Analysis
-
max time kernel
152s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:32
Behavioral task
behavioral1
Sample
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe
Resource
win7-20221111-en
General
-
Target
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe
-
Size
255KB
-
MD5
9f58d7d3ca12e8f3e861516fdfeba0c8
-
SHA1
fe74a5bbac92472249626fd99c9f459fa61445e0
-
SHA256
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b
-
SHA512
013439c468fc8bcf2df895c21d2ab701ae650d275baecc00046df5f634f4b47365d1bba4f1cf3356836606f7e4285deade768faa1bb72ecf7a3e8e1e20859722
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJj:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avhhhvagpv.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avhhhvagpv.exe -
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" avhhhvagpv.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" avhhhvagpv.exe -
Executes dropped EXE 5 IoCs
Processes:
avhhhvagpv.exeeihxectqygjbfpm.exesaglrsdz.exeamlcoipgxhiie.exesaglrsdz.exepid process 296 avhhhvagpv.exe 892 eihxectqygjbfpm.exe 2028 saglrsdz.exe 1484 amlcoipgxhiie.exe 292 saglrsdz.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\avhhhvagpv.exe upx C:\Windows\SysWOW64\avhhhvagpv.exe upx C:\Windows\SysWOW64\avhhhvagpv.exe upx \Windows\SysWOW64\eihxectqygjbfpm.exe upx C:\Windows\SysWOW64\eihxectqygjbfpm.exe upx \Windows\SysWOW64\saglrsdz.exe upx C:\Windows\SysWOW64\saglrsdz.exe upx \Windows\SysWOW64\amlcoipgxhiie.exe upx C:\Windows\SysWOW64\eihxectqygjbfpm.exe upx C:\Windows\SysWOW64\amlcoipgxhiie.exe upx C:\Windows\SysWOW64\saglrsdz.exe upx C:\Windows\SysWOW64\amlcoipgxhiie.exe upx behavioral1/memory/296-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/892-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2028-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1216-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1484-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx \Windows\SysWOW64\saglrsdz.exe upx C:\Windows\SysWOW64\saglrsdz.exe upx behavioral1/memory/1216-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/292-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/296-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/892-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2028-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1484-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/292-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx -
Loads dropped DLL 5 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exepid process 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 296 avhhhvagpv.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" avhhhvagpv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
eihxectqygjbfpm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "amlcoipgxhiie.exe" eihxectqygjbfpm.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run eihxectqygjbfpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xiyfqxxs = "avhhhvagpv.exe" eihxectqygjbfpm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zjzslayc = "eihxectqygjbfpm.exe" eihxectqygjbfpm.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
saglrsdz.exeavhhhvagpv.exesaglrsdz.exedescription ioc process File opened (read-only) \??\r: saglrsdz.exe File opened (read-only) \??\q: avhhhvagpv.exe File opened (read-only) \??\a: saglrsdz.exe File opened (read-only) \??\h: saglrsdz.exe File opened (read-only) \??\p: avhhhvagpv.exe File opened (read-only) \??\t: saglrsdz.exe File opened (read-only) \??\f: avhhhvagpv.exe File opened (read-only) \??\z: avhhhvagpv.exe File opened (read-only) \??\l: saglrsdz.exe File opened (read-only) \??\t: saglrsdz.exe File opened (read-only) \??\j: saglrsdz.exe File opened (read-only) \??\w: saglrsdz.exe File opened (read-only) \??