Analysis
-
max time kernel
205s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:11
Behavioral task
behavioral1
Sample
584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe
Resource
win7-20221111-en
General
-
Target
584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe
-
Size
255KB
-
MD5
6d568d8f69761cc31bd30f217a6b81a1
-
SHA1
5b473f422f2824b270b4d35647f5ffdcfa6972c7
-
SHA256
584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf
-
SHA512
ade0b2f807be62c56f50495341432ae9543e07c8df8d96ec64b648a0b3329d8a401df382ea96bc621b69be688b2630470543b8c268877e237797181e0db9e1de
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJj:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fwgtucunos.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fwgtucunos.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fwgtucunos.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fwgtucunos.exe -
Executes dropped EXE 5 IoCs
pid Process 1780 fwgtucunos.exe 2044 noyjxpcenemleke.exe 436 dojkflnk.exe 1448 zidubngpvzuct.exe 1468 dojkflnk.exe -
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/files/0x000b00000001232f-55.dat upx behavioral1/files/0x001b00000001249b-58.dat upx behavioral1/files/0x000b00000001232f-57.dat upx behavioral1/files/0x0008000000012738-66.dat upx behavioral1/files/0x0007000000012750-70.dat upx behavioral1/files/0x0007000000012750-67.dat upx behavioral1/files/0x000b00000001232f-63.dat upx behavioral1/files/0x001b00000001249b-61.dat upx behavioral1/files/0x0008000000012738-64.dat upx behavioral1/files/0x001b00000001249b-72.dat upx behavioral1/files/0x0007000000012750-73.dat upx behavioral1/memory/2040-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012738-78.dat upx behavioral1/files/0x0008000000012738-77.dat upx behavioral1/memory/1780-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000012738-81.dat upx behavioral1/memory/436-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1448-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1468-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2040-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1780-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1448-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1468-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 1780 fwgtucunos.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" fwgtucunos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run noyjxpcenemleke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\etccmpyt = "fwgtucunos.exe" noyjxpcenemleke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sljdmoho = "noyjxpcenemleke.exe" noyjxpcenemleke.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "zidubngpvzuct.exe" noyjxpcenemleke.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: dojkflnk.exe File opened (read-only) \??\f: fwgtucunos.exe File opened (read-only) \??\z: fwgtucunos.exe File opened (read-only) \??\b: dojkflnk.exe File opened (read-only) \??\h: dojkflnk.exe File opened (read-only) \??\m: dojkflnk.exe File opened (read-only) \??\v: dojkflnk.exe File opened (read-only) \??\k: fwgtucunos.exe File opened (read-only) \??\n: dojkflnk.exe File opened (read-only) \??\o: dojkflnk.exe File opened (read-only) \??\p: dojkflnk.exe File opened (read-only) \??\x: dojkflnk.exe File opened (read-only) \??\y: dojkflnk.exe File opened (read-only) \??\w: dojkflnk.exe File opened (read-only) \??\a: fwgtucunos.exe File opened (read-only) \??\g: fwgtucunos.exe File opened (read-only) \??\r: fwgtucunos.exe File opened (read-only) \??\t: fwgtucunos.exe File opened (read-only) \??\y: fwgtucunos.exe File opened (read-only) \??\i: dojkflnk.exe File opened (read-only) \??\l: dojkflnk.exe File opened (read-only) \??\t: dojkflnk.exe File opened (read-only) \??\l: fwgtucunos.exe File opened (read-only) \??\m: fwgtucunos.exe File opened (read-only) \??\n: fwgtucunos.exe File opened (read-only) \??\o: fwgtucunos.exe File opened (read-only) \??\q: fwgtucunos.exe File opened (read-only) \??\a: dojkflnk.exe File opened (read-only) \??