Analysis
-
max time kernel
152s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 23:18
Behavioral task
behavioral1
Sample
8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe
Resource
win7-20220812-en
General
-
Target
8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe
-
Size
255KB
-
MD5
be2c3da93d7355c5063efa0b5f879736
-
SHA1
20f538db1f9b3c9d3095e5a911b04e0db8da7092
-
SHA256
8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a
-
SHA512
a6996918304b702312f4f399fcbd5aa068815503e042b4fed73aff78f12690efb746d764ccd1a4c477475d091dbbf0b6a4716c2c1ddc931249304a30fea9d6b0
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJe:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mqudhyzqym.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mqudhyzqym.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mqudhyzqym.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" mqudhyzqym.exe -
Executes dropped EXE 5 IoCs
pid Process 1340 mqudhyzqym.exe 744 rrzmionlkmnfdcj.exe 1164 fhfkpsmf.exe 1316 kaoqatqvoeqzm.exe 1948 fhfkpsmf.exe -
resource yara_rule behavioral1/memory/904-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/files/0x000a0000000122ea-60.dat upx behavioral1/files/0x00140000000054ab-61.dat upx behavioral1/files/0x00080000000122ef-65.dat upx behavioral1/files/0x000a0000000122ea-63.dat upx behavioral1/files/0x000a0000000122ea-68.dat upx behavioral1/files/0x00080000000122ef-67.dat upx behavioral1/files/0x00080000000122f0-70.dat upx behavioral1/files/0x00080000000122ef-71.dat upx behavioral1/files/0x00080000000122f0-73.dat upx behavioral1/files/0x00080000000122f0-75.dat upx behavioral1/memory/1340-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/744-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1316-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00080000000122ef-81.dat upx behavioral1/files/0x00080000000122ef-83.dat upx behavioral1/memory/1948-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/904-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1340-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/744-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1164-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1316-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1948-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/904-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012310-104.dat upx behavioral1/files/0x0008000000012317-105.dat upx behavioral1/files/0x0008000000012317-106.dat upx -
Loads dropped DLL 5 IoCs
pid Process 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 1340 mqudhyzqym.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mqudhyzqym.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run rrzmionlkmnfdcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yaekknwv = "mqudhyzqym.exe" rrzmionlkmnfdcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\qqyexlmj = "rrzmionlkmnfdcj.exe" rrzmionlkmnfdcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "kaoqatqvoeqzm.exe" rrzmionlkmnfdcj.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: fhfkpsmf.exe File opened (read-only) \??\y: fhfkpsmf.exe File opened (read-only) \??\s: mqudhyzqym.exe File opened (read-only) \??\w: mqudhyzqym.exe File opened (read-only) \??\x: mqudhyzqym.exe File opened (read-only) \??\o: fhfkpsmf.exe File opened (read-only) \??\r: fhfkpsmf.exe File opened (read-only) \??\i: fhfkpsmf.exe File opened (read-only) \??\l: mqudhyzqym.exe File opened (read-only) \??\a: fhfkpsmf.exe File opened (read-only) \??\y: fhfkpsmf.exe File opened (read-only) \??\b: fhfkpsmf.exe File opened (read-only) \??\l: fhfkpsmf.exe File opened (read-only) \??\n: fhfkpsmf.exe File opened (read-only) \??\z: fhfkpsmf.exe File opened (read-only) \??\o: mqudhyzqym.exe File opened (read-only) \??\v: mqudhyzqym.exe File opened (read-only) \??\j: fhfkpsmf.exe File opened (read-only) \??\i: mqudhyzqym.exe File opened (read-only) \??\m: mqudhyzqym.exe File opened (read-only) \??\r: mqudhyzqym.exe File opened (read-only) \??\u: mqudhyzqym.exe File opened (read-only) \??\b: fhfkpsmf.exe File opened (read-only) \??\s: fhfkpsmf.exe File opened (read-only) \??\n: mqudhyzqym.exe File opened (read-only) \??\w: fhfkpsmf.exe File opened (read-only) \??\k: fhfkpsmf.exe File opened (read-only) \??\n: fhfkpsmf.exe File opened (read-only) \??\p: fhfkpsmf.exe File opened (read-only) \??