\o: avhhhvagpv.exe File opened (read-only) \??\v: avhhhvagpv.exe File opened (read-only) \??\z: saglrsdz.exe File opened (read-only) \??\b: avhhhvagpv.exe File opened (read-only) \??\m: saglrsdz.exe File opened (read-only) \??\h: saglrsdz.exe File opened (read-only) \??\v: saglrsdz.exe File opened (read-only) \??\f: saglrsdz.exe File opened (read-only) \??\i: avhhhvagpv.exe File opened (read-only) \??\u: saglrsdz.exe File opened (read-only) \??\s: avhhhvagpv.exe File opened (read-only) \??\w: avhhhvagpv.exe File opened (read-only) \??\g: saglrsdz.exe File opened (read-only) \??\l: saglrsdz.exe File opened (read-only) \??\n: saglrsdz.exe File opened (read-only) \??\g: saglrsdz.exe File opened (read-only) \??\n: saglrsdz.exe File opened (read-only) \??\o: saglrsdz.exe File opened (read-only) \??\p: saglrsdz.exe File opened (read-only) \??\y: saglrsdz.exe File opened (read-only) \??\k: avhhhvagpv.exe File opened (read-only) \??\r: avhhhvagpv.exe File opened (read-only) \??\b: saglrsdz.exe File opened (read-only) \??\e: saglrsdz.exe File opened (read-only) \??\y: saglrsdz.exe File opened (read-only) \??\j: saglrsdz.exe File opened (read-only) \??\o: saglrsdz.exe File opened (read-only) \??\q: saglrsdz.exe File opened (read-only) \??\k: saglrsdz.exe File opened (read-only) \??\h: avhhhvagpv.exe File opened (read-only) \??\a: avhhhvagpv.exe File opened (read-only) \??\l: avhhhvagpv.exe File opened (read-only) \??\u: avhhhvagpv.exe File opened (read-only) \??\r: saglrsdz.exe File opened (read-only) \??\b: saglrsdz.exe File opened (read-only) \??\x: saglrsdz.exe File opened (read-only) \??\q: saglrsdz.exe File opened (read-only) \??\z: saglrsdz.exe File opened (read-only) \??\i: saglrsdz.exe File opened (read-only) \??\i: saglrsdz.exe File opened (read-only) \??\m: saglrsdz.exe File opened (read-only) \??\w: saglrsdz.exe File opened (read-only) \??\j: avhhhvagpv.exe File opened (read-only) \??\n: avhhhvagpv.exe File opened (read-only) \??\x: avhhhvagpv.exe File opened (read-only) \??\f: saglrsdz.exe File opened (read-only) \??\k: saglrsdz.exe File opened (read-only) \??\e: saglrsdz.exe File opened (read-only) \??\v: saglrsdz.exe File opened (read-only) \??\m: avhhhvagpv.exe File opened (read-only) \??\u: saglrsdz.exe File opened (read-only) \??\x: saglrsdz.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
avhhhvagpv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" avhhhvagpv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" avhhhvagpv.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/296-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/892-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2028-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1216-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1484-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1216-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/292-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/296-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/892-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2028-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1484-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/292-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exedescription ioc process File created C:\Windows\SysWOW64\avhhhvagpv.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\SysWOW64\avhhhvagpv.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\SysWOW64\eihxectqygjbfpm.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File created C:\Windows\SysWOW64\saglrsdz.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File created C:\Windows\SysWOW64\eihxectqygjbfpm.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\SysWOW64\saglrsdz.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File created C:\Windows\SysWOW64\amlcoipgxhiie.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\SysWOW64\amlcoipgxhiie.exe 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll avhhhvagpv.exe -
