Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:17
Behavioral task
behavioral1
Sample
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
Resource
win10v2004-20221111-en
General
-
Target
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe
-
Size
255KB
-
MD5
024bbce4de7354cf6af71939cc5e3c13
-
SHA1
bc42a69243b37222f7c97695d0901d1c31ee3d31
-
SHA256
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df
-
SHA512
0331eda5e8f8bc42ffea38183c436c0adb64fbbce3f7e4c598b6f12b87ebe37dcecfc4ed36be56c70682b9968a7c000e9fe44bcfb251006ae55b950de2effc96
-
SSDEEP
6144:1xlZam+akqx6YQJXcNlEHUIQeE3mmBWFv62:Plf5j6zCNa0xeE3mX
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" jaoihxhzcn.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" jaoihxhzcn.exe -
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" jaoihxhzcn.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" jaoihxhzcn.exe -
Executes dropped EXE 6 IoCs
Processes:
jaoihxhzcn.exeotryuuxbwqrwqde.exehxucbgkr.exezukyinviyjorh.exezukyinviyjorh.exehxucbgkr.exepid process 840 jaoihxhzcn.exe 1860 otryuuxbwqrwqde.exe 556 hxucbgkr.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 696 hxucbgkr.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Processes:
resource yara_rule \Windows\SysWOW64\jaoihxhzcn.exe upx C:\Windows\SysWOW64\jaoihxhzcn.exe upx \Windows\SysWOW64\otryuuxbwqrwqde.exe upx \Windows\SysWOW64\hxucbgkr.exe upx C:\Windows\SysWOW64\otryuuxbwqrwqde.exe upx \Windows\SysWOW64\zukyinviyjorh.exe upx C:\Windows\SysWOW64\jaoihxhzcn.exe upx C:\Windows\SysWOW64\zukyinviyjorh.exe upx C:\Windows\SysWOW64\otryuuxbwqrwqde.exe upx C:\Windows\SysWOW64\hxucbgkr.exe upx C:\Windows\SysWOW64\zukyinviyjorh.exe upx C:\Windows\SysWOW64\hxucbgkr.exe upx \Windows\SysWOW64\zukyinviyjorh.exe upx C:\Windows\SysWOW64\zukyinviyjorh.exe upx \Windows\SysWOW64\hxucbgkr.exe upx C:\Windows\SysWOW64\hxucbgkr.exe upx behavioral1/memory/1308-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/840-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1860-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/556-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1380-89-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1504-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/696-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1308-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe upx C:\Users\Admin\Documents\RestartAdd.doc.exe upx behavioral1/memory/840-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1860-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/556-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1380-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1504-107-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/696-108-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/696-110-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/556-111-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 6 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.execmd.exejaoihxhzcn.exepid process 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1756 cmd.exe 840 jaoihxhzcn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" jaoihxhzcn.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
otryuuxbwqrwqde.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aqwrunbx = "jaoihxhzcn.exe" otryuuxbwqrwqde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rknnbjic = "otryuuxbwqrwqde.exe" otryuuxbwqrwqde.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "zukyinviyjorh.exe" otryuuxbwqrwqde.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run otryuuxbwqrwqde.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hxucbgkr.exejaoihxhzcn.exehxucbgkr.exedescription ioc process File opened (read-only) \??\e: hxucbgkr.exe File opened (read-only) \??\k: jaoihxhzcn.exe File opened (read-only) \??\j: hxucbgkr.exe File opened (read-only) \??\q: hxucbgkr.exe File opened (read-only) \??\r: hxucbgkr.exe File opened (read-only) \??\e: hxucbgkr.exe File opened (read-only) \??\w: hxucbgkr.exe File opened (read-only) \??\l: jaoihxhzcn.exe File opened (read-only) \??\v: jaoihxhzcn.exe File opened (read-only) \??\v: hxucbgkr.exe File opened (read-only) \??\a: jaoihxhzcn.exe File opened (read-only) \??