Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
271s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 01:53
Behavioral task
behavioral1
Sample
0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe
Resource
win10v2004-20221111-en
General
-
Target
0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe
-
Size
255KB
-
MD5
a7bacf197f0261d4a029e9a7a95ee93e
-
SHA1
7613042c9aa1f9cb49ddcb590262efa4c3b93d1c
-
SHA256
0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2
-
SHA512
0dcef6e6271c7617ec36e2b1c00ff07c70889b3584383f861f8427b6fda1d45d2ac3829beb95d089f98af24d38e6b87b13c405f3b373c25847767317bb115b90
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJc:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" nbpiijotmt.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" nbpiijotmt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" nbpiijotmt.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nbpiijotmt.exe -
Executes dropped EXE 5 IoCs
pid Process 1480 nbpiijotmt.exe 1160 kxttppsqamflzei.exe 316 xsnsoxmk.exe 1800 hflpawmtmfcwy.exe 432 xsnsoxmk.exe -
resource yara_rule behavioral1/memory/628-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000a000000013a0e-56.dat upx behavioral1/memory/628-57-0x0000000003310000-0x00000000033B0000-memory.dmp upx behavioral1/memory/628-58-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000a000000013a0e-61.dat upx behavioral1/files/0x000800000001412f-60.dat upx behavioral1/files/0x000800000001412f-65.dat upx behavioral1/files/0x000700000001415d-64.dat upx behavioral1/files/0x000700000001415d-70.dat upx behavioral1/files/0x000800000001412f-69.dat upx behavioral1/files/0x0007000000014240-68.dat upx behavioral1/files/0x000a000000013a0e-76.dat upx behavioral1/files/0x0007000000014240-73.dat upx behavioral1/files/0x0007000000014240-79.dat upx behavioral1/memory/1480-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000700000001415d-80.dat upx behavioral1/memory/1160-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/316-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1800-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000700000001415d-84.dat upx behavioral1/files/0x000700000001415d-86.dat upx behavioral1/memory/628-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/432-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1480-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1800-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/316-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1160-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/432-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000014874-104.dat upx -
Loads dropped DLL 5 IoCs
pid Process 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 1480 nbpiijotmt.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" nbpiijotmt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run kxttppsqamflzei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yytnpzht = "nbpiijotmt.exe" kxttppsqamflzei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dluhtmqi = "kxttppsqamflzei.exe" kxttppsqamflzei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "hflpawmtmfcwy.exe" kxttppsqamflzei.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\x: xsnsoxmk.exe File opened (read-only) \??\r: nbpiijotmt.exe File opened (read-only) \??\u: xsnsoxmk.exe File opened (read-only) \??\a: xsnsoxmk.exe File opened (read-only) \??\l: xsnsoxmk.exe File opened (read-only) \??\o: xsnsoxmk.exe File opened (read-only) \??\q: xsnsoxmk.exe File opened (read-only) \??\u: xsnsoxmk.exe File opened (read-only) \??\x: xsnsoxmk.exe File opened (read-only) \??\y: xsnsoxmk.exe File opened (read-only) \??\b: xsnsoxmk.exe File opened (read-only) \??\i: xsnsoxmk.exe File opened (read-only) \??\t: xsnsoxmk.exe File opened (read-only) \??\g: nbpiijotmt.exe File opened (read-only) \??\i: nbpiijotmt.exe File opened (read-only) \??\v: xsnsoxmk.exe File opened (read-only) \??\e: xsnsoxmk.exe File opened (read-only) \??\z: xsnsoxmk.exe File opened (read-only) \??\f: nbpiijotmt.exe File opened (read-only) \??\n: xsnsoxmk.exe File opened (read-only) \??\p: xsnsoxmk.exe File opened (read-only) \??\g: xsnsoxmk.exe File opened (read-only) \??\q: nbpiijotmt.exe File opened (read-only) \??