbf24ab3d58
SHA1234d56c5b70c28223718428c565ebb9c6fb21d75
SHA2564478338f643c0966d1b0c9b9aa754b4a6df28205cd4684bbdd04118837e22d8a
SHA512a3bf0e84f4abc9105469954c2f45c62b5080965bfcf1f5fccd1d51023af8e05a452bfbd7156c5a26363032561209d9243ae4f08163349d17cde5933282b889e0
-
Filesize
255KB
MD526fd399bd21bf79d6b40d4e89e8f4979
SHA1a18c89a72c2853507b56ecb5c1d2b4d9600a2bfc
SHA256292fcf46c1fb29cf98f86e2909df205e3240df8f85e8b60e272ed2e48ae3a71c
SHA51240dc85782e018db7bc97ee491532a1c08492c3a52cdddb73b6ad12a5a1768e5c06a5fdee0dd49be5cae4e28f91a3849038bc2a9b5ad15e847e2cd3eeb2a77420