\t: fhfkpsmf.exe File opened (read-only) \??\v: fhfkpsmf.exe File opened (read-only) \??\u: fhfkpsmf.exe File opened (read-only) \??\v: fhfkpsmf.exe File opened (read-only) \??\a: fhfkpsmf.exe File opened (read-only) \??\f: fhfkpsmf.exe File opened (read-only) \??\g: fhfkpsmf.exe File opened (read-only) \??\r: fhfkpsmf.exe File opened (read-only) \??\b: mqudhyzqym.exe File opened (read-only) \??\e: mqudhyzqym.exe File opened (read-only) \??\o: fhfkpsmf.exe File opened (read-only) \??\h: fhfkpsmf.exe File opened (read-only) \??\p: fhfkpsmf.exe File opened (read-only) \??\g: mqudhyzqym.exe File opened (read-only) \??\p: mqudhyzqym.exe File opened (read-only) \??\f: fhfkpsmf.exe File opened (read-only) \??\g: fhfkpsmf.exe File opened (read-only) \??\j: fhfkpsmf.exe File opened (read-only) \??\t: fhfkpsmf.exe File opened (read-only) \??\l: fhfkpsmf.exe File opened (read-only) \??\x: fhfkpsmf.exe File opened (read-only) \??\k: mqudhyzqym.exe File opened (read-only) \??\t: mqudhyzqym.exe File opened (read-only) \??\m: fhfkpsmf.exe File opened (read-only) \??\q: fhfkpsmf.exe File opened (read-only) \??\s: fhfkpsmf.exe File opened (read-only) \??\u: fhfkpsmf.exe File opened (read-only) \??\y: mqudhyzqym.exe File opened (read-only) \??\z: mqudhyzqym.exe File opened (read-only) \??\k: fhfkpsmf.exe File opened (read-only) \??\e: fhfkpsmf.exe File opened (read-only) \??\h: fhfkpsmf.exe File opened (read-only) \??\q: fhfkpsmf.exe File opened (read-only) \??\f: mqudhyzqym.exe File opened (read-only) \??\h: mqudhyzqym.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" mqudhyzqym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" mqudhyzqym.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/904-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/904-76-0x0000000003300000-0x00000000033A0000-memory.dmp autoit_exe behavioral1/memory/1340-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/744-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1164-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1316-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1948-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/904-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1340-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/744-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1164-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1316-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1948-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/904-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mqudhyzqym.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File created C:\Windows\SysWOW64\rrzmionlkmnfdcj.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File opened for modification C:\Windows\SysWOW64\rrzmionlkmnfdcj.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File opened for modification C:\Windows\SysWOW64\fhfkpsmf.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File opened for modification C:\Windows\SysWOW64\kaoqatqvoeqzm.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll mqudhyzqym.exe File created C:\Windows\SysWOW64\mqudhyzqym.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File created C:\Windows\SysWOW64\kaoqatqvoeqzm.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File created C:\Windows\SysWOW64\fhfkpsmf.exe 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fhfkpsmf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fhfkpsmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fhfkpsmf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fhfkpsmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fhfkpsmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal fhfkpsmf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe fhfkpsmf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal fhfkpsmf.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB6B15B479339E952CEB9D13298D7B9" 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat mqudhyzqym.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" mqudhyzqym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" mqudhyzqym.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf mqudhyzqym.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 596 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 744 rrzmionlkmnfdcj.exe 1316 kaoqatqvoeqzm.