\b: hxucbgkr.exe File opened (read-only) \??\o: hxucbgkr.exe File opened (read-only) \??\n: jaoihxhzcn.exe File opened (read-only) \??\b: hxucbgkr.exe File opened (read-only) \??\b: jaoihxhzcn.exe File opened (read-only) \??\x: jaoihxhzcn.exe File opened (read-only) \??\g: hxucbgkr.exe File opened (read-only) \??\u: hxucbgkr.exe File opened (read-only) \??\v: hxucbgkr.exe File opened (read-only) \??\k: hxucbgkr.exe File opened (read-only) \??\p: hxucbgkr.exe File opened (read-only) \??\r: hxucbgkr.exe File opened (read-only) \??\g: jaoihxhzcn.exe File opened (read-only) \??\s: hxucbgkr.exe File opened (read-only) \??\x: hxucbgkr.exe File opened (read-only) \??\q: hxucbgkr.exe File opened (read-only) \??\e: jaoihxhzcn.exe File opened (read-only) \??\q: jaoihxhzcn.exe File opened (read-only) \??\z: jaoihxhzcn.exe File opened (read-only) \??\i: hxucbgkr.exe File opened (read-only) \??\s: hxucbgkr.exe File opened (read-only) \??\t: hxucbgkr.exe File opened (read-only) \??\f: hxucbgkr.exe File opened (read-only) \??\o: hxucbgkr.exe File opened (read-only) \??\g: hxucbgkr.exe File opened (read-only) \??\y: hxucbgkr.exe File opened (read-only) \??\h: hxucbgkr.exe File opened (read-only) \??\l: hxucbgkr.exe File opened (read-only) \??\m: hxucbgkr.exe File opened (read-only) \??\i: hxucbgkr.exe File opened (read-only) \??\z: hxucbgkr.exe File opened (read-only) \??\f: jaoihxhzcn.exe File opened (read-only) \??\h: jaoihxhzcn.exe File opened (read-only) \??\r: jaoihxhzcn.exe File opened (read-only) \??\p: hxucbgkr.exe File opened (read-only) \??\t: hxucbgkr.exe File opened (read-only) \??\n: hxucbgkr.exe File opened (read-only) \??\z: hxucbgkr.exe File opened (read-only) \??\h: hxucbgkr.exe File opened (read-only) \??\m: hxucbgkr.exe File opened (read-only) \??\u: hxucbgkr.exe File opened (read-only) \??\m: jaoihxhzcn.exe File opened (read-only) \??\s: jaoihxhzcn.exe File opened (read-only) \??\t: jaoihxhzcn.exe File opened (read-only) \??\u: jaoihxhzcn.exe File opened (read-only) \??\a: hxucbgkr.exe File opened (read-only) \??\l: hxucbgkr.exe File opened (read-only) \??\n: hxucbgkr.exe File opened (read-only) \??\w: hxucbgkr.exe File opened (read-only) \??\o: jaoihxhzcn.exe File opened (read-only) \??\p: jaoihxhzcn.exe File opened (read-only) \??\k: hxucbgkr.exe File opened (read-only) \??\y: hxucbgkr.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
jaoihxhzcn.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" jaoihxhzcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" jaoihxhzcn.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1308-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/840-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1860-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/556-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1380-89-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1504-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/696-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1308-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/840-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1860-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/556-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1380-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1504-107-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/696-108-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/696-110-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/556-111-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exejaoihxhzcn.exedescription ioc process File created C:\Windows\SysWOW64\hxucbgkr.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll jaoihxhzcn.exe File created C:\Windows\SysWOW64\jaoihxhzcn.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\otryuuxbwqrwqde.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\hxucbgkr.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\zukyinviyjorh.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\zukyinviyjorh.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\SysWOW64\jaoihxhzcn.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File created C:\Windows\SysWOW64\otryuuxbwqrwqde.exe d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe -
Drops file in Program Files directory 11 IoCs
Processes:
hxucbgkr.exehxucbgkr.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hxucbgkr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hxucbgkr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe hxucbgkr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hxucbgkr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal hxucbgkr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal hxucbgkr.exe -
Drops file in Windows directory 4 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeWINWORD.EXEdescription ioc process File opened for modification C:\Windows\mydoc.rtf d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
jaoihxhzcn.exeWINWORD.EXEexplorer.exed71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" jaoihxhzcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" jaoihxhzcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc jaoihxhzcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" jaoihxhzcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABAF9B0FE16F29084753A4481EC3993B388038A4211023EE2CF429D08D6" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs jaoihxhzcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F068B4FF1A22DAD10CD0A08A7B9062" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg jaoihxhzcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf jaoihxhzcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7FFBFC82482B82189131D7297E93BDE4E640593667316245D79C" d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1788 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeotryuuxbwqrwqde.exezukyinviyjorh.exejaoihxhzcn.exezukyinviyjorh.exehxucbgkr.exehxucbgkr.exepid process 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 696 hxucbgkr.exe 696 hxucbgkr.exe 696 hxucbgkr.exe 696 hxucbgkr.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1860 otryuuxbwqrwqde.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2028 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
explorer.exeAUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe Token: 33 1560 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1560 AUDIODG.EXE Token: 33 1560 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1560 AUDIODG.EXE Token: SeShutdownPrivilege 2028 explorer.exe Token: SeShutdownPrivilege 2028 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeotryuuxbwqrwqde.exejaoihxhzcn.exezukyinviyjorh.exehxucbgkr.exezukyinviyjorh.exehxucbgkr.exeexplorer.exepid process 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 1380 zukyinviyjorh.exe 556 hxucbgkr.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 1504 zukyinviyjorh.exe 696 hxucbgkr.exe 696 hxucbgkr.exe 696 hxucbgkr.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeotryuuxbwqrwqde.exejaoihxhzcn.exezukyinviyjorh.exehxucbgkr.exeexplorer.exepid process 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 1860 otryuuxbwqrwqde.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 840 jaoihxhzcn.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 1380 zukyinviyjorh.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 556 hxucbgkr.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe 2028 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1788 WINWORD.EXE 1788 WINWORD.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exeotryuuxbwqrwqde.execmd.exejaoihxhzcn.exedescription pid process target process PID 1308 wrote to memory of 840 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jaoihxhzcn.exe PID 1308 wrote to memory of 840 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jaoihxhzcn.exe PID 1308 wrote to memory of 840 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jaoihxhzcn.exe PID 1308 wrote to memory of 840 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe jaoihxhzcn.exe PID 1308 wrote to memory of 1860 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe otryuuxbwqrwqde.exe PID 1308 wrote to memory of 1860 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe otryuuxbwqrwqde.exe PID 1308 wrote to memory of 1860 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe otryuuxbwqrwqde.exe PID 1308 wrote to memory of 1860 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe otryuuxbwqrwqde.exe PID 1308 wrote to