Analysis
-
max time kernel
151s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 04:08
Behavioral task
behavioral1
Sample
f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe
Resource
win7-20221111-en
General
-
Target
f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe
-
Size
255KB
-
MD5
474c424869d4fb4cb52364fc9c8e4a55
-
SHA1
62bcd14a2ae48a2e6d856948d5ecd4dc201330a7
-
SHA256
f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d
-
SHA512
10f5a5a3c1a782e96f57ae4b4337f22585fd8eac34bab89defa676c257f9dd87f6ea15c2fce91a0b44ec7836c32c0fef9b2147ef047ad6fcb9a3564c6e76928f
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJx:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIY
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" iywfxmviwh.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iywfxmviwh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" iywfxmviwh.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" iywfxmviwh.exe -
Executes dropped EXE 6 IoCs
pid Process 1744 iywfxmviwh.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1508 xxvlqvtz.exe 1876 enmrijrwflsfy.exe 796 xxvlqvtz.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/files/0x000b0000000122e6-55.dat upx behavioral1/files/0x000b0000000122e6-57.dat upx behavioral1/files/0x000a0000000122e9-58.dat upx behavioral1/files/0x000a0000000122e9-61.dat upx behavioral1/files/0x000b0000000122e6-64.dat upx behavioral1/files/0x00090000000122ed-63.dat upx behavioral1/files/0x00090000000122ed-71.dat upx behavioral1/files/0x00090000000122ed-74.dat upx behavioral1/files/0x00080000000122ee-73.dat upx behavioral1/files/0x00080000000122ee-69.dat upx behavioral1/files/0x00080000000122ee-67.dat upx behavioral1/files/0x000a0000000122e9-66.dat upx behavioral1/files/0x00080000000122ee-76.dat upx behavioral1/files/0x00080000000122ee-78.dat upx behavioral1/memory/1444-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00090000000122ed-81.dat upx behavioral1/memory/1744-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/844-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00090000000122ed-85.dat upx behavioral1/memory/1508-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1160-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1876-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1444-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/796-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012311-102.dat upx behavioral1/files/0x0008000000012311-103.dat upx behavioral1/files/0x0008000000012314-104.dat upx behavioral1/memory/1744-107-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/844-108-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1508-110-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1160-109-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1876-111-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/796-112-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1508-115-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/796-114-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1036 cmd.exe 1744 iywfxmviwh.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" iywfxmviwh.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "enmrijrwflsfy.exe" bebhqpkydinuzhd.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bebhqpkydinuzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dgnlywtg = "iywfxmviwh.exe" bebhqpkydinuzhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lssryzqo = "bebhqpkydinuzhd.exe" bebhqpkydinuzhd.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: iywfxmviwh.exe File opened (read-only) \??\b: xxvlqvtz.exe File opened (read-only) \??\z: xxvlqvtz.exe File opened (read-only) \??\h: iywfxmviwh.exe File opened (read-only) \??\l: iywfxmviwh.exe File opened (read-only) \??\w: xxvlqvtz.exe File opened (read-only) \??\i: xxvlqvtz.exe File opened (read-only) \??\r: iywfxmviwh.exe File opened (read-only) \??\m: iywfxmviwh.exe File opened (read-only) \??\t: iywfxmviwh.exe File opened (read-only) \??