Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 01:34
Behavioral task
behavioral1
Sample
2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe
Resource
win10v2004-20221111-en
General
-
Target
2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe
-
Size
255KB
-
MD5
1822850d29dfc0fdbdd89d4c45c9ad0a
-
SHA1
99a2030540c86bdfa3599cbc5b19aea25abeb4bd
-
SHA256
2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3
-
SHA512
8b17a1198c601160248135696f76211626505ce69b70e823fec0fc44148fae68e01c4981603244845dc3895db4d6e70b9cef5c03faa753e160b75446dd91d422
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJg:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" xciubxkjjm.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" xciubxkjjm.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xciubxkjjm.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xciubxkjjm.exe -
Executes dropped EXE 6 IoCs
pid Process 944 xciubxkjjm.exe 2004 gmkxgantbfwpnjv.exe 1844 juvexhwf.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 1792 juvexhwf.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000b000000012311-58.dat upx behavioral1/files/0x000b000000012311-61.dat upx behavioral1/files/0x0009000000012322-63.dat upx behavioral1/files/0x000c0000000054a8-68.dat upx behavioral1/files/0x0009000000012322-75.dat upx behavioral1/memory/944-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2004-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1844-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012326-74.dat upx behavioral1/memory/1204-73-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012326-71.dat upx behavioral1/files/0x0008000000012326-69.dat upx behavioral1/memory/1372-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000b000000012311-67.dat upx behavioral1/files/0x0009000000012322-65.dat upx behavioral1/files/0x0008000000012326-84.dat upx behavioral1/files/0x0008000000012326-86.dat upx behavioral1/files/0x0009000000012322-90.dat upx behavioral1/files/0x0009000000012322-88.dat upx behavioral1/memory/1204-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/544-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1792-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/944-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2004-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1844-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1372-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/544-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1792-107-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00070000000134d5-108.dat upx behavioral1/files/0x00070000000136c6-109.dat upx behavioral1/files/0x00070000000139e2-110.dat upx -
Loads dropped DLL 6 IoCs
pid Process 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1064 cmd.exe 944 xciubxkjjm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" xciubxkjjm.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run gmkxgantbfwpnjv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\idamfisy = "xciubxkjjm.exe" gmkxgantbfwpnjv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msbepvzs = "gmkxgantbfwpnjv.exe" gmkxgantbfwpnjv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "gcvqeecpcselo.exe" gmkxgantbfwpnjv.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: xciubxkjjm.exe File opened (read-only) \??\a: juvexhwf.exe File opened (read-only) \??\p: juvexhwf.exe File opened (read-only) \??\q: juvexhwf.exe File opened (read-only) \??\t: juvexhwf.exe File opened (read-only) \??\y: juvexhwf.exe File opened (read-only) \??\r: xciubxkjjm.exe File opened (read-only) \??\h: xciubxkjjm.exe File opened (read-only) \??\f: juvexhwf.exe File opened (read-only) \??\m: juvexhwf.exe File opened (read-only) \??\o: juvexhwf.exe File opened (read-only) \??\e: juvexhwf.exe File opened (read-only) \??\r: juvexhwf.exe File opened (read-only) \??\u: juvexhwf.exe File opened (read-only) \??\m: xciubxkjjm.exe File opened (read-only) \??\n: juvexhwf.exe File opened (read-only) \??\t: juvexhwf.exe File opened (read-only) \??\g: xciubxkjjm.exe File opened (read-only) \??\t: xciubxkjjm.exe File opened (read-only) \??\x: xciubxkjjm.exe File opened (read-only) \??\e: juvexhwf.exe File opened (read-only) \??\k: juvexhwf.exe File opened (read-only) \??\k: juvexhwf.exe File opened (read-only) \??\w: juvexhwf.exe File opened (read-only) \??\x: juvexhwf.exe File opened (read-only) \??\q: xciubxkjjm.exe File opened (read-only) \??\l: juvexhwf.exe File opened (read-only) \??\z: juvexhwf.exe File opened (read-only) \??\j: xciubxkjjm.exe File opened (read-only) \??\v: juvexhwf.exe File opened (read-only) \??