Drops file in Program Files directory 15 IoCs
Processes:
saglrsdz.exesaglrsdz.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal saglrsdz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe saglrsdz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal saglrsdz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal saglrsdz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe saglrsdz.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal saglrsdz.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe saglrsdz.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe saglrsdz.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXE498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exedescription ioc process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEavhhhvagpv.exe498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeexplorer.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs avhhhvagpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACFFABDF965F29183753B42819F3E90B3FD02884362033BE1C8459908A7" 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB1B12B479039EE52CCB9D132EAD4CC" 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" avhhhvagpv.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "194AC67B1491DBC3B8C87CE5EC9734CA" 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh avhhhvagpv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" avhhhvagpv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1012 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exeeihxectqygjbfpm.exesaglrsdz.exeamlcoipgxhiie.exesaglrsdz.exepid process 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 292 saglrsdz.exe 292 saglrsdz.exe 292 saglrsdz.exe 292 saglrsdz.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 892 eihxectqygjbfpm.exe 1484 amlcoipgxhiie.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: 33 1616 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1616 AUDIODG.EXE Token: 33 1616 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1616 AUDIODG.EXE Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 1704 explorer.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exeeihxectqygjbfpm.exesaglrsdz.exeamlcoipgxhiie.exesaglrsdz.exeexplorer.exepid process 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 292 saglrsdz.exe 292 saglrsdz.exe 292 saglrsdz.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious use of SendNotifyMessage 39 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exeeihxectqygjbfpm.exesaglrsdz.exeamlcoipgxhiie.exeexplorer.exepid process 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 296 avhhhvagpv.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 892 eihxectqygjbfpm.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 2028 saglrsdz.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1484 amlcoipgxhiie.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe 1704 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1012 WINWORD.EXE 1012 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exeavhhhvagpv.exeWINWORD.EXEdescription pid process target process PID 1216 wrote to memory of 296 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe avhhhvagpv.exe PID 1216 wrote to memory of 296 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe avhhhvagpv.exe PID 1216 wrote to memory of 296 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe avhhhvagpv.exe PID 1216 wrote to memory of 296 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe avhhhvagpv.exe PID 1216 wrote to memory of 892 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe eihxectqygjbfpm.exe PID 