\u: xxvlqvtz.exe File opened (read-only) \??\v: xxvlqvtz.exe File opened (read-only) \??\j: iywfxmviwh.exe File opened (read-only) \??\k: xxvlqvtz.exe File opened (read-only) \??\f: iywfxmviwh.exe File opened (read-only) \??\q: iywfxmviwh.exe File opened (read-only) \??\y: xxvlqvtz.exe File opened (read-only) \??\g: iywfxmviwh.exe File opened (read-only) \??\h: xxvlqvtz.exe File opened (read-only) \??\q: xxvlqvtz.exe File opened (read-only) \??\r: xxvlqvtz.exe File opened (read-only) \??\m: xxvlqvtz.exe File opened (read-only) \??\s: iywfxmviwh.exe File opened (read-only) \??\t: xxvlqvtz.exe File opened (read-only) \??\a: xxvlqvtz.exe File opened (read-only) \??\f: xxvlqvtz.exe File opened (read-only) \??\a: iywfxmviwh.exe File opened (read-only) \??\a: xxvlqvtz.exe File opened (read-only) \??\e: xxvlqvtz.exe File opened (read-only) \??\v: xxvlqvtz.exe File opened (read-only) \??\b: xxvlqvtz.exe File opened (read-only) \??\k: xxvlqvtz.exe File opened (read-only) \??\o: xxvlqvtz.exe File opened (read-only) \??\i: xxvlqvtz.exe File opened (read-only) \??\u: xxvlqvtz.exe File opened (read-only) \??\b: iywfxmviwh.exe File opened (read-only) \??\j: xxvlqvtz.exe File opened (read-only) \??\n: xxvlqvtz.exe File opened (read-only) \??\p: xxvlqvtz.exe File opened (read-only) \??\s: xxvlqvtz.exe File opened (read-only) \??\x: iywfxmviwh.exe File opened (read-only) \??\f: xxvlqvtz.exe File opened (read-only) \??\g: xxvlqvtz.exe File opened (read-only) \??\q: xxvlqvtz.exe File opened (read-only) \??\e: xxvlqvtz.exe File opened (read-only) \??\p: iywfxmviwh.exe File opened (read-only) \??\n: iywfxmviwh.exe File opened (read-only) \??\w: iywfxmviwh.exe File opened (read-only) \??\l: xxvlqvtz.exe File opened (read-only) \??\o: xxvlqvtz.exe File opened (read-only) \??\y: xxvlqvtz.exe File opened (read-only) \??\l: xxvlqvtz.exe File opened (read-only) \??\x: xxvlqvtz.exe File opened (read-only) \??\w: xxvlqvtz.exe File opened (read-only) \??\m: xxvlqvtz.exe File opened (read-only) \??\p: xxvlqvtz.exe File opened (read-only) \??\j: xxvlqvtz.exe File opened (read-only) \??\e: iywfxmviwh.exe File opened (read-only) \??\u: iywfxmviwh.exe File opened (read-only) \??\v: iywfxmviwh.exe File opened (read-only) \??\z: iywfxmviwh.exe File opened (read-only) \??\x: xxvlqvtz.exe File opened (read-only) \??\h: xxvlqvtz.exe File opened (read-only) \??\z: xxvlqvtz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" iywfxmviwh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" iywfxmviwh.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1444-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1744-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/844-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1508-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1160-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1876-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1444-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/796-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1744-107-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/844-108-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1508-110-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1160-109-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1876-111-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/796-112-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1508-115-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/796-114-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iywfxmviwh.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File created C:\Windows\SysWOW64\bebhqpkydinuzhd.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File opened for modification C:\Windows\SysWOW64\bebhqpkydinuzhd.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File created C:\Windows\SysWOW64\enmrijrwflsfy.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File opened for modification C:\Windows\SysWOW64\enmrijrwflsfy.