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 1340 mqudhyzqym.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 744 rrzmionlkmnfdcj.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1164 fhfkpsmf.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1316 kaoqatqvoeqzm.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe 1948 fhfkpsmf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 596 WINWORD.EXE 596 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 904 wrote to memory of 1340 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 28 PID 904 wrote to memory of 1340 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 28 PID 904 wrote to memory of 1340 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 28 PID 904 wrote to memory of 1340 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 28 PID 904 wrote to memory of 744 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 29 PID 904 wrote to memory of 744 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 29 PID 904 wrote to memory of 744 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 29 PID 904 wrote to memory of 744 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 29 PID 904 wrote to memory of 1164 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 30 PID 904 wrote to memory of 1164 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 30 PID 904 wrote to memory of 1164 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 30 PID 904 wrote to memory of 1164 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 30 PID 904 wrote to memory of 1316 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 31 PID 904 wrote to memory of 1316 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 31 PID 904 wrote to memory of 1316 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 31 PID 904 wrote to memory of 1316 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 31 PID 1340 wrote to memory of 1948 1340 mqudhyzqym.exe 32 PID 1340 wrote to memory of 1948 1340 mqudhyzqym.exe 32 PID 1340 wrote to memory of 1948 1340 mqudhyzqym.exe 32 PID 1340 wrote to memory of 1948 1340 mqudhyzqym.exe 32 PID 904 wrote to memory of 596 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 33 PID 904 wrote to memory of 596 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 33 PID 904 wrote to memory of 596 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 33 PID 904 wrote to memory of 596 904 8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe 33 PID 596 wrote to memory of 1876 596 WINWORD.EXE 37 PID 596 wrote to memory of 1876 596 WINWORD.EXE 37 PID 596 wrote to memory of 1876 596 WINWORD.EXE 37 PID 596 wrote to memory of 1876 596 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe"C:\Users\Admin\AppData\Local\Temp\8a2c9b999745ac56dfe0c83eb989878ca28fbbab44928c5286cc288218cdbe2a.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\mqudhyzqym.exemqudhyzqym.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\fhfkpsmf.exeC:\Windows\system32\fhfkpsmf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1948
-
-
-
C:\Windows\SysWOW64\rrzmionlkmnfdcj.exerrzmionlkmnfdcj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:744
-
-
C:\Windows\SysWOW64\fhfkpsmf.exefhfkpsmf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1164
-
-
C:\Windows\SysWOW64\kaoqatqvoeqzm.exekaoqatqvoeqzm.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1316
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1876
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5dff7bb4b78bb721f85fbd2c27c2eecdb
SHA136500bd097ee102994750f44072888fbe2f84eb1
SHA25696177db61b874b0eb5eb342d0d73b2aefc9de5761cbef1d2734ef9dec845516e
SHA5123bc3c220c167e63324a0c4e5f3a902ef4027969e11647a919fd5414b083c9bf565927137123f943abfa5e9acf86e636fca36e44407091c9c7240b83051c1a10f
-
Filesize
255KB
MD5ea5aa56dc6967897e2ddc89f65ecc4f9
SHA11904e8a71e843c538935c0ae8ef2bc7e45c01841
SHA256b6409843a34c9846840ed0a4eca43b6bfe198e709b750fede2623ed9eccc61c1
SHA5120ca9ec292ef6868cc77e5827654351210bb9932c805d9a47913e00611c910ebc7eff0db987111151ae24d68a589ac6034663b3e2008e9e9a9827fbc3049b3e3e
-
Filesize
255KB
MD5f796d1761b5365a75d6327dcb23142b8
SHA127ced19580317af609a3818a1a9c93791d9a6745
SHA25618d80479f9b684a1f9d4dcc4a81cadb73e72f201a0f572634ab3044a89a33624
SHA51296ce76fa9527696079a05cffb4a0580d51d471d60bb249996e4fcc6a5cb226800d1d1c53e74d8fb671780cbefa5d77437f91ddeb74af06f3f98e8279fde45e13