\b: fwgtucunos.exe File opened (read-only) \??\p: fwgtucunos.exe File opened (read-only) \??\v: fwgtucunos.exe File opened (read-only) \??\x: fwgtucunos.exe File opened (read-only) \??\g: dojkflnk.exe File opened (read-only) \??\i: fwgtucunos.exe File opened (read-only) \??\s: fwgtucunos.exe File opened (read-only) \??\u: fwgtucunos.exe File opened (read-only) \??\j: dojkflnk.exe File opened (read-only) \??\q: dojkflnk.exe File opened (read-only) \??\w: fwgtucunos.exe File opened (read-only) \??\e: dojkflnk.exe File opened (read-only) \??\f: dojkflnk.exe File opened (read-only) \??\s: dojkflnk.exe File opened (read-only) \??\u: dojkflnk.exe File opened (read-only) \??\e: fwgtucunos.exe File opened (read-only) \??\h: fwgtucunos.exe File opened (read-only) \??\j: fwgtucunos.exe File opened (read-only) \??\k: dojkflnk.exe File opened (read-only) \??\r: dojkflnk.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" fwgtucunos.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" fwgtucunos.exe -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2040-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1780-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1448-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1468-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2040-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1780-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1448-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1468-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\noyjxpcenemleke.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File opened for modification C:\Windows\SysWOW64\dojkflnk.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File opened for modification C:\Windows\SysWOW64\zidubngpvzuct.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File created C:\Windows\SysWOW64\fwgtucunos.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File created C:\Windows\SysWOW64\noyjxpcenemleke.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File created C:\Windows\SysWOW64\zidubngpvzuct.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll fwgtucunos.exe File opened for modification C:\Windows\SysWOW64\fwgtucunos.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe File created C:\Windows\SysWOW64\dojkflnk.exe 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dojkflnk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dojkflnk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dojkflnk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal dojkflnk.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dojkflnk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dojkflnk.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dojkflnk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal dojkflnk.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FB0B15A47E439E953C8BAA5329BD7CD" 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc fwgtucunos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33452D7F9C5582206D4276D377232CA97D8165DA" 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" fwgtucunos.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBFABBFE64F19384783A4186983994B08102F14365034CE1CB42EB08D6" 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" fwgtucunos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1956 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1468 dojkflnk.exe 1468 dojkflnk.exe 1468 dojkflnk.exe 1468 dojkflnk.exe 2044 noyjxpcenemleke.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: SeShutdownPrivilege 968 explorer.exe Token: 33 884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 884 AUDIODG.EXE Token: 33 884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 884 AUDIODG.EXE Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe Token: SeShutdownPrivilege 1612 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1468 dojkflnk.exe 1468 dojkflnk.exe 1468 dojkflnk.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1956 WINWORD.EXE 1956 WINWORD.EXE 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of SendNotifyMessage 59 IoCs