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File created C:\Windows\SysWOW64\iywfxmviwh.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File created C:\Windows\SysWOW64\xxvlqvtz.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File opened for modification C:\Windows\SysWOW64\xxvlqvtz.exe f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll iywfxmviwh.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xxvlqvtz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xxvlqvtz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xxvlqvtz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xxvlqvtz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xxvlqvtz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xxvlqvtz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xxvlqvtz.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh iywfxmviwh.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B05B449339EE52CFB9D433EAD4CC" f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33352D089D5583596D3476DD77202CD77CF264A8" f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat iywfxmviwh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EF4FF89482D82139131D72D7E97BC95E134594B66446341D69D" f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 484 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 796 xxvlqvtz.exe 796 xxvlqvtz.exe 796 xxvlqvtz.exe 796 xxvlqvtz.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe Token: 33 1116 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1116 AUDIODG.EXE Token: 33 1116 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1116 AUDIODG.EXE Token: SeShutdownPrivilege 1312 explorer.exe Token: SeShutdownPrivilege 1312 explorer.exe -
Suspicious use of FindShellTrayWindow 50 IoCs
pid Process 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 1876 enmrijrwflsfy.exe 796 xxvlqvtz.exe 796 xxvlqvtz.exe 796 xxvlqvtz.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 1744 iywfxmviwh.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 844 bebhqpkydinuzhd.exe 1160 enmrijrwflsfy.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1508 xxvlqvtz.exe 1160 enmrijrwflsfy.exe 1160 enmrijrwflsfy.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe 1312 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 484 WINWORD.EXE 484 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1744 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 28 PID 1444 wrote to memory of 1744 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 28 PID 1444 wrote to memory of 1744 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 28 PID 1444 wrote to memory of 1744 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 28 PID 1444 wrote to memory of 844 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 29 PID 1444 wrote to memory of 844 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 29 PID 1444 wrote to memory of 844 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 29 PID 1444 wrote to memory of 844 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 29 PID 1444 wrote to memory of 1508 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 30 PID 1444 wrote to memory of 1508 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 30 PID 1444 wrote to memory of 1508 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 30 PID 1444 wrote to memory of 1508 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 30 PID 1444 wrote to memory of 1160 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 31 PID 1444 wrote to memory of 1160 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 31 PID 1444 wrote to memory of 1160 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 31 PID 1444 wrote to memory of 1160 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 31 PID 844 wrote to memory of 1036 844 bebhqpkydinuzhd.exe 32 PID 844 wrote to memory of 1036 844 bebhqpkydinuzhd.exe 32 PID 844 wrote to memory of 1036 844 bebhqpkydinuzhd.exe 32 PID 844 wrote to memory of 1036 844 