Analysis
-
max time kernel
153s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 16:43
Behavioral task
behavioral1
Sample
47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe
Resource
win10v2004-20221111-en
General
-
Target
47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe
-
Size
255KB
-
MD5
6e68d380cc479a04cfd4574f9c3bcb9e
-
SHA1
926985370b9cba4c617ddc17c6d2b57c23dcefd5
-
SHA256
47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe
-
SHA512
54750c1a82924674e3fb708831f4e457c0294f6fc161e8da2cc6a1c8d3814402228e21c3beefc4b83751079cedc5b7beee183aea4206dceeee1732c6e1e14b6d
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJd:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" yqbeivrzlb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" yqbeivrzlb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yqbeivrzlb.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yqbeivrzlb.exe -
Executes dropped EXE 5 IoCs
pid Process 304 yqbeivrzlb.exe 1952 vfiualftcedgtak.exe 944 xgjjpiob.exe 1376 tfkztgqcthfwe.exe 2036 xgjjpiob.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-55.dat upx behavioral1/memory/1092-56-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1092-57-0x0000000002490000-0x0000000002530000-memory.dmp upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/files/0x0008000000015622-60.dat upx behavioral1/files/0x0006000000015c60-65.dat upx behavioral1/files/0x00140000000054ab-66.dat upx behavioral1/files/0x0008000000015622-63.dat upx behavioral1/files/0x0006000000015c68-68.dat upx behavioral1/files/0x0006000000015c60-70.dat upx behavioral1/files/0x0006000000015c68-72.dat upx behavioral1/files/0x0006000000015c60-74.dat upx behavioral1/files/0x0008000000015622-75.dat upx behavioral1/files/0x0006000000015c68-76.dat upx behavioral1/files/0x0006000000015c60-79.dat upx behavioral1/files/0x0006000000015c60-77.dat upx behavioral1/memory/304-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1952-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/944-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1376-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2036-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1092-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/304-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1952-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1376-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/944-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2036-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0006000000016346-103.dat upx behavioral1/files/0x00060000000165d7-104.dat upx behavioral1/files/0x00060000000165d7-105.dat upx behavioral1/memory/2036-110-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/944-111-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 304 yqbeivrzlb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" yqbeivrzlb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "tfkztgqcthfwe.exe" vfiualftcedgtak.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run vfiualftcedgtak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rwwlixwj = "yqbeivrzlb.exe" vfiualftcedgtak.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ovltmdxz = "vfiualftcedgtak.exe" vfiualftcedgtak.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: yqbeivrzlb.exe File opened (read-only) \??\g: xgjjpiob.exe File opened (read-only) \??\h: xgjjpiob.exe File opened (read-only) \??\u: xgjjpiob.exe File opened (read-only) \??\k: xgjjpiob.exe File opened (read-only) \??\h: yqbeivrzlb.exe File opened (read-only) \??\m: yqbeivrzlb.exe File opened (read-only) \??\y: yqbeivrzlb.exe File opened (read-only) \??\y: xgjjpiob.exe File opened (read-only) \??\u: xgjjpiob.exe File opened (read-only) \??\w: xgjjpiob.exe File opened (read-only) \??\q: yqbeivrzlb.exe File opened (read-only) \??\l: xgjjpiob.exe File opened (read-only) \??\q: xgjjpiob.exe File opened (read-only) \??\x: xgjjpiob.exe File opened (read-only) \??\t: xgjjpiob.exe File opened (read-only) \??\j: xgjjpiob.exe File opened (read-only) \??\n: xgjjpiob.exe File opened (read-only) \??\q: xgjjpiob.exe File opened (read-only) \??\v: xgjjpiob.exe File opened (read-only) \??\x: xgjjpiob.exe File opened (read-only) \??\l: yqbeivrzlb.exe File opened (read-only) \??\p: yqbeivrzlb.exe File opened (read-only) \??\b: xgjjpiob.exe File opened (read-only) \??\f: xgjjpiob.exe File opened (read-only) \??\k: xgjjpiob.exe File opened (read-only) \??\z: xgjjpiob.exe File opened (read-only) \??