Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
8757t68657.rtf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8757t68657.rtf
Resource
win10v2004-20230220-en
General
-
Target
8757t68657.rtf
-
Size
1.2MB
-
MD5
4235233ad7b597102f4487fc1a60a626
-
SHA1
bc5b2271e68226a88af51453b0d8457f14bb6ca9
-
SHA256
e0c35894a02a5ffeca20200d4cb17e9b354c953d5704794242117c4e6307ca08
-
SHA512
edd8efdb085e2adcd564f49b73873fa2c699545421dba1807a72842ccd8af5b2ac6e7221b2e5568fd472aa18b90ba71afb688dce94fe6a1d1dd46a4fd5f52632
-
SSDEEP
24576:vGJPA5UEY+zNc5mLmUXhXB8hfHK9AoaIS4LMSpMp76I3xNBsFIEdOlq8VawE4kSC:p
Malware Config
Extracted
formbook
4.1
b07o
rpalmerdecorating.co.uk
magellanalytics.net
28yorkave.com
woodburnershop.co.uk
jcw-media.com
helinica.com
yuaneju.com
akypan.top
cavidahome.com
annaswiatkowski.com
123findcapital.com
danielle.nyc
dhcons.click
ocnarf.co.uk
1wowoc.top
corbett.one
extersolutions.com
fcukart.com
fadaona.online
guangness.top
theretailclassroom.africa
christmasshop.boutique
aibaosc.com
bosscityteens.com
325978.xyz
informationdata92533.com
takingtechdowntown.com
hnaspi.xyz
feixiu99.com
ldkj084.vip
coverqwxc.com
gonanooklahoma.com
diabeticfeetsigns.site
lawtonsr.com
hampshireequineservices.org.uk
halftofull.com
drajanainamiranda.com
childcareworkerjobssearch.life
thepornaview.com
ascestates.com
782258.com
djkiralamaistanbul.click
elionee.com
cylligandiy.com
hapestdatexts.com
eltres.fun
fy-hotel.com
f52.shop
denverrealtytrends.com
liseecreacionesartesanales.com
onescribe.app
jj365.vip
ljbalm.com
thetechbuild.com
festadosamigosdorancho.com
experia-sa.com
gustavohenriqueads.site
healthymart.africa
allbrightpros.com
425washington.com
izarmarketing.com
tryfas.com
dccmovil.com
experience-city.com
kscompetitions.co.uk
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/328-81-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/328-94-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/328-99-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1132-103-0x0000000000080000-0x00000000000AF000-memory.dmp formbook behavioral1/memory/1132-105-0x0000000000080000-0x00000000000AF000-memory.dmp formbook -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 968 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1460 word.exe 672 wdawsu.exe 328 wdawsu.exe -
Loads dropped DLL 4 IoCs
pid Process 968 EQNEDT32.EXE 1460 word.exe 1460 word.exe 672 wdawsu.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 672 set thread context of 328 672 wdawsu.exe 33 PID 328 set thread context of 1228 328 wdawsu.exe 15 PID 328 set thread context of 1228 328 wdawsu.exe 15 PID 1132 set thread context of 1228 1132 help.exe 15 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 968 EQNEDT32.EXE -
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1712 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 328 wdawsu.exe 328 wdawsu.exe 328 wdawsu.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe 1132 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1228 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 672 wdawsu.exe 328 wdawsu.exe 328 wdawsu.exe 328 wdawsu.exe 328 wdawsu.exe 1132 help.exe 1132 help.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 328 wdawsu.exe Token: SeShutdownPrivilege 1228 Explorer.EXE Token: SeShutdownPrivilege 1228 Explorer.EXE Token: SeShutdownPrivilege 1228 Explorer.EXE Token: SeDebugPrivilege 1132 help.exe Token: SeShutdownPrivilege 1228 Explorer.EXE Token: SeShutdownPrivilege 1228 Explorer.EXE -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1712 WINWORD.EXE 1712 WINWORD.EXE -