\x: juvexhwf.exe File opened (read-only) \??\v: juvexhwf.exe File opened (read-only) \??\f: xciubxkjjm.exe File opened (read-only) \??\w: xciubxkjjm.exe File opened (read-only) \??\j: juvexhwf.exe File opened (read-only) \??\z: juvexhwf.exe File opened (read-only) \??\h: juvexhwf.exe File opened (read-only) \??\i: juvexhwf.exe File opened (read-only) \??\w: juvexhwf.exe File opened (read-only) \??\y: juvexhwf.exe File opened (read-only) \??\s: juvexhwf.exe File opened (read-only) \??\e: xciubxkjjm.exe File opened (read-only) \??\l: xciubxkjjm.exe File opened (read-only) \??\o: xciubxkjjm.exe File opened (read-only) \??\a: juvexhwf.exe File opened (read-only) \??\j: juvexhwf.exe File opened (read-only) \??\n: juvexhwf.exe File opened (read-only) \??\o: juvexhwf.exe File opened (read-only) \??\v: xciubxkjjm.exe File opened (read-only) \??\b: juvexhwf.exe File opened (read-only) \??\p: juvexhwf.exe File opened (read-only) \??\i: xciubxkjjm.exe File opened (read-only) \??\n: xciubxkjjm.exe File opened (read-only) \??\y: xciubxkjjm.exe File opened (read-only) \??\h: juvexhwf.exe File opened (read-only) \??\r: juvexhwf.exe File opened (read-only) \??\b: juvexhwf.exe File opened (read-only) \??\i: juvexhwf.exe File opened (read-only) \??\m: juvexhwf.exe File opened (read-only) \??\q: juvexhwf.exe File opened (read-only) \??\u: juvexhwf.exe File opened (read-only) \??\f: juvexhwf.exe File opened (read-only) \??\g: juvexhwf.exe File opened (read-only) \??\g: juvexhwf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" xciubxkjjm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" xciubxkjjm.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/944-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1844-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1204-73-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1204-82-0x0000000003350000-0x00000000033F0000-memory.dmp autoit_exe behavioral1/memory/1372-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1204-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/544-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1792-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/944-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2004-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1844-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1372-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/544-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1792-107-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\xciubxkjjm.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\SysWOW64\xciubxkjjm.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\SysWOW64\gmkxgantbfwpnjv.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\SysWOW64\juvexhwf.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll xciubxkjjm.exe File created C:\Windows\SysWOW64\gmkxgantbfwpnjv.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File created C:\Windows\SysWOW64\juvexhwf.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File created C:\Windows\SysWOW64\gcvqeecpcselo.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\SysWOW64\gcvqeecpcselo.exe 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal juvexhwf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal juvexhwf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe juvexhwf.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe juvexhwf.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe juvexhwf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe juvexhwf.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184DC70B15E0DABEB9BB7FE2EC9437CA" 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh xciubxkjjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf xciubxkjjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat xciubxkjjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" xciubxkjjm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" xciubxkjjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" xciubxkjjm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32322C7B9C2082236A3E77A770562CAD7D8464AF" 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6AC9FAB9F966F291830C3B4086EE3E95B08D028B42160239E1BF42EA09D3" 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 856 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1844 juvexhwf.exe 1844 juvexhwf.exe 1844 juvexhwf.exe 1844 juvexhwf.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 1792 juvexhwf.exe 1792 juvexhwf.exe 1792 juvexhwf.exe 1792 juvexhwf.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 2004 gmkxgantbfwpnjv.