Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 12:01
Behavioral task
behavioral1
Sample
1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe
Resource
win7-20220812-en
General
-
Target
1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe
-
Size
255KB
-
MD5
375655291410422037c0f7bf32b99510
-
SHA1
1eb960609dd7b140f83d7a1a076763d4724d537e
-
SHA256
1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b
-
SHA512
acc6045c659cd78e77cd73bac34a70c467d7369b0381bc560ed3243780d403757cda94210597145887b6389fa652f8a6a856dbd69543c32b4269df4e58b7c8d4
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJ/:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tmlypexfcn.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tmlypexfcn.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tmlypexfcn.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" tmlypexfcn.exe -
Executes dropped EXE 6 IoCs
pid Process 1964 tmlypexfcn.exe 1632 hsrplhendouaura.exe 1396 lxxqhtjh.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 536 lxxqhtjh.exe -
resource yara_rule behavioral1/memory/2044-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/memory/2044-57-0x0000000002F70000-0x0000000003010000-memory.dmp upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/files/0x000a0000000133a7-62.dat upx behavioral1/files/0x000a0000000133a7-64.dat upx behavioral1/files/0x00080000000139cc-66.dat upx behavioral1/files/0x00080000000139cc-68.dat upx behavioral1/files/0x00080000000139cc-71.dat upx behavioral1/files/0x000a0000000133a7-70.dat upx behavioral1/files/0x00070000000139dc-72.dat upx behavioral1/files/0x00070000000139dc-74.dat upx behavioral1/files/0x00070000000139dc-76.dat upx behavioral1/memory/1964-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1632-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1448-82-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1396-81-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00070000000139dc-83.dat upx behavioral1/files/0x00070000000139dc-85.dat upx behavioral1/memory/980-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x00080000000139cc-88.dat upx behavioral1/files/0x00080000000139cc-90.dat upx behavioral1/memory/536-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2044-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1964-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1632-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1396-99-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/1448-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/980-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/536-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x000600000001462a-107.dat upx behavioral1/files/0x000600000001462a-108.dat upx behavioral1/files/0x000600000001462a-109.dat upx behavioral1/files/0x000600000001466f-110.dat upx behavioral1/files/0x00060000000146a9-114.dat upx -
Loads dropped DLL 6 IoCs
pid Process 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 880 cmd.exe 1964 tmlypexfcn.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" tmlypexfcn.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run hsrplhendouaura.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lkosidwf = "tmlypexfcn.exe" hsrplhendouaura.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sbzqrlff = "hsrplhendouaura.exe" hsrplhendouaura.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "cebghzibgdzrp.exe" hsrplhendouaura.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\s: lxxqhtjh.exe File opened (read-only) \??\b: tmlypexfcn.exe File opened (read-only) \??\q: tmlypexfcn.exe File opened (read-only) \??\r: tmlypexfcn.exe File opened (read-only) \??\b: lxxqhtjh.exe File opened (read-only) \??\t: lxxqhtjh.exe File opened (read-only) \??\w: lxxqhtjh.exe File opened (read-only) \??\m: lxxqhtjh.exe File opened (read-only) \??\z: lxxqhtjh.exe File opened (read-only) \??\g: tmlypexfcn.exe File opened (read-only) \??\n: tmlypexfcn.exe File opened (read-only) \??\y: tmlypexfcn.exe File opened (read-only) \??