Suspicious use of UnmapMainImage 9 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 968 wrote to memory of 1460 968 EQNEDT32.EXE 31 PID 968 wrote to memory of 1460 968 EQNEDT32.EXE 31 PID 968 wrote to memory of 1460 968 EQNEDT32.EXE 31 PID 968 wrote to memory of 1460 968 EQNEDT32.EXE 31 PID 1460 wrote to memory of 672 1460 word.exe 32 PID 1460 wrote to memory of 672 1460 word.exe 32 PID 1460 wrote to memory of 672 1460 word.exe 32 PID 1460 wrote to memory of 672 1460 word.exe 32 PID 672 wrote to memory of 328 672 wdawsu.exe 33 PID 672 wrote to memory of 328 672 wdawsu.exe 33 PID 672 wrote to memory of 328 672 wdawsu.exe 33 PID 672 wrote to memory of 328 672 wdawsu.exe 33 PID 672 wrote to memory of 328 672 wdawsu.exe 33 PID 328 wrote to memory of 1132 328 wdawsu.exe 36 PID 328 wrote to memory of 1132 328 wdawsu.exe 36 PID 328 wrote to memory of 1132 328 wdawsu.exe 36 PID 328 wrote to memory of 1132 328 wdawsu.exe 36 PID 1132 wrote to memory of 1972 1132 help.exe 37 PID 1132 wrote to memory of 1972 1132 help.exe 37 PID 1132 wrote to memory of 1972 1132 help.exe 37 PID 1132 wrote to memory of 1972 1132 help.exe 37 PID 1712 wrote to memory of 1220 1712 WINWORD.EXE 39 PID 1712 wrote to memory of 1220 1712 WINWORD.EXE 39 PID 1712 wrote to memory of 1220 1712 WINWORD.EXE 39 PID 1712 wrote to memory of 1220 1712 WINWORD.EXE 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of UnmapMainImage
PID:1228 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8757t68657.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1220
-
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Roaming\word.exeC:\Users\Admin\AppData\Roaming\word.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\wdawsu.exe"C:\Users\Admin\AppData\Local\Temp\wdawsu.exe" C:\Users\Admin\AppData\Local\Temp\hemeats.oj3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\wdawsu.exe"C:\Users\Admin\AppData\Local\Temp\wdawsu.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\wdawsu.exe"6⤵PID:1972
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD58ce91e5eeafa68e51bef3f50c926381e
SHA15cb5d92062d179dd39914cc7852bce0810a70ef7
SHA2569347e51b2ded98d80c0855c7fc644d0b81901e83362926f7f257a20eb4338933
SHA5124bc66f74ff1604915f84b6a72fa3e3750bc7a75c7a65f54fc9c581bbd1fa0d1d24fa30f3e645fdff44973fd5df3c18f31bd13f120eb7debd4944af0c925cd638
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
205KB
MD5b26a681caac74047d4a6c33914acd445
SHA1ca601d937bcf02cb56a60743b2e7e7c228bb1b71
SHA256c4d973da2c0cdc665178d02a480d80549a19166bd8653bfb28097a12d7d52133
SHA512e1f4fc14e8b1bd8b4c882139060570dd022e7a902321c496e2fe137c2b95e91ae5384ea61f3a5e5b78a0019ea1cbbe6d8b5f12163fcf437a7039af8dfea47a8d
-
Filesize
20KB
MD597e99b04c4fe2ef0458b48763536071a
SHA1bc299f83aaf797053334d6b8ada5322ec3c0f7a1
SHA256baa42f283e9ea48bc944bcbb57f495f029a1f54522acad24d48d315ae89023ee
SHA51218dfe22df2c81d5daffb08b6e7f05dc5d7082a9078aea0f99d2fc9e4ba0e132d91fded5d3a2fbc7b7bd918c2e608b630e5c9797b896aee28606b87f639524a13
-
Filesize
304KB
MD5fd498a1be2c83df884266ad732f7a3c4
SHA1d75f3be9a3ab927ede5e4953a28c99e6b2584cec
SHA256d79d4f61a8ac7e72f4b51fd872317a7d9feb84a46e47bebd09eb60c8a34ec057
SHA512b1280bce16fb24c3b042eb391faf846da9cf3409ca6ac21d1f584b14c1f9737b7e7cf1fecf47b8ed49ab26df1f53af69972806a5656d7ae10adaa70005a93772
-
Filesize
304KB
MD5fd498a1be2c83df884266ad732f7a3c4
SHA1d75f3be9a3ab927ede5e4953a28c99e6b2584cec
SHA256d79d4f61a8ac7e72f4b51fd872317a7d9feb84a46e47bebd09eb60c8a34ec057
SHA512b1280bce16fb24c3b042eb391faf846da9cf3409ca6ac21d1f584b14c1f9737b7e7cf1fecf47b8ed49ab26df1f53af69972806a5656d7ae10adaa70005a93772
-
Filesize
304KB
MD5fd498a1be2c83df884266ad732f7a3c4
SHA1d75f3be9a3ab927ede5e4953a28c99e6b2584cec
SHA256d79d4f61a8ac7e72f4b51fd872317a7d9feb84a46e47bebd09eb60c8a34ec057
SHA512b1280bce16fb24c3b042eb391faf846da9cf3409ca6ac21d1f584b14c1f9737b7e7cf1fecf47b8ed49ab26df1f53af69972806a5656d7ae10adaa70005a93772
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
99KB
MD5a4a3e5290096411bb27f8c7ad4575eca
SHA15c8a178bf433816679de285e1d136b307b0ac38c
SHA25612a7cd1058647b4bf7e712fe8e35c252df238d9620700f1757c65d1c734767ea
SHA512f8c50e847938694cde24d5b5a0987fce7359bdfd84b65de607e2cfcb3400f00d0afcfc0d3f9884f60aa0804f6d5431632f49ef55ca99fde8191812d21031fa77
-
Filesize
304KB
MD5fd498a1be2c83df884266ad732f7a3c4
SHA1d75f3be9a3ab927ede5e4953a28c99e6b2584cec
SHA256d79d4f61a8ac7e72f4b51fd872317a7d9feb84a46e47bebd09eb60c8a34ec057
SHA512b1280bce16fb24c3b042eb391faf846da9cf3409ca6ac21d1f584b14c1f9737b7e7cf1fecf47b8ed49ab26df1f53af69972806a5656d7ae10adaa70005a93772