bebhqpkydinuzhd.exe 32 PID 1036 wrote to memory of 1876 1036 cmd.exe 34 PID 1036 wrote to memory of 1876 1036 cmd.exe 34 PID 1036 wrote to memory of 1876 1036 cmd.exe 34 PID 1036 wrote to memory of 1876 1036 cmd.exe 34 PID 1744 wrote to memory of 796 1744 iywfxmviwh.exe 35 PID 1744 wrote to memory of 796 1744 iywfxmviwh.exe 35 PID 1744 wrote to memory of 796 1744 iywfxmviwh.exe 35 PID 1744 wrote to memory of 796 1744 iywfxmviwh.exe 35 PID 1444 wrote to memory of 484 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 36 PID 1444 wrote to memory of 484 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 36 PID 1444 wrote to memory of 484 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 36 PID 1444 wrote to memory of 484 1444 f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe 36 PID 484 wrote to memory of 1096 484 WINWORD.EXE 41 PID 484 wrote to memory of 1096 484 WINWORD.EXE 41 PID 484 wrote to memory of 1096 484 WINWORD.EXE 41 PID 484 wrote to memory of 1096 484 WINWORD.EXE 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe"C:\Users\Admin\AppData\Local\Temp\f50b73e2e9ac0558771e82e5fb276626cee036f8fd9d0e2ed387aed4297b509d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\iywfxmviwh.exeiywfxmviwh.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\xxvlqvtz.exeC:\Windows\system32\xxvlqvtz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:796
-
-
-
C:\Windows\SysWOW64\bebhqpkydinuzhd.exebebhqpkydinuzhd.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.execmd.exe /c enmrijrwflsfy.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\enmrijrwflsfy.exeenmrijrwflsfy.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1876
-
-
-
-
C:\Windows\SysWOW64\xxvlqvtz.exexxvlqvtz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508
-
-
C:\Windows\SysWOW64\enmrijrwflsfy.exeenmrijrwflsfy.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1160
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1096
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1312
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5a01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1116
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5151112b0ff92ad4520391215ccf1c8f6
SHA17268107a191c7f477216d0001c11b2dce6c09462
SHA256d78315389e5161a56cf76f16322f0c82e2b5374a790cb6f2796e23d4ce7b3852
SHA51258b564440f58b4d55828da44d92743f661af28ee3045cdc1bc6b6c7f7eae07f36949c93a58c4c7b73a49e9042d4454da07811fe40c216080bde2171e4032bd93
-
Filesize
255KB
MD5151112b0ff92ad4520391215ccf1c8f6
SHA17268107a191c7f477216d0001c11b2dce6c09462
SHA256d78315389e5161a56cf76f16322f0c82e2b5374a790cb6f2796e23d4ce7b3852
SHA51258b564440f58b4d55828da44d92743f661af28ee3045cdc1bc6b6c7f7eae07f36949c93a58c4c7b73a49e9042d4454da07811fe40c216080bde2171e4032bd93
-
Filesize
255KB
MD5a081479dbe5d30fac0a99712647dd6e7
SHA12d84a5470c36d85112afda342aa05c63f2adafea
SHA256df8829f95f1b06ffe0f3f06f40fdcb00c159d3b351fdb8a7f8d2618d34d21a7f
SHA512d5c76e35fe55d99c0d42d2295c26616d6053644c9bc569ebb2951739882c92faef3e0d2f3c6fb86a88419f00feae97d992dbe08c037dd4b0a1f8ee4e922885c7
-
Filesize
255KB
MD5144d697c1849e82bf9218036e208e123
SHA183f86e5cf1e5af3b6c6ab9fc06493d61544646b7
SHA256aa3588bb43bd3fdefe364c467b17ed4632451a055717ad3b06966f93626387c8
SHA5120a94c512cb831513c62238cf07f82c57c50dcf2df73d5e160f8272f2636797b8fb9958d7a193a819dba96d16dd5a3e6eec0e8395f1dcd02327ded1a1d2864834
-
Filesize
255KB
MD5144d697c1849e82bf9218036e208e123
SHA183f86e5cf1e5af3b6c6ab9fc06493d61544646b7
SHA256aa3588bb43bd3fdefe364c467b17ed4632451a055717ad3b06966f93626387c8
SHA5120a94c512cb831513c62238cf07f82c57c50dcf2df73d5e160f8272f2636797b8fb9958d7a193a819dba96d16dd5a3e6eec0e8395f1dcd02327ded1a1d2864834
-
Filesize
255KB
MD5d68d7f1989aa923f9512807aadc4423e
SHA1ee4d8d8fc8759d9ba60533db678b1045926e9ce9
SHA256ce070b6cd84d8a4ecdc193909ebf66787ac18dcd29926224ac7c37d558b44636
SHA512b8b2c97f606936f17d56795a450a14d83bb748180b2b1e9b1358da6f620e6a8eac5189406cfa2418e82ecaf09501139685a524b0875cfc49c314b0de38160725
-