\z: tmlypexfcn.exe File opened (read-only) \??\h: lxxqhtjh.exe File opened (read-only) \??\l: lxxqhtjh.exe File opened (read-only) \??\k: lxxqhtjh.exe File opened (read-only) \??\o: lxxqhtjh.exe File opened (read-only) \??\o: tmlypexfcn.exe File opened (read-only) \??\a: lxxqhtjh.exe File opened (read-only) \??\i: lxxqhtjh.exe File opened (read-only) \??\m: lxxqhtjh.exe File opened (read-only) \??\l: lxxqhtjh.exe File opened (read-only) \??\v: lxxqhtjh.exe File opened (read-only) \??\y: lxxqhtjh.exe File opened (read-only) \??\v: tmlypexfcn.exe File opened (read-only) \??\k: lxxqhtjh.exe File opened (read-only) \??\u: lxxqhtjh.exe File opened (read-only) \??\n: lxxqhtjh.exe File opened (read-only) \??\j: lxxqhtjh.exe File opened (read-only) \??\x: lxxqhtjh.exe File opened (read-only) \??\j: tmlypexfcn.exe File opened (read-only) \??\s: tmlypexfcn.exe File opened (read-only) \??\x: tmlypexfcn.exe File opened (read-only) \??\u: lxxqhtjh.exe File opened (read-only) \??\y: lxxqhtjh.exe File opened (read-only) \??\z: lxxqhtjh.exe File opened (read-only) \??\r: lxxqhtjh.exe File opened (read-only) \??\i: tmlypexfcn.exe File opened (read-only) \??\t: tmlypexfcn.exe File opened (read-only) \??\p: lxxqhtjh.exe File opened (read-only) \??\g: lxxqhtjh.exe File opened (read-only) \??\o: lxxqhtjh.exe File opened (read-only) \??\q: lxxqhtjh.exe File opened (read-only) \??\m: tmlypexfcn.exe File opened (read-only) \??\e: lxxqhtjh.exe File opened (read-only) \??\n: lxxqhtjh.exe File opened (read-only) \??\f: lxxqhtjh.exe File opened (read-only) \??\u: tmlypexfcn.exe File opened (read-only) \??\q: lxxqhtjh.exe File opened (read-only) \??\p: lxxqhtjh.exe File opened (read-only) \??\w: lxxqhtjh.exe File opened (read-only) \??\e: tmlypexfcn.exe File opened (read-only) \??\f: tmlypexfcn.exe File opened (read-only) \??\g: lxxqhtjh.exe File opened (read-only) \??\t: lxxqhtjh.exe File opened (read-only) \??\h: lxxqhtjh.exe File opened (read-only) \??\h: tmlypexfcn.exe File opened (read-only) \??\l: tmlypexfcn.exe File opened (read-only) \??\p: tmlypexfcn.exe File opened (read-only) \??\a: lxxqhtjh.exe File opened (read-only) \??\k: tmlypexfcn.exe File opened (read-only) \??\x: lxxqhtjh.exe File opened (read-only) \??\i: lxxqhtjh.exe File opened (read-only) \??\s: lxxqhtjh.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" tmlypexfcn.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" tmlypexfcn.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2044-55-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1964-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1632-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1448-82-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1396-81-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/980-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/536-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2044-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1964-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1632-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1396-99-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/1448-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/980-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/536-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tmlypexfcn.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File created C:\Windows\SysWOW64\lxxqhtjh.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File created C:\Windows\SysWOW64\cebghzibgdzrp.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File opened for modification C:\Windows\SysWOW64\cebghzibgdzrp.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File created C:\Windows\SysWOW64\tmlypexfcn.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File created C:\Windows\SysWOW64\hsrplhendouaura.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File opened for modification C:\Windows\SysWOW64\hsrplhendouaura.