\s: nbpiijotmt.exe File opened (read-only) \??\x: nbpiijotmt.exe File opened (read-only) \??\y: nbpiijotmt.exe File opened (read-only) \??\e: xsnsoxmk.exe File opened (read-only) \??\t: xsnsoxmk.exe File opened (read-only) \??\g: xsnsoxmk.exe File opened (read-only) \??\n: xsnsoxmk.exe File opened (read-only) \??\a: nbpiijotmt.exe File opened (read-only) \??\l: nbpiijotmt.exe File opened (read-only) \??\l: xsnsoxmk.exe File opened (read-only) \??\v: nbpiijotmt.exe File opened (read-only) \??\b: xsnsoxmk.exe File opened (read-only) \??\s: xsnsoxmk.exe File opened (read-only) \??\b: nbpiijotmt.exe File opened (read-only) \??\j: nbpiijotmt.exe File opened (read-only) \??\p: nbpiijotmt.exe File opened (read-only) \??\w: nbpiijotmt.exe File opened (read-only) \??\j: xsnsoxmk.exe File opened (read-only) \??\r: xsnsoxmk.exe File opened (read-only) \??\h: xsnsoxmk.exe File opened (read-only) \??\w: xsnsoxmk.exe File opened (read-only) \??\e: nbpiijotmt.exe File opened (read-only) \??\z: nbpiijotmt.exe File opened (read-only) \??\f: xsnsoxmk.exe File opened (read-only) \??\r: xsnsoxmk.exe File opened (read-only) \??\i: xsnsoxmk.exe File opened (read-only) \??\k: xsnsoxmk.exe File opened (read-only) \??\k: xsnsoxmk.exe File opened (read-only) \??\h: nbpiijotmt.exe File opened (read-only) \??\m: nbpiijotmt.exe File opened (read-only) \??\n: nbpiijotmt.exe File opened (read-only) \??\o: nbpiijotmt.exe File opened (read-only) \??\t: nbpiijotmt.exe File opened (read-only) \??\o: xsnsoxmk.exe File opened (read-only) \??\q: xsnsoxmk.exe File opened (read-only) \??\w: xsnsoxmk.exe File opened (read-only) \??\z: xsnsoxmk.exe File opened (read-only) \??\h: xsnsoxmk.exe File opened (read-only) \??\s: xsnsoxmk.exe File opened (read-only) \??\v: xsnsoxmk.exe File opened (read-only) \??\y: xsnsoxmk.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" nbpiijotmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" nbpiijotmt.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/628-58-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/628-75-0x0000000003310000-0x00000000033B0000-memory.dmp autoit_exe behavioral1/memory/1480-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1160-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/316-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1800-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/628-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/432-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1480-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1800-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/316-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1160-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1480-102-0x0000000003840000-0x00000000038E0000-memory.dmp autoit_exe behavioral1/memory/432-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nbpiijotmt.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File created C:\Windows\SysWOW64\kxttppsqamflzei.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File opened for modification C:\Windows\SysWOW64\kxttppsqamflzei.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File created C:\Windows\SysWOW64\xsnsoxmk.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File opened for modification C:\Windows\SysWOW64\xsnsoxmk.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File created C:\Windows\SysWOW64\hflpawmtmfcwy.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File opened for modification C:\Windows\SysWOW64\hflpawmtmfcwy.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll nbpiijotmt.exe File created C:\Windows\SysWOW64\nbpiijotmt.exe 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsnsoxmk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsnsoxmk.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xsnsoxmk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsnsoxmk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsnsoxmk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xsnsoxmk.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" nbpiijotmt.