Filesize
255KB
MD5d68d7f1989aa923f9512807aadc4423e
SHA1ee4d8d8fc8759d9ba60533db678b1045926e9ce9
SHA256ce070b6cd84d8a4ecdc193909ebf66787ac18dcd29926224ac7c37d558b44636
SHA512b8b2c97f606936f17d56795a450a14d83bb748180b2b1e9b1358da6f620e6a8eac5189406cfa2418e82ecaf09501139685a524b0875cfc49c314b0de38160725
-
Filesize
255KB
MD5d68d7f1989aa923f9512807aadc4423e
SHA1ee4d8d8fc8759d9ba60533db678b1045926e9ce9
SHA256ce070b6cd84d8a4ecdc193909ebf66787ac18dcd29926224ac7c37d558b44636
SHA512b8b2c97f606936f17d56795a450a14d83bb748180b2b1e9b1358da6f620e6a8eac5189406cfa2418e82ecaf09501139685a524b0875cfc49c314b0de38160725
-
Filesize
255KB
MD553130be87b528e452e1b1376cf2bfcbd
SHA166af3626ebaae1ea9411293ebf44b50fcffcdc90
SHA256f120e206d61138949d2ad47c5ffb585eb3d9de2ddb49337f311e234770602717
SHA512283680ed6283467a08489f5b98a8dc597493210f6b609fb646faf694fe9cff9edd47f56c0804e2e15946580da03c5dc2da184e3c1b42e9245cb3fe745bb30dd8
-
Filesize
255KB
MD553130be87b528e452e1b1376cf2bfcbd
SHA166af3626ebaae1ea9411293ebf44b50fcffcdc90
SHA256f120e206d61138949d2ad47c5ffb585eb3d9de2ddb49337f311e234770602717
SHA512283680ed6283467a08489f5b98a8dc597493210f6b609fb646faf694fe9cff9edd47f56c0804e2e15946580da03c5dc2da184e3c1b42e9245cb3fe745bb30dd8
-
Filesize
255KB
MD52f98c57d290f99c9fadbcb3bce11c581
SHA13604349243097cedbfd62aa886ce5e148bebdc1e
SHA256c1a79b586e6f7f763b97e6ef2fbea8156b7b57713c65e5636d34b263f6702c5d
SHA5120c3b2cfb6d8caff97d0aae8f5b765ff2b3fd32e76ababe732c30d18ecc1c088d7008f9c30c5fbb8819e58612dad5e5461684d4d78a9677d8ca134aa3c9e79cb3
-
Filesize
255KB
MD52f98c57d290f99c9fadbcb3bce11c581
SHA13604349243097cedbfd62aa886ce5e148bebdc1e
SHA256c1a79b586e6f7f763b97e6ef2fbea8156b7b57713c65e5636d34b263f6702c5d
SHA5120c3b2cfb6d8caff97d0aae8f5b765ff2b3fd32e76ababe732c30d18ecc1c088d7008f9c30c5fbb8819e58612dad5e5461684d4d78a9677d8ca134aa3c9e79cb3
-
Filesize
255KB
MD52f98c57d290f99c9fadbcb3bce11c581
SHA13604349243097cedbfd62aa886ce5e148bebdc1e
SHA256c1a79b586e6f7f763b97e6ef2fbea8156b7b57713c65e5636d34b263f6702c5d
SHA5120c3b2cfb6d8caff97d0aae8f5b765ff2b3fd32e76ababe732c30d18ecc1c088d7008f9c30c5fbb8819e58612dad5e5461684d4d78a9677d8ca134aa3c9e79cb3
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5144d697c1849e82bf9218036e208e123
SHA183f86e5cf1e5af3b6c6ab9fc06493d61544646b7
SHA256aa3588bb43bd3fdefe364c467b17ed4632451a055717ad3b06966f93626387c8
SHA5120a94c512cb831513c62238cf07f82c57c50dcf2df73d5e160f8272f2636797b8fb9958d7a193a819dba96d16dd5a3e6eec0e8395f1dcd02327ded1a1d2864834
-
Filesize
255KB
MD5d68d7f1989aa923f9512807aadc4423e
SHA1ee4d8d8fc8759d9ba60533db678b1045926e9ce9
SHA256ce070b6cd84d8a4ecdc193909ebf66787ac18dcd29926224ac7c37d558b44636
SHA512b8b2c97f606936f17d56795a450a14d83bb748180b2b1e9b1358da6f620e6a8eac5189406cfa2418e82ecaf09501139685a524b0875cfc49c314b0de38160725
-
Filesize
255KB
MD5d68d7f1989aa923f9512807aadc4423e
SHA1ee4d8d8fc8759d9ba60533db678b1045926e9ce9
SHA256ce070b6cd84d8a4ecdc193909ebf66787ac18dcd29926224ac7c37d558b44636
SHA512b8b2c97f606936f17d56795a450a14d83bb748180b2b1e9b1358da6f620e6a8eac5189406cfa2418e82ecaf09501139685a524b0875cfc49c314b0de38160725
-
Filesize
255KB
MD553130be87b528e452e1b1376cf2bfcbd
SHA166af3626ebaae1ea9411293ebf44b50fcffcdc90
SHA256f120e206d61138949d2ad47c5ffb585eb3d9de2ddb49337f311e234770602717
SHA512283680ed6283467a08489f5b98a8dc597493210f6b609fb646faf694fe9cff9edd47f56c0804e2e15946580da03c5dc2da184e3c1b42e9245cb3fe745bb30dd8
-
Filesize
255KB
MD52f98c57d290f99c9fadbcb3bce11c581
SHA13604349243097cedbfd62aa886ce5e148bebdc1e
SHA256c1a79b586e6f7f763b97e6ef2fbea8156b7b57713c65e5636d34b263f6702c5d
SHA5120c3b2cfb6d8caff97d0aae8f5b765ff2b3fd32e76ababe732c30d18ecc1c088d7008f9c30c5fbb8819e58612dad5e5461684d4d78a9677d8ca134aa3c9e79cb3
-
Filesize
255KB
MD52f98c57d290f99c9fadbcb3bce11c581
SHA13604349243097cedbfd62aa886ce5e148bebdc1e
SHA256c1a79b586e6f7f763b97e6ef2fbea8156b7b57713c65e5636d34b263f6702c5d
SHA5120c3b2cfb6d8caff97d0aae8f5b765ff2b3fd32e76ababe732c30d18ecc1c088d7008f9c30c5fbb8819e58612dad5e5461684d4d78a9677d8ca134aa3c9e79cb3