Analysis
-
max time kernel
252s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 02:23
Behavioral task
behavioral1
Sample
ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe
Resource
win7-20221111-en
General
-
Target
ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe
-
Size
255KB
-
MD5
9a8679835552d7454daae460ea9ebda6
-
SHA1
8e1eefabbf0ea4e84ae98210483ff9ff697075b9
-
SHA256
ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed
-
SHA512
e65a769c036a7e14f622d569861474764225f8359425488bc7865c078761b060bb9953dd5249a0ec81a89abafdd5299eadef9d5a96013533720f90bd7d147245
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ7:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tqolbvalqi.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tqolbvalqi.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tqolbvalqi.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tqolbvalqi.exe -
Executes dropped EXE 5 IoCs
pid Process 984 tqolbvalqi.exe 1000 ihygmjxlrowhaat.exe 1108 xfsurdga.exe 1196 sozemkduocypu.exe 1476 xfsurdga.exe -
resource yara_rule behavioral1/files/0x000a000000012687-55.dat upx behavioral1/memory/520-56-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/520-57-0x00000000022E0000-0x0000000002380000-memory.dmp upx behavioral1/files/0x0009000000012701-60.dat upx behavioral1/files/0x00080000000131aa-63.dat upx behavioral1/files/0x000a000000012687-59.dat upx behavioral1/files/0x0009000000012701-64.dat upx behavioral1/files/0x000a000000012687-65.dat upx behavioral1/files/0x0009000000012701-67.dat upx behavioral1/files/0x00070000000132f4-70.dat upx behavioral1/files/0x00080000000131aa-69.dat upx behavioral1/files/0x00070000000132f4-73.dat upx behavioral1/files/0x00080000000131aa-75.dat upx behavioral1/files/0x00070000000132f4-76.dat upx behavioral1/files/0x00080000000131aa-77.dat upx behavioral1/files/0x00080000000131aa-79.dat upx behavioral1/memory/984-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1000-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1108-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1196-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1476-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/520-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0002000000003d1f-93.dat upx behavioral1/files/0x0007000000013a0e-97.dat upx behavioral1/memory/984-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1000-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1108-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1196-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1476-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014155-106.dat upx -
Loads dropped DLL 5 IoCs
pid Process 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 984 tqolbvalqi.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tqolbvalqi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ihygmjxlrowhaat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\figeoxvj = "tqolbvalqi.exe" ihygmjxlrowhaat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rurfvjhz = "ihygmjxlrowhaat.exe" ihygmjxlrowhaat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "sozemkduocypu.exe" ihygmjxlrowhaat.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: xfsurdga.exe File opened (read-only) \??\b: tqolbvalqi.exe File opened (read-only) \??\x: tqolbvalqi.exe File opened (read-only) \??\v: xfsurdga.exe File opened (read-only) \??\y: xfsurdga.exe File opened (read-only) \??\h: tqolbvalqi.exe File opened (read-only) \??\i: tqolbvalqi.exe File opened (read-only) \??\r: tqolbvalqi.exe File opened (read-only) \??\w: tqolbvalqi.exe File opened (read-only) \??\p: xfsurdga.exe File opened (read-only) \??\q: xfsurdga.exe File opened (read-only) \??\y: tqolbvalqi.exe File opened (read-only) \??\z: tqolbvalqi.exe File opened (read-only) \??\j: xfsurdga.exe File opened (read-only) \??