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File opened for modification C:\Windows\SysWOW64\lxxqhtjh.exe 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll tmlypexfcn.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lxxqhtjh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lxxqhtjh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal lxxqhtjh.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lxxqhtjh.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe lxxqhtjh.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe lxxqhtjh.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" tmlypexfcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tmlypexfcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC7B05B44E638E353BDB9D6329FD7CE" 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs tmlypexfcn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32472C0C9C2582566D4576D5772E2CD87DF664D7" 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" tmlypexfcn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8BFF82485D856F9130D62D7D9CBDEFE135594366366245D6EB" 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc tmlypexfcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" tmlypexfcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193AC6081491DBC5B9BD7CE8EDE334CF" 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1732 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 1632 hsrplhendouaura.exe 1448 cebghzibgdzrp.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1964 tmlypexfcn.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1632 hsrplhendouaura.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1396 lxxqhtjh.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 1448 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 980 cebghzibgdzrp.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe 536 lxxqhtjh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 WINWORD.EXE 1732 WINWORD.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1964 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 26 PID 2044 wrote to memory of 1964 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 26 PID 2044 wrote to memory of 1964 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 26 PID 2044 wrote to memory of 1964 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 26 PID 2044 wrote to memory of 1632 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 27 PID 2044 wrote to memory of 1632 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 27 PID 2044 wrote to memory of 1632 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 27 PID 2044 wrote to memory of 1632 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 27 PID 2044 wrote to memory of 1396 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 28 PID 2044 wrote to memory of 1396 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 28 PID 2044 wrote to memory of 1396 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 28 PID 2044 wrote to memory of 1396 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 28 PID 2044 wrote to memory of 1448 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 29 PID 2044 wrote to memory of 1448 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 29 PID 2044 wrote to memory of 1448 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 29 PID 2044 wrote to memory of 1448 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 29 PID 1632 wrote to memory of 880 1632 hsrplhendouaura.exe 30 PID 1632 wrote to memory of 880 1632 hsrplhendouaura.exe 30 PID 1632 wrote to memory of 880 1632 hsrplhendouaura.exe 30 PID 1632 wrote to memory of 880 1632 hsrplhendouaura.exe 30 PID 880 wrote to memory of 980 880 cmd.exe 32 PID 880 wrote to memory of 980 880 cmd.exe 32 PID 880 wrote to memory of 980 880 cmd.exe 32 PID 880 wrote to memory of 980 880 cmd.exe 32 PID 1964 wrote to memory of 536 1964 tmlypexfcn.exe 33 PID 1964 wrote to memory of 536 1964 tmlypexfcn.exe 33 PID 1964 wrote to memory of 536 1964 tmlypexfcn.exe 33 PID 1964 wrote to memory