memory of 556 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe hxucbgkr.exe PID 1308 wrote to memory of 556 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe hxucbgkr.exe PID 1308 wrote to memory of 556 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe hxucbgkr.exe PID 1308 wrote to memory of 556 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe hxucbgkr.exe PID 1308 wrote to memory of 1380 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe zukyinviyjorh.exe PID 1308 wrote to memory of 1380 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe zukyinviyjorh.exe PID 1308 wrote to memory of 1380 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe zukyinviyjorh.exe PID 1308 wrote to memory of 1380 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe zukyinviyjorh.exe PID 1860 wrote to memory of 1756 1860 otryuuxbwqrwqde.exe cmd.exe PID 1860 wrote to memory of 1756 1860 otryuuxbwqrwqde.exe cmd.exe PID 1860 wrote to memory of 1756 1860 otryuuxbwqrwqde.exe cmd.exe PID 1860 wrote to memory of 1756 1860 otryuuxbwqrwqde.exe cmd.exe PID 1756 wrote to memory of 1504 1756 cmd.exe zukyinviyjorh.exe PID 1756 wrote to memory of 1504 1756 cmd.exe zukyinviyjorh.exe PID 1756 wrote to memory of 1504 1756 cmd.exe zukyinviyjorh.exe PID 1756 wrote to memory of 1504 1756 cmd.exe zukyinviyjorh.exe PID 840 wrote to memory of 696 840 jaoihxhzcn.exe hxucbgkr.exe PID 840 wrote to memory of 696 840 jaoihxhzcn.exe hxucbgkr.exe PID 840 wrote to memory of 696 840 jaoihxhzcn.exe hxucbgkr.exe PID 840 wrote to memory of 696 840 jaoihxhzcn.exe hxucbgkr.exe PID 1308 wrote to memory of 1788 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE PID 1308 wrote to memory of 1788 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE PID 1308 wrote to memory of 1788 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE PID 1308 wrote to memory of 1788 1308 d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe"C:\Users\Admin\AppData\Local\Temp\d71d7205f0ae0ba4b8812ddee8c882e1e0d43ca33e580d22a0c5d193751403df.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\jaoihxhzcn.exejaoihxhzcn.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\hxucbgkr.exeC:\Windows\system32\hxucbgkr.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:696
-
-
-
C:\Windows\SysWOW64\otryuuxbwqrwqde.exeotryuuxbwqrwqde.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd.exe /c zukyinviyjorh.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\zukyinviyjorh.exezukyinviyjorh.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1504
-
-
-
-
C:\Windows\SysWOW64\hxucbgkr.exehxucbgkr.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:556
-
-
C:\Windows\SysWOW64\zukyinviyjorh.exezukyinviyjorh.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1380
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2028
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5381⤵
- Suspicious use of AdjustPrivilegeToken
PID:1560
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5b3d095ce13d417fe81eed2ef3e19e5fc
SHA123c0384fa188742a2fd206613dcca06af248c8e1
SHA25692ebfdb8a45d971e0887b5a6206a70cbfc7fd905be3af203591ab1ed97c707a3
SHA5129fd06a930e8d4e995c6eaf16fdba7fa472eb3188ad5ad52303d45beaf394c19105f201df4405c52a10a8eb308c6122b6d1103a1ecaf956d8869bfd56bc770388
-
Filesize
255KB
MD5bb1ef56428d559393ea220d6f5cc8134
SHA1f9ffb99f83f5a407d5731280298d546e6bc0c256
SHA256bbc5739917dac58b4952ffb07afa65d06fab060595dbf40e79f32a5977df1f5c
SHA5125b0bac658efd45627f264cb40ebb3665d4b9d74b084358028afc37bda100c9f92c8e07e6911a93f5e812cfea1872dac12cc42e0c689b657e023482c45ee7574a
-
Filesize
255KB
MD535bd82775af9c29cf4f5357896fe791e
SHA13ed87b01b2fbf430ceaf38b2550cac04bd23366c
SHA2567acb2efbe404ad17dba51823407152971498beae2e347adac0668f73e39e1911
SHA5122b92f27e728d92d8a49ed9b9863400c3e2961a6fef94f9138867f371108634caaca259ed531a45e0265a1b8923ed8137e02ebb0184c936c12ad462355533a2ae
-
Filesize
255KB
MD535bd82775af9c29cf4f5357896fe791e
SHA13ed87b01b2fbf430ceaf38b2550cac04bd23366c
SHA2567acb2efbe404ad17dba51823407152971498beae2e347adac0668f73e39e1911
SHA5122b92f27e728d92d8a49ed9b9863400c3e2961a6fef94f9138867f371108634caaca259ed531a45e0265a1b8923ed8137e02ebb0184c936c12ad462355533a2ae
-
Filesize
255KB
MD535bd82775af9c29cf4f5357896fe791e