\b: xfsurdga.exe File opened (read-only) \??\e: xfsurdga.exe File opened (read-only) \??\m: xfsurdga.exe File opened (read-only) \??\n: xfsurdga.exe File opened (read-only) \??\s: tqolbvalqi.exe File opened (read-only) \??\t: tqolbvalqi.exe File opened (read-only) \??\e: tqolbvalqi.exe File opened (read-only) \??\g: tqolbvalqi.exe File opened (read-only) \??\a: xfsurdga.exe File opened (read-only) \??\s: xfsurdga.exe File opened (read-only) \??\t: xfsurdga.exe File opened (read-only) \??\n: tqolbvalqi.exe File opened (read-only) \??\p: tqolbvalqi.exe File opened (read-only) \??\q: tqolbvalqi.exe File opened (read-only) \??\x: xfsurdga.exe File opened (read-only) \??\y: xfsurdga.exe File opened (read-only) \??\h: xfsurdga.exe File opened (read-only) \??\l: xfsurdga.exe File opened (read-only) \??\r: xfsurdga.exe File opened (read-only) \??\v: xfsurdga.exe File opened (read-only) \??\u: tqolbvalqi.exe File opened (read-only) \??\f: xfsurdga.exe File opened (read-only) \??\k: xfsurdga.exe File opened (read-only) \??\p: xfsurdga.exe File opened (read-only) \??\z: xfsurdga.exe File opened (read-only) \??\k: xfsurdga.exe File opened (read-only) \??\i: xfsurdga.exe File opened (read-only) \??\a: xfsurdga.exe File opened (read-only) \??\x: xfsurdga.exe File opened (read-only) \??\e: xfsurdga.exe File opened (read-only) \??\s: xfsurdga.exe File opened (read-only) \??\f: tqolbvalqi.exe File opened (read-only) \??\t: xfsurdga.exe File opened (read-only) \??\o: xfsurdga.exe File opened (read-only) \??\k: tqolbvalqi.exe File opened (read-only) \??\n: xfsurdga.exe File opened (read-only) \??\o: xfsurdga.exe File opened (read-only) \??\u: xfsurdga.exe File opened (read-only) \??\w: xfsurdga.exe File opened (read-only) \??\j: tqolbvalqi.exe File opened (read-only) \??\o: tqolbvalqi.exe File opened (read-only) \??\m: xfsurdga.exe File opened (read-only) \??\q: xfsurdga.exe File opened (read-only) \??\f: xfsurdga.exe File opened (read-only) \??\j: xfsurdga.exe File opened (read-only) \??\a: tqolbvalqi.exe File opened (read-only) \??\l: tqolbvalqi.exe File opened (read-only) \??\b: xfsurdga.exe File opened (read-only) \??\r: xfsurdga.exe File opened (read-only) \??\i: xfsurdga.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tqolbvalqi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tqolbvalqi.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/520-56-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/984-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1000-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1108-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1196-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1476-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/520-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/984-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1000-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1108-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1196-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1476-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\xfsurdga.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\SysWOW64\xfsurdga.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File created C:\Windows\SysWOW64\sozemkduocypu.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\SysWOW64\sozemkduocypu.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tqolbvalqi.exe File created C:\Windows\SysWOW64\tqolbvalqi.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\SysWOW64\tqolbvalqi.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File created C:\Windows\SysWOW64\ihygmjxlrowhaat.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\SysWOW64\ihygmjxlrowhaat.exe ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe -
Drops file in Program Files directory 28 IoCs