of 536 1964 tmlypexfcn.exe 33 PID 2044 wrote to memory of 1732 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 34 PID 2044 wrote to memory of 1732 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 34 PID 2044 wrote to memory of 1732 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 34 PID 2044 wrote to memory of 1732 2044 1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe 34 PID 1732 wrote to memory of 1612 1732 WINWORD.EXE 38 PID 1732 wrote to memory of 1612 1732 WINWORD.EXE 38 PID 1732 wrote to memory of 1612 1732 WINWORD.EXE 38 PID 1732 wrote to memory of 1612 1732 WINWORD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe"C:\Users\Admin\AppData\Local\Temp\1d3bc4aa4300138a2e0d8b3e214fa98816c084887ea63fd310c03705fdf0f07b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\tmlypexfcn.exetmlypexfcn.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\lxxqhtjh.exeC:\Windows\system32\lxxqhtjh.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:536
-
-
-
C:\Windows\SysWOW64\hsrplhendouaura.exehsrplhendouaura.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd.exe /c cebghzibgdzrp.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cebghzibgdzrp.execebghzibgdzrp.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:980
-
-
-
-
C:\Windows\SysWOW64\lxxqhtjh.exelxxqhtjh.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1396
-
-
C:\Windows\SysWOW64\cebghzibgdzrp.execebghzibgdzrp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1448
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1612
-
-
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD57e060e0a364fca364daac7a4f3fbdbc6
SHA1501e44c9f3fdccac87d1a35fcbea63b7f891427e
SHA256eadc5792fddf8887dad4748fb2b0e169ecce860f89818864e745b86c84ac9973
SHA5125c6e7fe964d1ff3b52403c7154aabba40ac9d9dc0bf91811eaa662aa0d4db5cbfff43dfc76ce894108f6bc9e284bedf2657219b19e0a28e19486c427c1413950
-
Filesize
255KB
MD518fb3868a34c37eeeb31e1839f3ab3d5
SHA1b385077d54e14f0ee74ca3e3202133b632e5c0c5
SHA25665a63da69445383fabbaa0c6cd57839360edc0e0fa4a99c6da49b07cbd24aa2b
SHA512f53bb83353c53cbf3068fa9cb18dd576dfa0d97ffbe3c3b5b582a37e44e09d1d273e9f2b0dcd3d1f290da8ca03b2ddd9ec63b7132c3cf5f4ff990b6f5cf6056f
-
Filesize
255KB
MD55e3464f0df76be39020488d3a625b268
SHA1887828ab8473244e357f1a0f8d92352135ce7663
SHA2568b0509e4510f5bc5cfa648790201fbdcf1da0bac97243919eb1d1b365a068d42
SHA51277baa7b4ea1255e7722146539ba733d6a6576f86a278f6280ef9f52052329c3e3658c3878c0871add088ad1ae61fff1eac63d6de8bbedaaf2d232957379b959e
-
Filesize
255KB
MD56a8aa349ff306572c3c3778d652e9e09
SHA16bd6fc56a1f15dab98cebb0880f82658000ab351
SHA2566fd49d430c858c7a0940a831a7048a1f9f91349a968175e53773002478f577d7
SHA512468fcbc1da5817daaf910ab45b3a932f61e7ac3f15eb329b6e0bc5d4c2906b5d87c1770006501675b805103674c1030d65d3d2baab109681c2aac3f1b24ecfa8
-
Filesize
255KB
MD5cbc0173ec976e350cc827eb2f8924c8b
SHA18fabc10fb0c628097d5d3c7601d08ed19a242899
SHA256a5de498fad751f622d6b3df0b18f33ed89d990f37fab49c30b4fc873754078a0
SHA512d6609894eefcc884d910c59609515fced0344275a27593bd57df83b9798bde8a4156d6ecdc593120116a442fd0549ca2e4acac8ad947466d1f6b7aeba5070abb
-
Filesize
255KB
MD5cbc0173ec976e350cc827eb2f8924c8b
SHA18fabc10fb0c628097d5d3c7601d08ed19a242899
SHA256a5de498fad751f622d6b3df0b18f33ed89d990f37fab49c30b4fc873754078a0
SHA512d6609894eefcc884d910c59609515fced0344275a27593bd57df83b9798bde8a4156d6ecdc593120116a442fd0549ca2e4acac8ad947466d1f6b7aeba5070abb
-
Filesize
255KB
MD5cbc0173ec976e350cc827eb2f8924c8b
SHA18fabc10fb0c628097d5d3c7601d08ed19a242899
SHA256a5de498fad751f622d6b3df0b18f33ed89d990f37fab49c30b4fc873754078a0
SHA512d6609894eefcc884d910c59609515fced0344275a27593bd57df83b9798bde8a4156d6ecdc593120116a442fd0549ca2e4acac8ad947466d1f6b7aeba5070abb
-
Filesize
255KB
MD55f4d7cd80e51a39d2c168ec0dd682a2d
SHA18f8421832161ce95df6203549018ee4fe8561802
SHA256b3722d51bd5d1b3165a22f893cdb41a3a36c59433c9f6bc11d4186d4b3a5a033
SHA512d01000e253624dcd0f4687c04f4948763b1808b99aea7c4b7eb424f10e3fc1ec4540b6fe17e3142dcde0e8cc869c16ea9dd9553590c5b4e8498e7de2f28f79c8