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 1372 gcvqeecpcselo.exe 1844 juvexhwf.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1844 juvexhwf.exe 1844 juvexhwf.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 1792 juvexhwf.exe 1792 juvexhwf.exe 1792 juvexhwf.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 2004 gmkxgantbfwpnjv.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 944 xciubxkjjm.exe 1372 gcvqeecpcselo.exe 1844 juvexhwf.exe 1372 gcvqeecpcselo.exe 1372 gcvqeecpcselo.exe 1844 juvexhwf.exe 1844 juvexhwf.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 544 gcvqeecpcselo.exe 1792 juvexhwf.exe 1792 juvexhwf.exe 1792 juvexhwf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 856 WINWORD.EXE 856 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1204 wrote to memory of 944 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 28 PID 1204 wrote to memory of 944 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 28 PID 1204 wrote to memory of 944 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 28 PID 1204 wrote to memory of 944 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 28 PID 1204 wrote to memory of 2004 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 29 PID 1204 wrote to memory of 2004 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 29 PID 1204 wrote to memory of 2004 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 29 PID 1204 wrote to memory of 2004 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 29 PID 1204 wrote to memory of 1844 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 30 PID 1204 wrote to memory of 1844 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 30 PID 1204 wrote to memory of 1844 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 30 PID 1204 wrote to memory of 1844 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 30 PID 1204 wrote to memory of 1372 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 31 PID 1204 wrote to memory of 1372 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 31 PID 1204 wrote to memory of 1372 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 31 PID 1204 wrote to memory of 1372 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 31 PID 2004 wrote to memory of 1064 2004 gmkxgantbfwpnjv.exe 32 PID 2004 wrote to memory of 1064 2004 gmkxgantbfwpnjv.exe 32 PID 2004 wrote to memory of 1064 2004 gmkxgantbfwpnjv.exe 32 PID 2004 wrote to memory of 1064 2004 gmkxgantbfwpnjv.exe 32 PID 1064 wrote to memory of 544 1064 cmd.exe 34 PID 1064 wrote to memory of 544 1064 cmd.exe 34 PID 1064 wrote to memory of 544 1064 cmd.exe 34 PID 1064 wrote to memory of 544 1064 cmd.exe 34 PID 944 wrote to memory of 1792 944 xciubxkjjm.exe 35 PID 944 wrote to memory of 1792 944 xciubxkjjm.exe 35 PID 944 wrote to memory of 1792 944 xciubxkjjm.exe 35 PID 944 wrote to memory of 1792 944 xciubxkjjm.exe 35 PID 1204 wrote to memory of 856 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 36 PID 1204 wrote to memory of 856 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 36 PID 1204 wrote to memory of 856 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 36 PID 1204 wrote to memory of 856 1204 2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe 36 PID 856 wrote to memory of 1648 856 WINWORD.EXE 40 PID 856 wrote to memory of 1648 856 WINWORD.EXE 40 PID 856 wrote to memory of 1648 856 WINWORD.EXE 40 PID 856 wrote to memory of 1648 856 WINWORD.EXE 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe"C:\Users\Admin\AppData\Local\Temp\2768c0bf3193fcbb249f2ceb57f707a1034a198092701af95088af0eb00b34e3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\xciubxkjjm.exexciubxkjjm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\juvexhwf.exeC:\Windows\system32\juvexhwf.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1792
-
-
-
C:\Windows\SysWOW64\gmkxgantbfwpnjv.exegmkxgantbfwpnjv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd.exe /c gcvqeecpcselo.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\gcvqeecpcselo.exegcvqeecpcselo.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:544
-
-
-
-
C:\Windows\SysWOW64\juvexhwf.exejuvexhwf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1844
-
-
C:\Windows\SysWOW64\gcvqeecpcselo.exegcvqeecpcselo.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1372
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1648
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD55b1db5379fb962e105f1b3b4defbdc51
SHA14054822e664d7831657fb95767266df262b5ca3f
SHA25651a657a6132c00511662f9dcb6bff93d7a98acf144c65fd7a9d5f506c4453b18