description ioc Process File opened for modification \??\c:\Program Files\DisconnectStart.doc.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xfsurdga.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xfsurdga.exe File created \??\c:\Program Files\DisconnectStart.doc.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xfsurdga.exe File opened for modification C:\Program Files\DisconnectStart.doc.exe xfsurdga.exe File opened for modification C:\Program Files\SplitUnprotect.doc.exe xfsurdga.exe File opened for modification \??\c:\Program Files\DisconnectStart.doc.exe xfsurdga.exe File opened for modification \??\c:\Program Files\SplitUnprotect.doc.exe xfsurdga.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xfsurdga.exe File opened for modification C:\Program Files\DisconnectStart.nal xfsurdga.exe File opened for modification C:\Program Files\DisconnectStart.doc.exe xfsurdga.exe File opened for modification C:\Program Files\SplitUnprotect.doc.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xfsurdga.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xfsurdga.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xfsurdga.exe File opened for modification C:\Program Files\DisconnectStart.nal xfsurdga.exe File opened for modification \??\c:\Program Files\SplitUnprotect.doc.exe xfsurdga.exe File created \??\c:\Program Files\SplitUnprotect.doc.exe xfsurdga.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xfsurdga.exe File opened for modification C:\Program Files\SplitUnprotect.nal xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xfsurdga.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xfsurdga.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xfsurdga.exe File opened for modification C:\Program Files\SplitUnprotect.nal xfsurdga.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf tqolbvalqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tqolbvalqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tqolbvalqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F8BFF884F2A856D9135D72C7D91BC93E13D5944664E623ED691" ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472D799C2683536A3E77D670272CAB7C8F64AB" ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tqolbvalqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABCFABCFE64F1E7837D3B4B81EC39E4B38D02FB42160348E1CF429A09D5" ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C77414E0DAC4B9B97C97ED9637BC" ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat tqolbvalqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1044 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1476 xfsurdga.exe 1476 xfsurdga.exe 1476 xfsurdga.exe 1476 xfsurdga.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1000 ihygmjxlrowhaat.exe 1196 sozemkduocypu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1476 xfsurdga.exe 1476 xfsurdga.exe 1476 xfsurdga.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 984 tqolbvalqi.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1000 ihygmjxlrowhaat.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1108 xfsurdga.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1196 sozemkduocypu.exe 1476 xfsurdga.exe 1476 xfsurdga.exe 1476 xfsurdga.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1044 WINWORD.EXE 1044 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 520 wrote to memory of 984 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 28 PID 520 wrote to memory of 984 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 28 PID 520 wrote to memory of 984 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 28 PID 520 wrote to memory of 984 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 28 PID 520 wrote to memory of 1000 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 30 PID 520 wrote to memory of 1000 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 