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh nbpiijotmt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" nbpiijotmt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat nbpiijotmt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF9FFF8482C826A9140D6207DE7BC90E144594167446242D69D" 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" nbpiijotmt.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1988 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 1160 kxttppsqamflzei.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1160 kxttppsqamflzei.exe 1800 hflpawmtmfcwy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1160 kxttppsqamflzei.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1480 nbpiijotmt.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 1800 hflpawmtmfcwy.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 316 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe 432 xsnsoxmk.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 WINWORD.EXE 1988 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 628 wrote to memory of 1480 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 28 PID 628 wrote to memory of 1480 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 28 PID 628 wrote to memory of 1480 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 28 PID 628 wrote to memory of 1480 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 28 PID 628 wrote to memory of 1160 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 29 PID 628 wrote to memory of 1160 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 29 PID 628 wrote to memory of 1160 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 29 PID 628 wrote to memory of 1160 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 29 PID 628 wrote to memory of 316 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 30 PID 628 wrote to memory of 316 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 30 PID 628 wrote to memory of 316 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 30 PID 628 wrote to memory of 316 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 30 PID 628 wrote to memory of 1800 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 31 PID 628 wrote to memory of 1800 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 31 PID 628 wrote to memory of 1800 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 31 PID 628 wrote to memory of 1800 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 31 PID 1480 wrote to memory of 432 1480 nbpiijotmt.exe 32 PID 1480 wrote to memory of 432 1480 nbpiijotmt.exe 32 PID 1480 wrote to memory of 432 1480 nbpiijotmt.exe 32 PID 1480 wrote to memory of 432 1480 nbpiijotmt.exe 32 PID 628 wrote to memory of 1988 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 33 PID 628 wrote to memory of 1988 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 33 PID 628 wrote to memory of 1988 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 33 PID 628 wrote to memory of 1988 628 0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe 33 PID 1988 wrote to memory of 1684 1988 WINWORD.EXE 37 PID 1988 wrote to memory of 1684 1988 WINWORD.EXE 37 PID 1988 wrote to memory of 1684 1988 WINWORD.EXE 37 PID 1988 wrote to memory of 1684 1988 WINWORD.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe"C:\Users\Admin\AppData\Local\Temp\0f51db151b22045867f53874c2c80d458cef06e87c9b2c16aed3d889ddeea8d2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\nbpiijotmt.exenbpiijotmt.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\xsnsoxmk.exeC:\Windows\system32\xsnsoxmk.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:432
-
-
-
C:\Windows\SysWOW64\kxttppsqamflzei.exekxttppsqamflzei.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1160
-
-
C:\Windows\SysWOW64\xsnsoxmk.exexsnsoxmk.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:316
-
-
C:\Windows\SysWOW64\hflpawmtmfcwy.exehflpawmtmfcwy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1800
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1684
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD53f5f977ff5f0b9e7d896afee28126db6
SHA15f49f31ef0bc01a86b1da5e36b71bd0145ccfe97
SHA2567d4f4b7686051e6bd0eb1bcbbfe304ad7cb07af4793fdeb2f78d93b9a221e913
SHA512251ce0231cc824649f1bf23b4fa0350349cbc99cd41189af94547c962cf0b6a6e2a4275d0141a79a7213130b11e1db9635d5e79f92554d71bfdb079cebc36da7
-
Filesize
255KB
MD50d7a8955b5ccef4ce37c887b0ec2c5e7