\v: yqbeivrzlb.exe File opened (read-only) \??\w: yqbeivrzlb.exe File opened (read-only) \??\p: xgjjpiob.exe File opened (read-only) \??\e: xgjjpiob.exe File opened (read-only) \??\z: yqbeivrzlb.exe File opened (read-only) \??\t: xgjjpiob.exe File opened (read-only) \??\v: xgjjpiob.exe File opened (read-only) \??\u: yqbeivrzlb.exe File opened (read-only) \??\r: xgjjpiob.exe File opened (read-only) \??\t: yqbeivrzlb.exe File opened (read-only) \??\b: xgjjpiob.exe File opened (read-only) \??\i: xgjjpiob.exe File opened (read-only) \??\j: xgjjpiob.exe File opened (read-only) \??\h: xgjjpiob.exe File opened (read-only) \??\i: yqbeivrzlb.exe File opened (read-only) \??\a: xgjjpiob.exe File opened (read-only) \??\j: yqbeivrzlb.exe File opened (read-only) \??\b: yqbeivrzlb.exe File opened (read-only) \??\s: xgjjpiob.exe File opened (read-only) \??\i: xgjjpiob.exe File opened (read-only) \??\a: yqbeivrzlb.exe File opened (read-only) \??\e: yqbeivrzlb.exe File opened (read-only) \??\m: xgjjpiob.exe File opened (read-only) \??\p: xgjjpiob.exe File opened (read-only) \??\g: xgjjpiob.exe File opened (read-only) \??\o: xgjjpiob.exe File opened (read-only) \??\n: yqbeivrzlb.exe File opened (read-only) \??\r: yqbeivrzlb.exe File opened (read-only) \??\r: xgjjpiob.exe File opened (read-only) \??\l: xgjjpiob.exe File opened (read-only) \??\f: xgjjpiob.exe File opened (read-only) \??\y: xgjjpiob.exe File opened (read-only) \??\s: yqbeivrzlb.exe File opened (read-only) \??\e: xgjjpiob.exe File opened (read-only) \??\o: xgjjpiob.exe File opened (read-only) \??\s: xgjjpiob.exe File opened (read-only) \??\w: xgjjpiob.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" yqbeivrzlb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" yqbeivrzlb.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1092-56-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/304-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1952-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1092-84-0x0000000002490000-0x0000000002530000-memory.dmp autoit_exe behavioral1/memory/944-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1376-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2036-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1092-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/304-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1952-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1376-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/944-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2036-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2036-110-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/944-111-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\yqbeivrzlb.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File created C:\Windows\SysWOW64\vfiualftcedgtak.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File opened for modification C:\Windows\SysWOW64\vfiualftcedgtak.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File opened for modification C:\Windows\SysWOW64\tfkztgqcthfwe.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll yqbeivrzlb.exe File opened for modification C:\Windows\SysWOW64\yqbeivrzlb.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File created C:\Windows\SysWOW64\xgjjpiob.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File opened for modification C:\Windows\SysWOW64\xgjjpiob.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File created C:\Windows\SysWOW64\tfkztgqcthfwe.exe 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal xgjjpiob.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xgjjpiob.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xgjjpiob.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xgjjpiob.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xgjjpiob.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal xgjjpiob.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xgjjpiob.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe xgjjpiob.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh yqbeivrzlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" yqbeivrzlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs yqbeivrzlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EC3B12D47E439E852CEBAA2329AD7C4" 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F368B2FF1A21ABD279D1A68B7E9160" 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat yqbeivrzlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" yqbeivrzlb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BCAFAC9F964F2E5830E3B36869D3E95B08C02F14313033EE2CA429A08A1" 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FF5FFF8482B821B903CD7207E94BDEEE636593067416242D791" 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yqbeivrzlb.