1216 wrote to memory of 892 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe eihxectqygjbfpm.exe PID 1216 wrote to memory of 892 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe eihxectqygjbfpm.exe PID 1216 wrote to memory of 892 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe eihxectqygjbfpm.exe PID 1216 wrote to memory of 2028 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe saglrsdz.exe PID 1216 wrote to memory of 2028 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe saglrsdz.exe PID 1216 wrote to memory of 2028 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe saglrsdz.exe PID 1216 wrote to memory of 2028 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe saglrsdz.exe PID 1216 wrote to memory of 1484 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe amlcoipgxhiie.exe PID 1216 wrote to memory of 1484 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe amlcoipgxhiie.exe PID 1216 wrote to memory of 1484 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe amlcoipgxhiie.exe PID 1216 wrote to memory of 1484 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe amlcoipgxhiie.exe PID 296 wrote to memory of 292 296 avhhhvagpv.exe saglrsdz.exe PID 296 wrote to memory of 292 296 avhhhvagpv.exe saglrsdz.exe PID 296 wrote to memory of 292 296 avhhhvagpv.exe saglrsdz.exe PID 296 wrote to memory of 292 296 avhhhvagpv.exe saglrsdz.exe PID 1216 wrote to memory of 1012 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe WINWORD.EXE PID 1216 wrote to memory of 1012 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe WINWORD.EXE PID 1216 wrote to memory of 1012 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe WINWORD.EXE PID 1216 wrote to memory of 1012 1216 498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe WINWORD.EXE PID 1012 wrote to memory of 1356 1012 WINWORD.EXE splwow64.exe PID 1012 wrote to memory of 1356 1012 WINWORD.EXE splwow64.exe PID 1012 wrote to memory of 1356 1012 WINWORD.EXE splwow64.exe PID 1012 wrote to memory of 1356 1012 WINWORD.EXE splwow64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe"C:\Users\Admin\AppData\Local\Temp\498afe09aec9e626c8238e232ccd3a41fbbf0c50891f038f222510bcc6c9d05b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\avhhhvagpv.exeavhhhvagpv.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\saglrsdz.exeC:\Windows\system32\saglrsdz.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:292
-
-
-
C:\Windows\SysWOW64\eihxectqygjbfpm.exeeihxectqygjbfpm.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:892
-
-
C:\Windows\SysWOW64\saglrsdz.exesaglrsdz.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2028
-
-
C:\Windows\SysWOW64\amlcoipgxhiie.exeamlcoipgxhiie.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1484
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1356
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1704
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
PID:1616
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD537bbc09d5bf1b8647adaaf47e6a2500b
SHA11dfd426d9564f09f7717617d23ccb4cd5e650259
SHA256e0ab7529ed972cd4dc5f89b19642e6366facf06db40f2d1ddc582eb5b96d5036
SHA51295a256c0cb9d595262c3a97412cea5086fb97d6f1d6d3b13b6b8c66322890804f35574ce751388fd313eefb16ef1c4639e4d0cbf8ea6297cf9c29c453fbfb3f5
-
Filesize
255KB
MD5abdee7624a6257e0cff284c03d0dd954
SHA1e999dc312b281d62a0d44251741be137e2e0939e
SHA256a278f4100d3cd705fe9685a5be422fb97d52f96392567584331965c93d07f044
SHA512aa0ee4abc6c3d3285681300b407d3e0719e5d0b3c641031dc039a65ee07d3415f733c770288fed06014c3d6f9412292d0b930dede2ab3c6cbf46ab96591393b9
-
Filesize
255KB
MD5abdee7624a6257e0cff284c03d0dd954
SHA1e999dc312b281d62a0d44251741be137e2e0939e
SHA256a278f4100d3cd705fe9685a5be422fb97d52f96392567584331965c93d07f044