SHA17f0b2e8c828601ba729755dc9513b93d6f21ad83
SHA25695d2faffe544c0b71ca979c4e0e5d28033c03080d9ca61a43dfb75c04cd71ce5
SHA5126578ec7a0abec92633aa9668b8b08e85cd96e78f4a09546a6bdff549aefd43bb98e443cf19902b03572fdab43f9e5b32345e370d1f2fae988c15c23c72e21e89
-
Filesize
255KB
MD50d7a8955b5ccef4ce37c887b0ec2c5e7
SHA17f0b2e8c828601ba729755dc9513b93d6f21ad83
SHA25695d2faffe544c0b71ca979c4e0e5d28033c03080d9ca61a43dfb75c04cd71ce5
SHA5126578ec7a0abec92633aa9668b8b08e85cd96e78f4a09546a6bdff549aefd43bb98e443cf19902b03572fdab43f9e5b32345e370d1f2fae988c15c23c72e21e89
-
Filesize
255KB
MD50d9bfd41f1aac884f42e5a8f82d296a9
SHA1e4b4590369cb1afc5204022af0e42f85e1399503
SHA2562a5de9cf1e6680bef18f6f596427bd7d71f6d76a52fd06bbb582120033c33db4
SHA51211d75fa437ffc5759e64acfa5f2428da7e2aa53324f38ecee1c1bc0c7911fc948d2a277939fa71f79f6af9dcdce88619a1680da45c864cf890fd0b6e118492c7
-
Filesize
255KB
MD50d9bfd41f1aac884f42e5a8f82d296a9
SHA1e4b4590369cb1afc5204022af0e42f85e1399503
SHA2562a5de9cf1e6680bef18f6f596427bd7d71f6d76a52fd06bbb582120033c33db4
SHA51211d75fa437ffc5759e64acfa5f2428da7e2aa53324f38ecee1c1bc0c7911fc948d2a277939fa71f79f6af9dcdce88619a1680da45c864cf890fd0b6e118492c7
-
Filesize
255KB
MD5f3c63838819205fd5e9b98360622ee29
SHA1c731e117059ea091495c051dd10562c63ead2f7b
SHA256928d00439666c69d8a2be31b25f6b367945fda5b868dec027c65c1c6fd2cfe82
SHA51293a86acbc8da28a27ade64317f02c4f5069421b1c82387b5089e3b1e872129c41b1faeb823e6849e978511032aa64fc195a96feeb24ab76bc7ef37ef74ce2394
-
Filesize
255KB
MD5f3c63838819205fd5e9b98360622ee29
SHA1c731e117059ea091495c051dd10562c63ead2f7b
SHA256928d00439666c69d8a2be31b25f6b367945fda5b868dec027c65c1c6fd2cfe82
SHA51293a86acbc8da28a27ade64317f02c4f5069421b1c82387b5089e3b1e872129c41b1faeb823e6849e978511032aa64fc195a96feeb24ab76bc7ef37ef74ce2394
-
Filesize
255KB
MD5968aa214e935053d17e5e8349e057eec
SHA1801eab0d4499a7368925ae16c8a39e42c333a5a0
SHA25648647253fdb42c60d62836b1562616e92e5e69579220b8c1ff133970a144219d
SHA5127108552d0307cc3d0b295ac86e113d8771aad47563a80fb499445179f8b59396095cb1cea27b9412bcd927658f162cd0702c04dcd297f93917323140fdecc300
-
Filesize
255KB
MD5968aa214e935053d17e5e8349e057eec
SHA1801eab0d4499a7368925ae16c8a39e42c333a5a0
SHA25648647253fdb42c60d62836b1562616e92e5e69579220b8c1ff133970a144219d
SHA5127108552d0307cc3d0b295ac86e113d8771aad47563a80fb499445179f8b59396095cb1cea27b9412bcd927658f162cd0702c04dcd297f93917323140fdecc300
-
Filesize
255KB
MD5968aa214e935053d17e5e8349e057eec
SHA1801eab0d4499a7368925ae16c8a39e42c333a5a0
SHA25648647253fdb42c60d62836b1562616e92e5e69579220b8c1ff133970a144219d
SHA5127108552d0307cc3d0b295ac86e113d8771aad47563a80fb499445179f8b59396095cb1cea27b9412bcd927658f162cd0702c04dcd297f93917323140fdecc300
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD50d7a8955b5ccef4ce37c887b0ec2c5e7
SHA17f0b2e8c828601ba729755dc9513b93d6f21ad83
SHA25695d2faffe544c0b71ca979c4e0e5d28033c03080d9ca61a43dfb75c04cd71ce5
SHA5126578ec7a0abec92633aa9668b8b08e85cd96e78f4a09546a6bdff549aefd43bb98e443cf19902b03572fdab43f9e5b32345e370d1f2fae988c15c23c72e21e89
-
Filesize
255KB
MD50d9bfd41f1aac884f42e5a8f82d296a9
SHA1e4b4590369cb1afc5204022af0e42f85e1399503
SHA2562a5de9cf1e6680bef18f6f596427bd7d71f6d76a52fd06bbb582120033c33db4
SHA51211d75fa437ffc5759e64acfa5f2428da7e2aa53324f38ecee1c1bc0c7911fc948d2a277939fa71f79f6af9dcdce88619a1680da45c864cf890fd0b6e118492c7
-
Filesize
255KB
MD5f3c63838819205fd5e9b98360622ee29
SHA1c731e117059ea091495c051dd10562c63ead2f7b
SHA256928d00439666c69d8a2be31b25f6b367945fda5b868dec027c65c1c6fd2cfe82
SHA51293a86acbc8da28a27ade64317f02c4f5069421b1c82387b5089e3b1e872129c41b1faeb823e6849e978511032aa64fc195a96feeb24ab76bc7ef37ef74ce2394
-
Filesize
255KB
MD5968aa214e935053d17e5e8349e057eec
SHA1801eab0d4499a7368925ae16c8a39e42c333a5a0
SHA25648647253fdb42c60d62836b1562616e92e5e69579220b8c1ff133970a144219d
SHA5127108552d0307cc3d0b295ac86e113d8771aad47563a80fb499445179f8b59396095cb1cea27b9412bcd927658f162cd0702c04dcd297f93917323140fdecc300
-
Filesize
255KB
MD5968aa214e935053d17e5e8349e057eec
SHA1801eab0d4499a7368925ae16c8a39e42c333a5a0
SHA25648647253fdb42c60d62836b1562616e92e5e69579220b8c1ff133970a144219d
SHA5127108552d0307cc3d0b295ac86e113d8771aad47563a80fb499445179f8b59396095cb1cea27b9412bcd927658f162cd0702c04dcd297f93917323140fdecc300