Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 23:02
Static task
static1
Behavioral task
behavioral1
Sample
17ddb4edf577c9143cab458936f7fa04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17ddb4edf577c9143cab458936f7fa04.exe
Resource
win10v2004-20231215-en
General
-
Target
17ddb4edf577c9143cab458936f7fa04.exe
-
Size
512KB
-
MD5
17ddb4edf577c9143cab458936f7fa04
-
SHA1
3fcb06b9c98fe4d8aa4778c33a76353bcbf2af15
-
SHA256
0f65f212348cc045f8cdd39ac4a2a63f626841eb02e7c50bd73b62567befcc3d
-
SHA512
bfa99ecad681a5360ec3f2083b9640329a7d7f849173fa4d6c12f2526f9da29dc1dd9ce672f8e3c3cdd4b096559c9eb5f17187a9a2e8ed587c313437ce063a34
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm59
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wtyyqxsjev.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wtyyqxsjev.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wtyyqxsjev.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wtyyqxsjev.exe -
Executes dropped EXE 5 IoCs
pid Process 2560 wtyyqxsjev.exe 3020 xjqgamnvpxbukhy.exe 2716 mjtwymxr.exe 2808 jbvzbelaaalxe.exe 2944 mjtwymxr.exe -
Loads dropped DLL 5 IoCs
pid Process 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 2560 wtyyqxsjev.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" wtyyqxsjev.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mxfhzjih = "wtyyqxsjev.exe" xjqgamnvpxbukhy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mkyjuhkl = "xjqgamnvpxbukhy.exe" xjqgamnvpxbukhy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "jbvzbelaaalxe.exe" xjqgamnvpxbukhy.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: mjtwymxr.exe File opened (read-only) \??\i: mjtwymxr.exe File opened (read-only) \??\m: mjtwymxr.exe File opened (read-only) \??\o: mjtwymxr.exe File opened (read-only) \??\n: wtyyqxsjev.exe File opened (read-only) \??\e: mjtwymxr.exe File opened (read-only) \??\m: wtyyqxsjev.exe File opened (read-only) \??\y: wtyyqxsjev.exe File opened (read-only) \??\i: mjtwymxr.exe File opened (read-only) \??\e: mjtwymxr.exe File opened (read-only) \??\j: mjtwymxr.exe File opened (read-only) \??\k: mjtwymxr.exe File opened (read-only) \??\x: mjtwymxr.exe File opened (read-only) \??\h: wtyyqxsjev.exe File opened (read-only) \??\q: wtyyqxsjev.exe File opened (read-only) \??\j: mjtwymxr.exe File opened (read-only) \??\o: mjtwymxr.exe File opened (read-only) \??\b: mjtwymxr.exe File opened (read-only) \??\q: mjtwymxr.exe File opened (read-only) \??\s: mjtwymxr.exe File opened (read-only) \??\b: wtyyqxsjev.exe File opened (read-only) \??\k: wtyyqxsjev.exe File opened (read-only) \??\v: mjtwymxr.exe File opened (read-only) \??\j: wtyyqxsjev.exe File opened (read-only) \??\b: mjtwymxr.exe File opened (read-only) \??\k: mjtwymxr.exe File opened (read-only) \??\q: mjtwymxr.exe File opened (read-only) \??\z: mjtwymxr.exe File opened (read-only) \??\o: wtyyqxsjev.exe File opened (read-only) \??\r: wtyyqxsjev.exe File opened (read-only) \??\t: mjtwymxr.exe File opened (read-only) \??\h: mjtwymxr.exe File opened (read-only) \??\u: mjtwymxr.exe File opened (read-only) \??\w: mjtwymxr.exe File opened (read-only) \??\a: mjtwymxr.exe File opened (read-only) \??\h: mjtwymxr.exe File opened (read-only) \??\r: mjtwymxr.exe File opened (read-only) \??\e: wtyyqxsjev.exe File opened (read-only) \??\l: wtyyqxsjev.exe File opened (read-only) \??\g: mjtwymxr.exe File opened (read-only) \??\p: mjtwymxr.exe File opened (read-only) \??\m: mjtwymxr.exe File opened (read-only) \??\i: wtyyqxsjev.exe File opened (read-only) \??\r: mjtwymxr.exe File opened (read-only) \??\a: wtyyqxsjev.exe File opened (read-only) \??\g: wtyyqxsjev.exe File opened (read-only) \??\t: wtyyqxsjev.exe File opened (read-only) \??\a: mjtwymxr.exe File opened (read-only) \??\x: mjtwymxr.exe File opened (read-only) \??\l: mjtwymxr.exe File opened (read-only) \??\v: mjtwymxr.exe File opened (read-only) \??\p: wtyyqxsjev.exe File opened (read-only) \??\n: mjtwymxr.exe File opened (read-only) \??\p: mjtwymxr.exe File opened (read-only) \??\t: mjtwymxr.exe File opened (read-only) \??\u: wtyyqxsjev.exe File opened (read-only) \??\w: wtyyqxsjev.exe File opened (read-only) \??\z: wtyyqxsjev.exe File opened (read-only) \??\n: mjtwymxr.exe File opened (read-only) \??\u: mjtwymxr.exe File opened (read-only) \??\y: mjtwymxr.exe File opened (read-only) \??\s: mjtwymxr.exe File opened (read-only) \??\y: mjtwymxr.exe File opened (read-only) \??\x: wtyyqxsjev.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" wtyyqxsjev.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" wtyyqxsjev.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1860-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0021000000015c63-9.dat autoit_exe behavioral1/files/0x000e000000012247-17.dat autoit_exe behavioral1/files/0x000b000000015610-24.dat autoit_exe behavioral1/files/0x0007000000015d8e-40.dat autoit_exe behavioral1/files/0x0005000000019340-66.dat autoit_exe behavioral1/files/0x0005000000019371-72.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\jbvzbelaaalxe.