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 852 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 304 yqbeivrzlb.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 944 xgjjpiob.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1952 vfiualftcedgtak.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 1376 tfkztgqcthfwe.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe 2036 xgjjpiob.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 852 WINWORD.EXE 852 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1092 wrote to memory of 304 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 27 PID 1092 wrote to memory of 304 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 27 PID 1092 wrote to memory of 304 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 27 PID 1092 wrote to memory of 304 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 27 PID 1092 wrote to memory of 1952 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 28 PID 1092 wrote to memory of 1952 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 28 PID 1092 wrote to memory of 1952 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 28 PID 1092 wrote to memory of 1952 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 28 PID 1092 wrote to memory of 944 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 29 PID 1092 wrote to memory of 944 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 29 PID 1092 wrote to memory of 944 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 29 PID 1092 wrote to memory of 944 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 29 PID 1092 wrote to memory of 1376 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 30 PID 1092 wrote to memory of 1376 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 30 PID 1092 wrote to memory of 1376 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 30 PID 1092 wrote to memory of 1376 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 30 PID 304 wrote to memory of 2036 304 yqbeivrzlb.exe 31 PID 304 wrote to memory of 2036 304 yqbeivrzlb.exe 31 PID 304 wrote to memory of 2036 304 yqbeivrzlb.exe 31 PID 304 wrote to memory of 2036 304 yqbeivrzlb.exe 31 PID 1092 wrote to memory of 852 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 32 PID 1092 wrote to memory of 852 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 32 PID 1092 wrote to memory of 852 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 32 PID 1092 wrote to memory of 852 1092 47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe 32 PID 852 wrote to memory of 924 852 WINWORD.EXE 36 PID 852 wrote to memory of 924 852 WINWORD.EXE 36 PID 852 wrote to memory of 924 852 WINWORD.EXE 36 PID 852 wrote to memory of 924 852 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe"C:\Users\Admin\AppData\Local\Temp\47801dcd076819577810a804980541992f0d4ec784ded37b697da696cffb2dfe.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\yqbeivrzlb.exeyqbeivrzlb.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\xgjjpiob.exeC:\Windows\system32\xgjjpiob.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2036
-
-
-
C:\Windows\SysWOW64\vfiualftcedgtak.exevfiualftcedgtak.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1952
-
-
C:\Windows\SysWOW64\xgjjpiob.exexgjjpiob.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:944
-
-
C:\Windows\SysWOW64\tfkztgqcthfwe.exetfkztgqcthfwe.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1376
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5d20f105b6091c942a834392e11e7c42d
SHA100dd51a3b2786f9bf3bda361dc4bf2445f5ae8f6
SHA25633920b6dc3b3d000fa56b3fb79eedf114355ce3698d1e4c264d6339604bfb382
SHA512cf98dd9841e41b673c5c29a3bbcac5600ea174656205a1a5af45abb1a8e82e0c4268e902b64383ff83e5fed5181694f614de504199a0a223eb2ede96b5a0fb17
-
Filesize
255KB
MD509961e56dfaedefe22bba35e747569b7
SHA1e5fe23b77049e62cd35dee5bedcbe219786571ac
SHA256c9130863561131536afd18815644a8a593fad424c36e94e005f2bd835d48555f
SHA512c686689e016d8500f60f9ca89c09e53d1c25cb9db769e49414cee8ff17be78b1fd8185255d6d625591604a0f50a545991bcde9bdcc64a48360fb6f66d282865c
-
Filesize
255KB
MD58906fc5797ba2718198c0d610300809d
SHA1ae40f27eaaff3bc4e46867cec16ce93b78624ad5