-
Filesize
255KB
MD5f796d1761b5365a75d6327dcb23142b8
SHA127ced19580317af609a3818a1a9c93791d9a6745
SHA25618d80479f9b684a1f9d4dcc4a81cadb73e72f201a0f572634ab3044a89a33624
SHA51296ce76fa9527696079a05cffb4a0580d51d471d60bb249996e4fcc6a5cb226800d1d1c53e74d8fb671780cbefa5d77437f91ddeb74af06f3f98e8279fde45e13
-
Filesize
255KB
MD5f796d1761b5365a75d6327dcb23142b8
SHA127ced19580317af609a3818a1a9c93791d9a6745
SHA25618d80479f9b684a1f9d4dcc4a81cadb73e72f201a0f572634ab3044a89a33624
SHA51296ce76fa9527696079a05cffb4a0580d51d471d60bb249996e4fcc6a5cb226800d1d1c53e74d8fb671780cbefa5d77437f91ddeb74af06f3f98e8279fde45e13
-
Filesize
255KB
MD5ced38ed46868a2760a3e421a750a0ab9
SHA167509f225fad210b47cccea38329e7d718add387
SHA256edb78bc5fe4f279260318101029a4d012863e01667c6a985d0a81c7d445e1581
SHA51255ab005829bb7c6552f18268e73f56ba51c51c0b021469fc71822dc9cf2e88b42cffdef023e1ef978bdc50898160dfab6bce34d36b0a4ddce022b6835754f4b8
-
Filesize
255KB
MD5ced38ed46868a2760a3e421a750a0ab9
SHA167509f225fad210b47cccea38329e7d718add387
SHA256edb78bc5fe4f279260318101029a4d012863e01667c6a985d0a81c7d445e1581
SHA51255ab005829bb7c6552f18268e73f56ba51c51c0b021469fc71822dc9cf2e88b42cffdef023e1ef978bdc50898160dfab6bce34d36b0a4ddce022b6835754f4b8
-
Filesize
255KB
MD56773c9b028916aa7f30586b82c5232f5
SHA1f9de1cd6438f6f6224ff4d4137229e12b6ad1eaa
SHA256f5f058feec8bcddf262d6a5318117e69c01f9e284c6bf85c0364591ed8e6c9c0
SHA5120f134ce214c309c183cbe9a0b27447c11df659e30a62039e3d599c3ac5413859c03dcbaafcfbeafc274a2529e640da33b4b49adeff219546d7e7fafd6b8d26e4
-
Filesize
255KB
MD56773c9b028916aa7f30586b82c5232f5
SHA1f9de1cd6438f6f6224ff4d4137229e12b6ad1eaa
SHA256f5f058feec8bcddf262d6a5318117e69c01f9e284c6bf85c0364591ed8e6c9c0
SHA5120f134ce214c309c183cbe9a0b27447c11df659e30a62039e3d599c3ac5413859c03dcbaafcfbeafc274a2529e640da33b4b49adeff219546d7e7fafd6b8d26e4
-
Filesize
255KB
MD5c2152c1c4b1eb4ab409a549d8049dfc2
SHA11580e59fd23478eaa2c16b15eb908891e2d85bb5
SHA25641acde27cf692acaa07f062b1c2e9cd35486e0173d0fbe3907ce720b2af505a0
SHA51251f4ec01ea049219fd061b1ecc0e85e73f01714bbde36506f12dc49b41aa177d78f675f1b7e4ac0f9ac45a951fe4bdcf0fe4bf0835ca71305ef9f0fe08c29593
-
Filesize
255KB
MD5c2152c1c4b1eb4ab409a549d8049dfc2
SHA11580e59fd23478eaa2c16b15eb908891e2d85bb5
SHA25641acde27cf692acaa07f062b1c2e9cd35486e0173d0fbe3907ce720b2af505a0
SHA51251f4ec01ea049219fd061b1ecc0e85e73f01714bbde36506f12dc49b41aa177d78f675f1b7e4ac0f9ac45a951fe4bdcf0fe4bf0835ca71305ef9f0fe08c29593
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5ea5aa56dc6967897e2ddc89f65ecc4f9
SHA11904e8a71e843c538935c0ae8ef2bc7e45c01841
SHA256b6409843a34c9846840ed0a4eca43b6bfe198e709b750fede2623ed9eccc61c1
SHA5120ca9ec292ef6868cc77e5827654351210bb9932c805d9a47913e00611c910ebc7eff0db987111151ae24d68a589ac6034663b3e2008e9e9a9827fbc3049b3e3e
-
Filesize
255KB
MD5f796d1761b5365a75d6327dcb23142b8
SHA127ced19580317af609a3818a1a9c93791d9a6745
SHA25618d80479f9b684a1f9d4dcc4a81cadb73e72f201a0f572634ab3044a89a33624
SHA51296ce76fa9527696079a05cffb4a0580d51d471d60bb249996e4fcc6a5cb226800d1d1c53e74d8fb671780cbefa5d77437f91ddeb74af06f3f98e8279fde45e13
-
Filesize
255KB
MD5f796d1761b5365a75d6327dcb23142b8
SHA127ced19580317af609a3818a1a9c93791d9a6745
SHA25618d80479f9b684a1f9d4dcc4a81cadb73e72f201a0f572634ab3044a89a33624
SHA51296ce76fa9527696079a05cffb4a0580d51d471d60bb249996e4fcc6a5cb226800d1d1c53e74d8fb671780cbefa5d77437f91ddeb74af06f3f98e8279fde45e13
-
Filesize
255KB
MD5ced38ed46868a2760a3e421a750a0ab9
SHA167509f225fad210b47cccea38329e7d718add387
SHA256edb78bc5fe4f279260318101029a4d012863e01667c6a985d0a81c7d445e1581
SHA51255ab005829bb7c6552f18268e73f56ba51c51c0b021469fc71822dc9cf2e88b42cffdef023e1ef978bdc50898160dfab6bce34d36b0a4ddce022b6835754f4b8
-
Filesize
255KB
MD56773c9b028916aa7f30586b82c5232f5
SHA1f9de1cd6438f6f6224ff4d4137229e12b6ad1eaa
SHA256f5f058feec8bcddf262d6a5318117e69c01f9e284c6bf85c0364591ed8e6c9c0
SHA5120f134ce214c309c183cbe9a0b27447c11df659e30a62039e3d599c3ac5413859c03dcbaafcfbeafc274a2529e640da33b4b49adeff219546d7e7fafd6b8d26e4
-
Filesize
255KB
MD5c2152c1c4b1eb4ab409a549d8049dfc2
SHA11580e59fd23478eaa2c16b15eb908891e2d85bb5
SHA25641acde27cf692acaa07f062b1c2e9cd35486e0173d0fbe3907ce720b2af505a0
SHA51251f4ec01ea049219fd061b1ecc0e85e73f01714bbde36506f12dc49b41aa177d78f675f1b7e4ac0f9ac45a951fe4bdcf0fe4bf0835ca71305ef9f0fe08c29593