pid Process 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 1780 fwgtucunos.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 2044 noyjxpcenemleke.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 1448 zidubngpvzuct.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 968 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe 1612 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 WINWORD.EXE 1956 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1780 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 28 PID 2040 wrote to memory of 1780 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 28 PID 2040 wrote to memory of 1780 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 28 PID 2040 wrote to memory of 1780 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 28 PID 2040 wrote to memory of 2044 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 29 PID 2040 wrote to memory of 2044 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 29 PID 2040 wrote to memory of 2044 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 29 PID 2040 wrote to memory of 2044 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 29 PID 2040 wrote to memory of 436 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 30 PID 2040 wrote to memory of 436 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 30 PID 2040 wrote to memory of 436 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 30 PID 2040 wrote to memory of 436 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 30 PID 2040 wrote to memory of 1448 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 31 PID 2040 wrote to memory of 1448 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 31 PID 2040 wrote to memory of 1448 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 31 PID 2040 wrote to memory of 1448 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 31 PID 1780 wrote to memory of 1468 1780 fwgtucunos.exe 33 PID 1780 wrote to memory of 1468 1780 fwgtucunos.exe 33 PID 1780 wrote to memory of 1468 1780 fwgtucunos.exe 33 PID 1780 wrote to memory of 1468 1780 fwgtucunos.exe 33 PID 2040 wrote to memory of 1956 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 34 PID 2040 wrote to memory of 1956 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 34 PID 2040 wrote to memory of 1956 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 34 PID 2040 wrote to memory of 1956 2040 584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe 34 PID 1956 wrote to memory of 1936 1956 WINWORD.EXE 42 PID 1956 wrote to memory of 1936 1956 WINWORD.EXE 42 PID 1956 wrote to memory of 1936 1956 WINWORD.EXE 42 PID 1956 wrote to memory of 1936 1956 WINWORD.EXE 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe"C:\Users\Admin\AppData\Local\Temp\584ea73677e46a5167811f5f090696cfe0a42f30c40cd6d34927c69681a163bf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\fwgtucunos.exefwgtucunos.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\dojkflnk.exeC:\Windows\system32\dojkflnk.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1468
-
-
-
C:\Windows\SysWOW64\noyjxpcenemleke.exenoyjxpcenemleke.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2044
-
-
C:\Windows\SysWOW64\dojkflnk.exedojkflnk.exe2⤵
- Executes dropped EXE
PID:436
-
-
C:\Windows\SysWOW64\zidubngpvzuct.exezidubngpvzuct.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1936
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:968
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
PID:884
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1660
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1612
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD57dc4602b021c5468546d666254d6b4c7
SHA10363d9e8005498e209a50653f91d4b42c0587a7f
SHA256c85cfc2585963ced2e3174cf7d7df1f5a3ae3434f7f6e4538c8b294417634f5e
SHA512ad859121e7c119ce69de01042b9b849431e67db33742f590edee8a0ab9bb8ef0df940699853cd5dd6f633c731924c08f170f7f7d1c49022a30855046b320911c