SHA512aa0ee4abc6c3d3285681300b407d3e0719e5d0b3c641031dc039a65ee07d3415f733c770288fed06014c3d6f9412292d0b930dede2ab3c6cbf46ab96591393b9
-
Filesize
255KB
MD5dd138d37f94bbb3cd40e093dba09525e
SHA1f647f5803b37bcb17fd9b06533536b2491fc72b4
SHA256316b5ee8ad38b2bbe8c99f9792bd8e018cfba64c745d67637c6274326ad2e7ba
SHA51218ee7825edd1be42506b2c90535b689a2829809a5a19c056aa5424138f326910c05efc134f56ae9bd87bb423e93ae1fc4359692b97e911a6f92d2a9687efd2ad
-
Filesize
255KB
MD5dd138d37f94bbb3cd40e093dba09525e
SHA1f647f5803b37bcb17fd9b06533536b2491fc72b4
SHA256316b5ee8ad38b2bbe8c99f9792bd8e018cfba64c745d67637c6274326ad2e7ba
SHA51218ee7825edd1be42506b2c90535b689a2829809a5a19c056aa5424138f326910c05efc134f56ae9bd87bb423e93ae1fc4359692b97e911a6f92d2a9687efd2ad
-
Filesize
255KB
MD58d8c284aa718467566cd911f45a91781
SHA11414ad1f9821ff7720ab55e76d7e0ad6d279d0f9
SHA25619ce8754b56f5a57fcf8c14b023310ef37b4ca7a79c4f0f545a73ad38f8068b3
SHA512a9921e86bd7ab203b0f84ef8c47e4873a2d2829a4922fe6a5a75f7885b5124b616d8357de06eda5b6d90cb91250df5a15c96eec4751b3ce8e217a5b9830e2b07
-
Filesize
255KB
MD58d8c284aa718467566cd911f45a91781
SHA11414ad1f9821ff7720ab55e76d7e0ad6d279d0f9
SHA25619ce8754b56f5a57fcf8c14b023310ef37b4ca7a79c4f0f545a73ad38f8068b3
SHA512a9921e86bd7ab203b0f84ef8c47e4873a2d2829a4922fe6a5a75f7885b5124b616d8357de06eda5b6d90cb91250df5a15c96eec4751b3ce8e217a5b9830e2b07
-
Filesize
255KB
MD54f757799ec1728a5b12d8c7f61532012
SHA17e1711fbaa54210c19bfb54567342ee93a3f7ef2
SHA256b53d8e5c63494da1bfe5b5faa0d02330d6bb8c4f22bee22d49be0b7a39e96635
SHA512f06dd426dff48328e365a5d36dd3b110b30f5ab52452712a344fe5ea3d677ed32d31700fd86b374dae18c2aa1227fc169eef5e74cb9f46ef8c55dd455eac672a
-
Filesize
255KB
MD54f757799ec1728a5b12d8c7f61532012
SHA17e1711fbaa54210c19bfb54567342ee93a3f7ef2
SHA256b53d8e5c63494da1bfe5b5faa0d02330d6bb8c4f22bee22d49be0b7a39e96635
SHA512f06dd426dff48328e365a5d36dd3b110b30f5ab52452712a344fe5ea3d677ed32d31700fd86b374dae18c2aa1227fc169eef5e74cb9f46ef8c55dd455eac672a
-
Filesize
255KB
MD54f757799ec1728a5b12d8c7f61532012
SHA17e1711fbaa54210c19bfb54567342ee93a3f7ef2
SHA256b53d8e5c63494da1bfe5b5faa0d02330d6bb8c4f22bee22d49be0b7a39e96635
SHA512f06dd426dff48328e365a5d36dd3b110b30f5ab52452712a344fe5ea3d677ed32d31700fd86b374dae18c2aa1227fc169eef5e74cb9f46ef8c55dd455eac672a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5abdee7624a6257e0cff284c03d0dd954
SHA1e999dc312b281d62a0d44251741be137e2e0939e
SHA256a278f4100d3cd705fe9685a5be422fb97d52f96392567584331965c93d07f044
SHA512aa0ee4abc6c3d3285681300b407d3e0719e5d0b3c641031dc039a65ee07d3415f733c770288fed06014c3d6f9412292d0b930dede2ab3c6cbf46ab96591393b9
-
Filesize
255KB
MD5dd138d37f94bbb3cd40e093dba09525e
SHA1f647f5803b37bcb17fd9b06533536b2491fc72b4
SHA256316b5ee8ad38b2bbe8c99f9792bd8e018cfba64c745d67637c6274326ad2e7ba
SHA51218ee7825edd1be42506b2c90535b689a2829809a5a19c056aa5424138f326910c05efc134f56ae9bd87bb423e93ae1fc4359692b97e911a6f92d2a9687efd2ad
-
Filesize
255KB
MD58d8c284aa718467566cd911f45a91781
SHA11414ad1f9821ff7720ab55e76d7e0ad6d279d0f9
SHA25619ce8754b56f5a57fcf8c14b023310ef37b4ca7a79c4f0f545a73ad38f8068b3
SHA512a9921e86bd7ab203b0f84ef8c47e4873a2d2829a4922fe6a5a75f7885b5124b616d8357de06eda5b6d90cb91250df5a15c96eec4751b3ce8e217a5b9830e2b07
-
Filesize
255KB
MD54f757799ec1728a5b12d8c7f61532012
SHA17e1711fbaa54210c19bfb54567342ee93a3f7ef2
SHA256b53d8e5c63494da1bfe5b5faa0d02330d6bb8c4f22bee22d49be0b7a39e96635
SHA512f06dd426dff48328e365a5d36dd3b110b30f5ab52452712a344fe5ea3d677ed32d31700fd86b374dae18c2aa1227fc169eef5e74cb9f46ef8c55dd455eac672a
-
Filesize
255KB
MD54f757799ec1728a5b12d8c7f61532012
SHA17e1711fbaa54210c19bfb54567342ee93a3f7ef2
SHA256b53d8e5c63494da1bfe5b5faa0d02330d6bb8c4f22bee22d49be0b7a39e96635
SHA512f06dd426dff48328e365a5d36dd3b110b30f5ab52452712a344fe5ea3d677ed32d31700fd86b374dae18c2aa1227fc169eef5e74cb9f46ef8c55dd455eac672a