SHA13ed87b01b2fbf430ceaf38b2550cac04bd23366c
SHA2567acb2efbe404ad17dba51823407152971498beae2e347adac0668f73e39e1911
SHA5122b92f27e728d92d8a49ed9b9863400c3e2961a6fef94f9138867f371108634caaca259ed531a45e0265a1b8923ed8137e02ebb0184c936c12ad462355533a2ae
-
Filesize
255KB
MD52ea68ee90b1adbdfed395e2b6811f21e
SHA1de0a7b1a7ab9d2e2db971249c57efc205d52792d
SHA2561e30b1d7d91af5fd7f748fa56f00fbc08ed12f6ed7544c6175719c8bccc5ae7b
SHA512e7f72f163d8ddc70ba07d9fa25cc680167c8e27758e67bcda90fa6b53078ede014afef1cebc2fa30cd162ac5bbb8fa9e3af63e9202a0fd4f8991f32608d6cd48
-
Filesize
255KB
MD52ea68ee90b1adbdfed395e2b6811f21e
SHA1de0a7b1a7ab9d2e2db971249c57efc205d52792d
SHA2561e30b1d7d91af5fd7f748fa56f00fbc08ed12f6ed7544c6175719c8bccc5ae7b
SHA512e7f72f163d8ddc70ba07d9fa25cc680167c8e27758e67bcda90fa6b53078ede014afef1cebc2fa30cd162ac5bbb8fa9e3af63e9202a0fd4f8991f32608d6cd48
-
Filesize
255KB
MD5031ce56b170e66d8cf75b444d936b8ea
SHA1df888ba08147c50f7e68c3db35794cda2eaae7b5
SHA256ca70a523f4bb5e0fc35559dd7503c58521b80d4c32353f94ab18fba10cb578a3
SHA5128d72234ffee9f23ca4f1a4c81dcb3811129592f1b5c156472977354cd6f59b1afc0779d1222c05e503b8e91a910aa25fdf65740c6307594e86628383368e98bf
-
Filesize
255KB
MD5031ce56b170e66d8cf75b444d936b8ea
SHA1df888ba08147c50f7e68c3db35794cda2eaae7b5
SHA256ca70a523f4bb5e0fc35559dd7503c58521b80d4c32353f94ab18fba10cb578a3
SHA5128d72234ffee9f23ca4f1a4c81dcb3811129592f1b5c156472977354cd6f59b1afc0779d1222c05e503b8e91a910aa25fdf65740c6307594e86628383368e98bf
-
Filesize
255KB
MD55568e43a94cc4b04b4f3b8f42b6858e9
SHA17030295817058eb00b4de59e39b20b74c2eea243
SHA256da7c2a0c868f2fd31274ff38170ee920466f84b349f9dfc4c4aa07ef064690a8
SHA51281ee818dfd72c5713b726cf3c8147f5fd389b2fa23cfb412c37e1786bda9c2a7f3ddc21cc768df6b81659be3588d120ae20b02078f2c333569de252524bf9137
-
Filesize
255KB
MD55568e43a94cc4b04b4f3b8f42b6858e9
SHA17030295817058eb00b4de59e39b20b74c2eea243
SHA256da7c2a0c868f2fd31274ff38170ee920466f84b349f9dfc4c4aa07ef064690a8
SHA51281ee818dfd72c5713b726cf3c8147f5fd389b2fa23cfb412c37e1786bda9c2a7f3ddc21cc768df6b81659be3588d120ae20b02078f2c333569de252524bf9137
-
Filesize
255KB
MD55568e43a94cc4b04b4f3b8f42b6858e9
SHA17030295817058eb00b4de59e39b20b74c2eea243
SHA256da7c2a0c868f2fd31274ff38170ee920466f84b349f9dfc4c4aa07ef064690a8
SHA51281ee818dfd72c5713b726cf3c8147f5fd389b2fa23cfb412c37e1786bda9c2a7f3ddc21cc768df6b81659be3588d120ae20b02078f2c333569de252524bf9137
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD535bd82775af9c29cf4f5357896fe791e
SHA13ed87b01b2fbf430ceaf38b2550cac04bd23366c
SHA2567acb2efbe404ad17dba51823407152971498beae2e347adac0668f73e39e1911
SHA5122b92f27e728d92d8a49ed9b9863400c3e2961a6fef94f9138867f371108634caaca259ed531a45e0265a1b8923ed8137e02ebb0184c936c12ad462355533a2ae
-
Filesize
255KB
MD535bd82775af9c29cf4f5357896fe791e
SHA13ed87b01b2fbf430ceaf38b2550cac04bd23366c
SHA2567acb2efbe404ad17dba51823407152971498beae2e347adac0668f73e39e1911
SHA5122b92f27e728d92d8a49ed9b9863400c3e2961a6fef94f9138867f371108634caaca259ed531a45e0265a1b8923ed8137e02ebb0184c936c12ad462355533a2ae
-
Filesize
255KB
MD52ea68ee90b1adbdfed395e2b6811f21e
SHA1de0a7b1a7ab9d2e2db971249c57efc205d52792d
SHA2561e30b1d7d91af5fd7f748fa56f00fbc08ed12f6ed7544c6175719c8bccc5ae7b
SHA512e7f72f163d8ddc70ba07d9fa25cc680167c8e27758e67bcda90fa6b53078ede014afef1cebc2fa30cd162ac5bbb8fa9e3af63e9202a0fd4f8991f32608d6cd48
-
Filesize
255KB
MD5031ce56b170e66d8cf75b444d936b8ea
SHA1df888ba08147c50f7e68c3db35794cda2eaae7b5
SHA256ca70a523f4bb5e0fc35559dd7503c58521b80d4c32353f94ab18fba10cb578a3
SHA5128d72234ffee9f23ca4f1a4c81dcb3811129592f1b5c156472977354cd6f59b1afc0779d1222c05e503b8e91a910aa25fdf65740c6307594e86628383368e98bf
-
Filesize
255KB
MD55568e43a94cc4b04b4f3b8f42b6858e9
SHA17030295817058eb00b4de59e39b20b74c2eea243
SHA256da7c2a0c868f2fd31274ff38170ee920466f84b349f9dfc4c4aa07ef064690a8
SHA51281ee818dfd72c5713b726cf3c8147f5fd389b2fa23cfb412c37e1786bda9c2a7f3ddc21cc768df6b81659be3588d120ae20b02078f2c333569de252524bf9137
-
Filesize
255KB
MD55568e43a94cc4b04b4f3b8f42b6858e9
SHA17030295817058eb00b4de59e39b20b74c2eea243
SHA256da7c2a0c868f2fd31274ff38170ee920466f84b349f9dfc4c4aa07ef064690a8
SHA51281ee818dfd72c5713b726cf3c8147f5fd389b2fa23cfb412c37e1786bda9c2a7f3ddc21cc768df6b81659be3588d120ae20b02078f2c333569de252524bf9137