30 PID 520 wrote to memory of 1000 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 30 PID 520 wrote to memory of 1000 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 30 PID 520 wrote to memory of 1108 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 29 PID 520 wrote to memory of 1108 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 29 PID 520 wrote to memory of 1108 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 29 PID 520 wrote to memory of 1108 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 29 PID 520 wrote to memory of 1196 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 31 PID 520 wrote to memory of 1196 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 31 PID 520 wrote to memory of 1196 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 31 PID 520 wrote to memory of 1196 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 31 PID 984 wrote to memory of 1476 984 tqolbvalqi.exe 32 PID 984 wrote to memory of 1476 984 tqolbvalqi.exe 32 PID 984 wrote to memory of 1476 984 tqolbvalqi.exe 32 PID 984 wrote to memory of 1476 984 tqolbvalqi.exe 32 PID 520 wrote to memory of 1044 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 33 PID 520 wrote to memory of 1044 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 33 PID 520 wrote to memory of 1044 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 33 PID 520 wrote to memory of 1044 520 ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe 33 PID 1044 wrote to memory of 1524 1044 WINWORD.EXE 36 PID 1044 wrote to memory of 1524 1044 WINWORD.EXE 36 PID 1044 wrote to memory of 1524 1044 WINWORD.EXE 36 PID 1044 wrote to memory of 1524 1044 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe"C:\Users\Admin\AppData\Local\Temp\ddd2484239217ffce97c08f6369cc449f4fbe70e08ed2ed8c9ec122bf0f6a7ed.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\tqolbvalqi.exetqolbvalqi.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\xfsurdga.exeC:\Windows\system32\xfsurdga.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1476
-
-
-
C:\Windows\SysWOW64\xfsurdga.exexfsurdga.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1108
-
-
C:\Windows\SysWOW64\ihygmjxlrowhaat.exeihygmjxlrowhaat.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1000
-
-
C:\Windows\SysWOW64\sozemkduocypu.exesozemkduocypu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1196
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1524
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59a976183536e9600b8962efd71334856
SHA1488ae190a99158d87367d2386f4e2a3683c49424
SHA256a8afb1254ba26c6ddd42fbaf73acbed358429c3ffe87e4eb39207582c52f6a3d
SHA5124889e598e9d841d0bdcd59c676ddd88d2d0f9ad31162dbe5fc47b661000b00fb7d1929070dd39aecac6ffb1be9e36e5435411d935e5caf537be25f41d13f2063
-
Filesize
255KB
MD589aaad1c0260551a272eef12172cc870
SHA1a2f48839d8be8058fd50abd1aa56d76e470c7b04
SHA256c6245c5a130eec4c41f4a3968368946d2dc3b041cb673a04bded110d396f179b
SHA512bde610dde20381552e4d62ce966336099833ddcbe1fce1bc42087102bd7a2dcf597bb5d8f91bb6fbfb444ce3453cc0e89faacbde57784d5931c09d077dd3b5c5
-
Filesize
255KB
MD5b8fc1dd476ff2613b00fce168b293f84
SHA13339f33753c6b47278e136106ea2af954dbcfb78
SHA256d3115b1d2aee0e30ea03a4c56a73768d05732b2045bab2a3393c64cd1ac5b622
SHA512662d4390c02a090aa9eabe4ddf561c73edf42525a508124d4e6f11659c056481c966d7b338f5edccb36907c3a645b947efab083307502212b07b3c6db681e4e6
-
Filesize
255KB
MD5f3a8612f2f78d8e8006cd8d225e5f661
SHA103c02f602d88325b6bf7f72c0f43d1f51c2e14eb
SHA256ab3619346928fe20ab7d71b550369f8ece98023a869992eb45ff78401d841d01
SHA512dfd1d1c0a972346541a8aa32f08d5b4c289fd39c962d79eff245570cf991333a3e22033cc7301b15b779750f80240168d99b0cbb9af28a24254e93722aa58db5
-
Filesize
255KB
MD5f3a8612f2f78d8e8006cd8d225e5f661
SHA103c02f602d88325b6bf7f72c0f43d1f51c2e14eb
SHA256ab3619346928fe20ab7d71b550369f8ece98023a869992eb45ff78401d841d01