-
Filesize
255KB
MD57dc4602b021c5468546d666254d6b4c7
SHA10363d9e8005498e209a50653f91d4b42c0587a7f
SHA256c85cfc2585963ced2e3174cf7d7df1f5a3ae3434f7f6e4538c8b294417634f5e
SHA512ad859121e7c119ce69de01042b9b849431e67db33742f590edee8a0ab9bb8ef0df940699853cd5dd6f633c731924c08f170f7f7d1c49022a30855046b320911c
-
Filesize
255KB
MD57dc4602b021c5468546d666254d6b4c7
SHA10363d9e8005498e209a50653f91d4b42c0587a7f
SHA256c85cfc2585963ced2e3174cf7d7df1f5a3ae3434f7f6e4538c8b294417634f5e
SHA512ad859121e7c119ce69de01042b9b849431e67db33742f590edee8a0ab9bb8ef0df940699853cd5dd6f633c731924c08f170f7f7d1c49022a30855046b320911c
-
Filesize
255KB
MD5a5d6df9a027cf5210c561724ee37b703
SHA15f195481e01d995923814cda657750da94579231
SHA25692df0efd265ff7c218b5a1322fc74a3f2d776a8d5a670c87c765448e5ee320f3
SHA512ff3c8c30a40a47c7a75f989ae825fcf5d6fa4b0fdb6e1dda3129cafeeea1d84b53cdd3e54445e9dadfbe617e87e53fd5a795b375675001bbbc5243c82a19ea59
-
Filesize
255KB
MD5a5d6df9a027cf5210c561724ee37b703
SHA15f195481e01d995923814cda657750da94579231
SHA25692df0efd265ff7c218b5a1322fc74a3f2d776a8d5a670c87c765448e5ee320f3
SHA512ff3c8c30a40a47c7a75f989ae825fcf5d6fa4b0fdb6e1dda3129cafeeea1d84b53cdd3e54445e9dadfbe617e87e53fd5a795b375675001bbbc5243c82a19ea59
-
Filesize
255KB
MD5eb2f84b336d45eb9311d59f04a41fd49
SHA1caeb1aabaf8b49ec04f515298b2e1f8c097aca89
SHA256e418605f29e74f697bb5cb0d0a32f30673c10dae233dc8f7fd9927cc09d7f31d
SHA51254a958917ca25d59459b610db29773adb74e3e8b7681ea67cf0db2a699d8540ad2508f5b40218e1547cf9a0d086cbdf3e0aa78509b3d6fa5a3566d1efa12d804
-
Filesize
255KB
MD5eb2f84b336d45eb9311d59f04a41fd49
SHA1caeb1aabaf8b49ec04f515298b2e1f8c097aca89
SHA256e418605f29e74f697bb5cb0d0a32f30673c10dae233dc8f7fd9927cc09d7f31d
SHA51254a958917ca25d59459b610db29773adb74e3e8b7681ea67cf0db2a699d8540ad2508f5b40218e1547cf9a0d086cbdf3e0aa78509b3d6fa5a3566d1efa12d804
-
Filesize
255KB
MD59dfc6f51cace96dae60e1fcb9613724a
SHA114fa59e32ef2e7ed8ea708eefd08a3144a5f5c60
SHA2566100a3519dd12f69e219fefab3f54d0f49dba8d1aca9cc6f9cb87f0f46720f89
SHA512986d5321b2ebbaaeccfa78b8fabaef112747280a693be80f8fd7a8a61f9214f5ff764003873e0fe814c9cb6b33e8fa74c6f0202013a46aa259712f8e9193e18a
-
Filesize
255KB
MD59dfc6f51cace96dae60e1fcb9613724a
SHA114fa59e32ef2e7ed8ea708eefd08a3144a5f5c60
SHA2566100a3519dd12f69e219fefab3f54d0f49dba8d1aca9cc6f9cb87f0f46720f89
SHA512986d5321b2ebbaaeccfa78b8fabaef112747280a693be80f8fd7a8a61f9214f5ff764003873e0fe814c9cb6b33e8fa74c6f0202013a46aa259712f8e9193e18a
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD57dc4602b021c5468546d666254d6b4c7
SHA10363d9e8005498e209a50653f91d4b42c0587a7f
SHA256c85cfc2585963ced2e3174cf7d7df1f5a3ae3434f7f6e4538c8b294417634f5e
SHA512ad859121e7c119ce69de01042b9b849431e67db33742f590edee8a0ab9bb8ef0df940699853cd5dd6f633c731924c08f170f7f7d1c49022a30855046b320911c
-
Filesize
255KB
MD57dc4602b021c5468546d666254d6b4c7
SHA10363d9e8005498e209a50653f91d4b42c0587a7f
SHA256c85cfc2585963ced2e3174cf7d7df1f5a3ae3434f7f6e4538c8b294417634f5e
SHA512ad859121e7c119ce69de01042b9b849431e67db33742f590edee8a0ab9bb8ef0df940699853cd5dd6f633c731924c08f170f7f7d1c49022a30855046b320911c
-
Filesize
255KB
MD5a5d6df9a027cf5210c561724ee37b703
SHA15f195481e01d995923814cda657750da94579231
SHA25692df0efd265ff7c218b5a1322fc74a3f2d776a8d5a670c87c765448e5ee320f3
SHA512ff3c8c30a40a47c7a75f989ae825fcf5d6fa4b0fdb6e1dda3129cafeeea1d84b53cdd3e54445e9dadfbe617e87e53fd5a795b375675001bbbc5243c82a19ea59
-
Filesize
255KB
MD5eb2f84b336d45eb9311d59f04a41fd49
SHA1caeb1aabaf8b49ec04f515298b2e1f8c097aca89
SHA256e418605f29e74f697bb5cb0d0a32f30673c10dae233dc8f7fd9927cc09d7f31d
SHA51254a958917ca25d59459b610db29773adb74e3e8b7681ea67cf0db2a699d8540ad2508f5b40218e1547cf9a0d086cbdf3e0aa78509b3d6fa5a3566d1efa12d804
-
Filesize
255KB
MD59dfc6f51cace96dae60e1fcb9613724a
SHA114fa59e32ef2e7ed8ea708eefd08a3144a5f5c60
SHA2566100a3519dd12f69e219fefab3f54d0f49dba8d1aca9cc6f9cb87f0f46720f89
SHA512986d5321b2ebbaaeccfa78b8fabaef112747280a693be80f8fd7a8a61f9214f5ff764003873e0fe814c9cb6b33e8fa74c6f0202013a46aa259712f8e9193e18a