SHA256b9cd4ec46dd407c4373ec7f873e347488cf943aaede6bca7df5b77e5ac2b5f03
SHA512ae0c7058a9e23d7ba7c1e7c68080cc82b33bb03dab5e45e5b4f0cff4e01d5d5934e3178104f208b839a89848ac7fd9b43c942a75c9807af1e5bc70e5401a87ac
-
Filesize
255KB
MD58906fc5797ba2718198c0d610300809d
SHA1ae40f27eaaff3bc4e46867cec16ce93b78624ad5
SHA256b9cd4ec46dd407c4373ec7f873e347488cf943aaede6bca7df5b77e5ac2b5f03
SHA512ae0c7058a9e23d7ba7c1e7c68080cc82b33bb03dab5e45e5b4f0cff4e01d5d5934e3178104f208b839a89848ac7fd9b43c942a75c9807af1e5bc70e5401a87ac
-
Filesize
255KB
MD573d5f79569126de91b75bbaf20a7d3ef
SHA146cc4d274477e76d5fa3ae24d51a358a1918cd89
SHA2565d2d38080595c1a5de1bf47388567f65d831f331ab6e82170ba13f846c1c4605
SHA5125c0f1da61dc2c9cf1378f63d5bf811c3d470cf2c82bad9a6c9e7b862dbf6aabc23d24de614bfd667ad7c9acb2ee44273fee4a62aca3a231f011487d8456851b1
-
Filesize
255KB
MD573d5f79569126de91b75bbaf20a7d3ef
SHA146cc4d274477e76d5fa3ae24d51a358a1918cd89
SHA2565d2d38080595c1a5de1bf47388567f65d831f331ab6e82170ba13f846c1c4605
SHA5125c0f1da61dc2c9cf1378f63d5bf811c3d470cf2c82bad9a6c9e7b862dbf6aabc23d24de614bfd667ad7c9acb2ee44273fee4a62aca3a231f011487d8456851b1
-
Filesize
255KB
MD55afab3c43f8f895ce28dfb1bce652410
SHA17a161677962be371dae8ceb76c9bb5d94e4435cf
SHA2561ebd02458eb1d58a3740fc8a975f44e758d4569de5e32a9ff2456070c05c8d1b
SHA512b8295e76fc21973a5f5e8bb609736f23e345546f248f2bf778ecf7b63c23157ec03890baea88a4cfeb6aa0cc3d1ebd58b2d868b3ef04b1c906aea068556ec27e
-
Filesize
255KB
MD55afab3c43f8f895ce28dfb1bce652410
SHA17a161677962be371dae8ceb76c9bb5d94e4435cf
SHA2561ebd02458eb1d58a3740fc8a975f44e758d4569de5e32a9ff2456070c05c8d1b
SHA512b8295e76fc21973a5f5e8bb609736f23e345546f248f2bf778ecf7b63c23157ec03890baea88a4cfeb6aa0cc3d1ebd58b2d868b3ef04b1c906aea068556ec27e
-
Filesize
255KB
MD55afab3c43f8f895ce28dfb1bce652410
SHA17a161677962be371dae8ceb76c9bb5d94e4435cf
SHA2561ebd02458eb1d58a3740fc8a975f44e758d4569de5e32a9ff2456070c05c8d1b
SHA512b8295e76fc21973a5f5e8bb609736f23e345546f248f2bf778ecf7b63c23157ec03890baea88a4cfeb6aa0cc3d1ebd58b2d868b3ef04b1c906aea068556ec27e
-
Filesize
255KB
MD5c0147d10813b5ea052f6a0ee86e5e28a
SHA1332931927bc3a142815208d7106adbf95dee9416
SHA25685585082daba85dd2525d70fd8d719be49e5329e85c89ab8032b1f295ea3cd7b
SHA512a36b63e4e262085d3857ed1b0a9757457c0ad301cedd55f0ed11a2d623b3710d394826be46976142af7fe6c822010525061e575d29d8b815d87ef240fb678b82
-
Filesize
255KB
MD5c0147d10813b5ea052f6a0ee86e5e28a
SHA1332931927bc3a142815208d7106adbf95dee9416
SHA25685585082daba85dd2525d70fd8d719be49e5329e85c89ab8032b1f295ea3cd7b
SHA512a36b63e4e262085d3857ed1b0a9757457c0ad301cedd55f0ed11a2d623b3710d394826be46976142af7fe6c822010525061e575d29d8b815d87ef240fb678b82
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD509961e56dfaedefe22bba35e747569b7
SHA1e5fe23b77049e62cd35dee5bedcbe219786571ac
SHA256c9130863561131536afd18815644a8a593fad424c36e94e005f2bd835d48555f
SHA512c686689e016d8500f60f9ca89c09e53d1c25cb9db769e49414cee8ff17be78b1fd8185255d6d625591604a0f50a545991bcde9bdcc64a48360fb6f66d282865c
-
Filesize
255KB
MD58906fc5797ba2718198c0d610300809d
SHA1ae40f27eaaff3bc4e46867cec16ce93b78624ad5
SHA256b9cd4ec46dd407c4373ec7f873e347488cf943aaede6bca7df5b77e5ac2b5f03
SHA512ae0c7058a9e23d7ba7c1e7c68080cc82b33bb03dab5e45e5b4f0cff4e01d5d5934e3178104f208b839a89848ac7fd9b43c942a75c9807af1e5bc70e5401a87ac
-
Filesize
255KB
MD573d5f79569126de91b75bbaf20a7d3ef
SHA146cc4d274477e76d5fa3ae24d51a358a1918cd89
SHA2565d2d38080595c1a5de1bf47388567f65d831f331ab6e82170ba13f846c1c4605
SHA5125c0f1da61dc2c9cf1378f63d5bf811c3d470cf2c82bad9a6c9e7b862dbf6aabc23d24de614bfd667ad7c9acb2ee44273fee4a62aca3a231f011487d8456851b1
-
Filesize
255KB
MD55afab3c43f8f895ce28dfb1bce652410
SHA17a161677962be371dae8ceb76c9bb5d94e4435cf
SHA2561ebd02458eb1d58a3740fc8a975f44e758d4569de5e32a9ff2456070c05c8d1b
SHA512b8295e76fc21973a5f5e8bb609736f23e345546f248f2bf778ecf7b63c23157ec03890baea88a4cfeb6aa0cc3d1ebd58b2d868b3ef04b1c906aea068556ec27e
-
Filesize
255KB
MD55afab3c43f8f895ce28dfb1bce652410
SHA17a161677962be371dae8ceb76c9bb5d94e4435cf
SHA2561ebd02458eb1d58a3740fc8a975f44e758d4569de5e32a9ff2456070c05c8d1b
SHA512b8295e76fc21973a5f5e8bb609736f23e345546f248f2bf778ecf7b63c23157ec03890baea88a4cfeb6aa0cc3d1ebd58b2d868b3ef04b1c906aea068556ec27e
-
Filesize
255KB
MD5c0147d10813b5ea052f6a0ee86e5e28a
SHA1332931927bc3a142815208d7106adbf95dee9416
SHA25685585082daba85dd2525d70fd8d719be49e5329e85c89ab8032b1f295ea3cd7b
SHA512a36b63e4e262085d3857ed1b0a9757457c0ad301cedd55f0ed11a2d623b3710d394826be46976142af7fe6c822010525061e575d29d8b815d87ef240fb678b82