SHA512dfd1d1c0a972346541a8aa32f08d5b4c289fd39c962d79eff245570cf991333a3e22033cc7301b15b779750f80240168d99b0cbb9af28a24254e93722aa58db5
-
Filesize
255KB
MD5e48ebed97c176842735f67ed32c24b8c
SHA1b660db88f821da52b9ecf7cc4d6062d75746c6c2
SHA25685eef113a32774752e0ad05308864bb6736d4759df24ea78b8153711abf51a06
SHA512b01934a2c475579de4634021b40b28498b2066d5fd75b206e78dd58e2afc0f819671c591483b2a94ec40dacbac43a56122631a20d5f109d929a14a00955bfe3f
-
Filesize
255KB
MD5e48ebed97c176842735f67ed32c24b8c
SHA1b660db88f821da52b9ecf7cc4d6062d75746c6c2
SHA25685eef113a32774752e0ad05308864bb6736d4759df24ea78b8153711abf51a06
SHA512b01934a2c475579de4634021b40b28498b2066d5fd75b206e78dd58e2afc0f819671c591483b2a94ec40dacbac43a56122631a20d5f109d929a14a00955bfe3f
-
Filesize
255KB
MD51ebf0fad812d4855d6ab56cd17e1a495
SHA1aa9caf09d6632889cebb6c3defa2663fec92ba26
SHA256466b030194fb99399c82a879866aebd45738cbc5d7cf35786626023c34ff58d9
SHA5128f3f5b14ca8d99dd2e511221215cfeebd00ef64fac2fb4abf5467d3c3dc0464b48e4c5a75b4f72136580825761a02b8596b33cb260ad221c92fa9bd96864794c
-
Filesize
255KB
MD51ebf0fad812d4855d6ab56cd17e1a495
SHA1aa9caf09d6632889cebb6c3defa2663fec92ba26
SHA256466b030194fb99399c82a879866aebd45738cbc5d7cf35786626023c34ff58d9
SHA5128f3f5b14ca8d99dd2e511221215cfeebd00ef64fac2fb4abf5467d3c3dc0464b48e4c5a75b4f72136580825761a02b8596b33cb260ad221c92fa9bd96864794c
-
Filesize
255KB
MD5c7377476ad55da1f1fb9b92524db554e
SHA16545da716ea7d1c0d935ee8831dfea66a0ad2702
SHA256a3e7bccb7ce2deabd48a525a29bc82d740086e6ad23c27b8a73a79fc0c2a160e
SHA5128574a03978547908d9bb605da4cc297149797151cc0397cd2b6cd6d53497d653131c3e0e701012e2e731894a7fcf290b68e284747e174ff3578921ad000718ea
-
Filesize
255KB
MD5c7377476ad55da1f1fb9b92524db554e
SHA16545da716ea7d1c0d935ee8831dfea66a0ad2702
SHA256a3e7bccb7ce2deabd48a525a29bc82d740086e6ad23c27b8a73a79fc0c2a160e
SHA5128574a03978547908d9bb605da4cc297149797151cc0397cd2b6cd6d53497d653131c3e0e701012e2e731894a7fcf290b68e284747e174ff3578921ad000718ea
-
Filesize
255KB
MD5c7377476ad55da1f1fb9b92524db554e
SHA16545da716ea7d1c0d935ee8831dfea66a0ad2702
SHA256a3e7bccb7ce2deabd48a525a29bc82d740086e6ad23c27b8a73a79fc0c2a160e
SHA5128574a03978547908d9bb605da4cc297149797151cc0397cd2b6cd6d53497d653131c3e0e701012e2e731894a7fcf290b68e284747e174ff3578921ad000718ea
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5f3a8612f2f78d8e8006cd8d225e5f661
SHA103c02f602d88325b6bf7f72c0f43d1f51c2e14eb
SHA256ab3619346928fe20ab7d71b550369f8ece98023a869992eb45ff78401d841d01
SHA512dfd1d1c0a972346541a8aa32f08d5b4c289fd39c962d79eff245570cf991333a3e22033cc7301b15b779750f80240168d99b0cbb9af28a24254e93722aa58db5
-
Filesize
255KB
MD5e48ebed97c176842735f67ed32c24b8c
SHA1b660db88f821da52b9ecf7cc4d6062d75746c6c2
SHA25685eef113a32774752e0ad05308864bb6736d4759df24ea78b8153711abf51a06
SHA512b01934a2c475579de4634021b40b28498b2066d5fd75b206e78dd58e2afc0f819671c591483b2a94ec40dacbac43a56122631a20d5f109d929a14a00955bfe3f
-
Filesize
255KB
MD51ebf0fad812d4855d6ab56cd17e1a495
SHA1aa9caf09d6632889cebb6c3defa2663fec92ba26
SHA256466b030194fb99399c82a879866aebd45738cbc5d7cf35786626023c34ff58d9
SHA5128f3f5b14ca8d99dd2e511221215cfeebd00ef64fac2fb4abf5467d3c3dc0464b48e4c5a75b4f72136580825761a02b8596b33cb260ad221c92fa9bd96864794c
-
Filesize
255KB
MD5c7377476ad55da1f1fb9b92524db554e
SHA16545da716ea7d1c0d935ee8831dfea66a0ad2702
SHA256a3e7bccb7ce2deabd48a525a29bc82d740086e6ad23c27b8a73a79fc0c2a160e
SHA5128574a03978547908d9bb605da4cc297149797151cc0397cd2b6cd6d53497d653131c3e0e701012e2e731894a7fcf290b68e284747e174ff3578921ad000718ea
-
Filesize
255KB
MD5c7377476ad55da1f1fb9b92524db554e
SHA16545da716ea7d1c0d935ee8831dfea66a0ad2702
SHA256a3e7bccb7ce2deabd48a525a29bc82d740086e6ad23c27b8a73a79fc0c2a160e
SHA5128574a03978547908d9bb605da4cc297149797151cc0397cd2b6cd6d53497d653131c3e0e701012e2e731894a7fcf290b68e284747e174ff3578921ad000718ea