SHA512a165b77a2766a06d0b83db0677b9bf9dd80e589a641b561d71fd6777d98b14af87e97a87e0d09903b1e3aa15286d834c81187d42b72f04d6878b0299e9d85c4b
-
Filesize
255KB
MD5eb8fcb791189bb2799c74491a32809b4
SHA1243291e3a33fa9ac769eeffd140998d521a937cc
SHA2568b58234e099a34d1ba421067a3a674153992f146c3f8e3940c6ab0be43dc6019
SHA512e5238914e018b658bb52494aea93d209cde3af97337b9987d1d58271a09fb67285045270d242220fa064b74a4aa5484b8a9735439f6491185591e069d3e40c4d
-
Filesize
255KB
MD5094bc32748b59d466e58012ef4a6dd42
SHA121ce2cdffa622d03bd9660e1f9fc54c8a233a89a
SHA256d8c0536e17aa984455e9626dd6a93303ea90b1ddf47cd030857ded49f70c1048
SHA51289486a3434da095f2094a63b2173a0f6778db8422fe325d61d46d24d4cb40abc08fd3eca7b0437ff99c26856d00aa2e22928ca2b0f6357ea7380d3797c58bf07
-
Filesize
255KB
MD5d058ecb14fb750d3e986a55ca0dc8b17
SHA1322237522dd668b8fc3c2967b1a22e95379b943a
SHA2567f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e
SHA5122151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2
-
Filesize
255KB
MD5d058ecb14fb750d3e986a55ca0dc8b17
SHA1322237522dd668b8fc3c2967b1a22e95379b943a
SHA2567f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e
SHA5122151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2
-
Filesize
255KB
MD5d058ecb14fb750d3e986a55ca0dc8b17
SHA1322237522dd668b8fc3c2967b1a22e95379b943a
SHA2567f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e
SHA5122151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2
-
Filesize
255KB
MD53d799c49cfdd93d5fa05db3eb4212d76
SHA1f21e2b8e62edd8e140b9bbe88c410aa5baec11e0
SHA256ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7
SHA512ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238
-
Filesize
255KB
MD53d799c49cfdd93d5fa05db3eb4212d76
SHA1f21e2b8e62edd8e140b9bbe88c410aa5baec11e0
SHA256ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7
SHA512ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238
-
Filesize
255KB
MD50076e4cef31a3cfec223d8b0058e13b6
SHA146b82756b60689054db1fac311fca708b29c1ed4
SHA256700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2
SHA512dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399
-
Filesize
255KB
MD50076e4cef31a3cfec223d8b0058e13b6
SHA146b82756b60689054db1fac311fca708b29c1ed4
SHA256700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2
SHA512dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399
-
Filesize
255KB
MD50076e4cef31a3cfec223d8b0058e13b6
SHA146b82756b60689054db1fac311fca708b29c1ed4
SHA256700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2
SHA512dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399
-
Filesize
255KB
MD50e224204cfbe1592d4bb05bcc5ee9e71
SHA12ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da
SHA2563953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1
SHA5126a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4
-
Filesize
255KB
MD50e224204cfbe1592d4bb05bcc5ee9e71
SHA12ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da
SHA2563953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1
SHA5126a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5d058ecb14fb750d3e986a55ca0dc8b17
SHA1322237522dd668b8fc3c2967b1a22e95379b943a
SHA2567f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e
SHA5122151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2
-
Filesize
255KB
MD5d058ecb14fb750d3e986a55ca0dc8b17
SHA1322237522dd668b8fc3c2967b1a22e95379b943a
SHA2567f3574dd55aa400278a4acd730f8707d1ee7cf6007bef968ae21b134bb49955e
SHA5122151794486f33237b7e194228242ebae38656ac7e43ef62dabb7dbcdcda3a032e897c83ff83a81a11f6264fd820f7a008a3cefa5efe5656c9ae09dd99ac36af2
-
Filesize
255KB
MD53d799c49cfdd93d5fa05db3eb4212d76
SHA1f21e2b8e62edd8e140b9bbe88c410aa5baec11e0
SHA256ae53f33f537072fb092a203d150c53a2a281a4f16a3548a3ac31fff58ecc94a7
SHA512ec12f84312bfa9e607694d053c4942aa8de65ce0db60a0326d1b2f8c2155d4aece96ac2777cd0d47548d0797a33940b579bb0d0a02d561b6663ec0e1fc0af238
-
Filesize
255KB
MD50076e4cef31a3cfec223d8b0058e13b6
SHA146b82756b60689054db1fac311fca708b29c1ed4
SHA256700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2
SHA512dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399
-
Filesize
255KB
MD50076e4cef31a3cfec223d8b0058e13b6
SHA146b82756b60689054db1fac311fca708b29c1ed4
SHA256700f60d6b166f898f7466b31e6bb53fcddb8b7973ba7a9724a0ba313a60851c2
SHA512dd2d74a2d9940faf8922de79c406b44db021aff26e23fed6925102e63c28c6225b08ddca4510a829039a3ffa30eacac3bbc31ca0012cf7ccd2046d712ea26399
-
Filesize
255KB
MD50e224204cfbe1592d4bb05bcc5ee9e71
SHA12ba6ac220e9d0458f0e7c4cf048c0aeb5d5fb0da
SHA2563953b3ee5a66991d7194bf4b264b3ea5af801b403e6a32ad33b6cf0bf83130e1
SHA5126a682d1e6a0ea5b8c0b378ef1a37fb1c9d19a1cfd4e004ebb7b209e5fa70879b1ee1b421b919e22b96130a58b9d3069428d000cad16bd1497978a65c6c5a19c4