-
Filesize
255KB
MD55f4d7cd80e51a39d2c168ec0dd682a2d
SHA18f8421832161ce95df6203549018ee4fe8561802
SHA256b3722d51bd5d1b3165a22f893cdb41a3a36c59433c9f6bc11d4186d4b3a5a033
SHA512d01000e253624dcd0f4687c04f4948763b1808b99aea7c4b7eb424f10e3fc1ec4540b6fe17e3142dcde0e8cc869c16ea9dd9553590c5b4e8498e7de2f28f79c8
-
Filesize
255KB
MD503f9bd20435c15a5ca30cc4254237d23
SHA18fa13686ffd50835460eb3b3a77932db15c950a9
SHA256d60059e3fb28539d9024b01085a2c150406b3423dd082e32271ae2a5fb3a75e0
SHA512e22f533f46e54e8613951af5c5b1991597fb65ade5399a7b68b1698bd2a668b6d3f9269a2b809d178bf75a311c4860b25e1ae344b4091b5eca6400940b8ae440
-
Filesize
255KB
MD503f9bd20435c15a5ca30cc4254237d23
SHA18fa13686ffd50835460eb3b3a77932db15c950a9
SHA256d60059e3fb28539d9024b01085a2c150406b3423dd082e32271ae2a5fb3a75e0
SHA512e22f533f46e54e8613951af5c5b1991597fb65ade5399a7b68b1698bd2a668b6d3f9269a2b809d178bf75a311c4860b25e1ae344b4091b5eca6400940b8ae440
-
Filesize
255KB
MD503f9bd20435c15a5ca30cc4254237d23
SHA18fa13686ffd50835460eb3b3a77932db15c950a9
SHA256d60059e3fb28539d9024b01085a2c150406b3423dd082e32271ae2a5fb3a75e0
SHA512e22f533f46e54e8613951af5c5b1991597fb65ade5399a7b68b1698bd2a668b6d3f9269a2b809d178bf75a311c4860b25e1ae344b4091b5eca6400940b8ae440
-
Filesize
255KB
MD57e060e0a364fca364daac7a4f3fbdbc6
SHA1501e44c9f3fdccac87d1a35fcbea63b7f891427e
SHA256eadc5792fddf8887dad4748fb2b0e169ecce860f89818864e745b86c84ac9973
SHA5125c6e7fe964d1ff3b52403c7154aabba40ac9d9dc0bf91811eaa662aa0d4db5cbfff43dfc76ce894108f6bc9e284bedf2657219b19e0a28e19486c427c1413950
-
Filesize
255KB
MD57e060e0a364fca364daac7a4f3fbdbc6
SHA1501e44c9f3fdccac87d1a35fcbea63b7f891427e
SHA256eadc5792fddf8887dad4748fb2b0e169ecce860f89818864e745b86c84ac9973
SHA5125c6e7fe964d1ff3b52403c7154aabba40ac9d9dc0bf91811eaa662aa0d4db5cbfff43dfc76ce894108f6bc9e284bedf2657219b19e0a28e19486c427c1413950
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5281584218d15adf065dbfb165c42f8ce
SHA13c1a3a9a9a941637f9aff00c1b5ee18910a6c21b
SHA256f1e1a0c7f3f5bcaaf947f8d7a56c38e4285595c6a2776051666d2328afce7f18
SHA512a4eaac9dd52cac70f1d3c5f8dc42d12ae535486f76b40640dea7b4621167bbca20d7e5c6a07d81ea2226d111722bf5d76eeb3de39286a9add2029f0b726f7665
-
Filesize
255KB
MD5cbc0173ec976e350cc827eb2f8924c8b
SHA18fabc10fb0c628097d5d3c7601d08ed19a242899
SHA256a5de498fad751f622d6b3df0b18f33ed89d990f37fab49c30b4fc873754078a0
SHA512d6609894eefcc884d910c59609515fced0344275a27593bd57df83b9798bde8a4156d6ecdc593120116a442fd0549ca2e4acac8ad947466d1f6b7aeba5070abb
-
Filesize
255KB
MD5cbc0173ec976e350cc827eb2f8924c8b
SHA18fabc10fb0c628097d5d3c7601d08ed19a242899
SHA256a5de498fad751f622d6b3df0b18f33ed89d990f37fab49c30b4fc873754078a0
SHA512d6609894eefcc884d910c59609515fced0344275a27593bd57df83b9798bde8a4156d6ecdc593120116a442fd0549ca2e4acac8ad947466d1f6b7aeba5070abb
-
Filesize
255KB
MD55f4d7cd80e51a39d2c168ec0dd682a2d
SHA18f8421832161ce95df6203549018ee4fe8561802
SHA256b3722d51bd5d1b3165a22f893cdb41a3a36c59433c9f6bc11d4186d4b3a5a033
SHA512d01000e253624dcd0f4687c04f4948763b1808b99aea7c4b7eb424f10e3fc1ec4540b6fe17e3142dcde0e8cc869c16ea9dd9553590c5b4e8498e7de2f28f79c8
-
Filesize
255KB
MD503f9bd20435c15a5ca30cc4254237d23
SHA18fa13686ffd50835460eb3b3a77932db15c950a9
SHA256d60059e3fb28539d9024b01085a2c150406b3423dd082e32271ae2a5fb3a75e0
SHA512e22f533f46e54e8613951af5c5b1991597fb65ade5399a7b68b1698bd2a668b6d3f9269a2b809d178bf75a311c4860b25e1ae344b4091b5eca6400940b8ae440
-
Filesize
255KB
MD503f9bd20435c15a5ca30cc4254237d23
SHA18fa13686ffd50835460eb3b3a77932db15c950a9
SHA256d60059e3fb28539d9024b01085a2c150406b3423dd082e32271ae2a5fb3a75e0
SHA512e22f533f46e54e8613951af5c5b1991597fb65ade5399a7b68b1698bd2a668b6d3f9269a2b809d178bf75a311c4860b25e1ae344b4091b5eca6400940b8ae440
-
Filesize
255KB
MD57e060e0a364fca364daac7a4f3fbdbc6
SHA1501e44c9f3fdccac87d1a35fcbea63b7f891427e
SHA256eadc5792fddf8887dad4748fb2b0e169ecce860f89818864e745b86c84ac9973
SHA5125c6e7fe964d1ff3b52403c7154aabba40ac9d9dc0bf91811eaa662aa0d4db5cbfff43dfc76ce894108f6bc9e284bedf2657219b19e0a28e19486c427c1413950