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\jbvzbelaaalxe.exe 17ddb4edf577c9143cab458936f7fa04.exe File created C:\Windows\SysWOW64\wtyyqxsjev.exe 17ddb4edf577c9143cab458936f7fa04.exe File created C:\Windows\SysWOW64\xjqgamnvpxbukhy.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\xjqgamnvpxbukhy.exe 17ddb4edf577c9143cab458936f7fa04.exe File created C:\Windows\SysWOW64\mjtwymxr.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\mjtwymxr.exe 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll wtyyqxsjev.exe File opened for modification C:\Windows\SysWOW64\wtyyqxsjev.exe 17ddb4edf577c9143cab458936f7fa04.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mjtwymxr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mjtwymxr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mjtwymxr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mjtwymxr.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mjtwymxr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mjtwymxr.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mjtwymxr.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 17ddb4edf577c9143cab458936f7fa04.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat wtyyqxsjev.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc wtyyqxsjev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs wtyyqxsjev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg wtyyqxsjev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf wtyyqxsjev.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2156 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 3020 xjqgamnvpxbukhy.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 3020 xjqgamnvpxbukhy.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 1860 17ddb4edf577c9143cab458936f7fa04.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 2560 wtyyqxsjev.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 3020 xjqgamnvpxbukhy.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2808 jbvzbelaaalxe.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2716 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe 2944 mjtwymxr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 WINWORD.EXE 2156 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2560 1860 17ddb4edf577c9143cab458936f7fa04.exe 28 PID 1860 wrote to memory of 2560 1860 17ddb4edf577c9143cab458936f7fa04.exe 28 PID 1860 wrote to memory of 2560 1860 17ddb4edf577c9143cab458936f7fa04.exe 28 PID 1860 wrote to memory of 2560 1860 17ddb4edf577c9143cab458936f7fa04.exe 28 PID 1860 wrote to memory of 3020 1860 17ddb4edf577c9143cab458936f7fa04.exe 29 PID 1860 wrote to memory of 3020 1860 17ddb4edf577c9143cab458936f7fa04.exe 29 PID 1860 wrote to memory of 3020 1860 17ddb4edf577c9143cab458936f7fa04.exe 29 PID 1860 wrote to memory of 3020 1860 17ddb4edf577c9143cab458936f7fa04.exe 29 PID 1860 wrote to memory of 2716 1860 17ddb4edf577c9143cab458936f7fa04.exe 30 PID 1860 wrote to memory of 2716 1860 17ddb4edf577c9143cab458936f7fa04.exe 30 PID 1860 wrote to memory of 2716 1860 17ddb4edf577c9143cab458936f7fa04.exe 30 PID 1860 wrote to memory of 2716 1860 17ddb4edf577c9143cab458936f7fa04.exe 30 PID 1860 wrote to memory of 2808 1860 17ddb4edf577c9143cab458936f7fa04.exe 31 PID 1860 wrote to memory of 2808 1860 17ddb4edf577c9143cab458936f7fa04.exe 31 PID 1860 wrote to memory of 2808 1860 17ddb4edf577c9143cab458936f7fa04.exe 31 PID 1860 wrote to memory of 2808 1860 17ddb4edf577c9143cab458936f7fa04.exe 31 PID 2560 wrote to memory of 2944 2560 wtyyqxsjev.exe 32 PID 2560 wrote to memory of 2944 2560 wtyyqxsjev.exe 32 PID 2560 wrote to memory of 2944 2560 wtyyqxsjev.exe 32 PID 2560 wrote to memory of 2944 2560 wtyyqxsjev.exe 32 PID 1860 wrote to memory of 2156 1860 17ddb4edf577c9143cab458936f7fa04.exe 33 PID 1860 wrote to memory of 2156 1860 17ddb4edf577c9143cab458936f7fa04.exe 33 PID 1860 wrote to memory of 2156 1860 17ddb4edf577c9143cab458936f7fa04.exe 33 PID 1860 wrote to memory of 2156 1860 17ddb4edf577c9143cab458936f7fa04.exe 33 PID 2156 wrote to memory of 1560 2156 WINWORD.EXE 36 PID 2156 wrote to memory of 1560 2156 WINWORD.EXE 36 PID 2156 wrote to memory of 1560 2156 WINWORD.EXE 36 PID 2156 wrote to memory of 1560 2156 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe"C:\Users\Admin\AppData\Local\Temp\17ddb4edf577c9143cab458936f7fa04.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\wtyyqxsjev.exewtyyqxsjev.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\mjtwymxr.exeC:\Windows\system32\mjtwymxr.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2944
-
-
-
C:\Windows\SysWOW64\xjqgamnvpxbukhy.exexjqgamnvpxbukhy.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3020
-
-
C:\Windows\SysWOW64\mjtwymxr.exemjtwymxr.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2716
-
-
C:\Windows\SysWOW64\jbvzbelaaalxe.exejbvzbelaaalxe.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2808
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5f160735721f2e243f33c5f9f6fbdfd48
SHA11d1e21a1e25fbddcb6fe92f1b6c0eb6f6cb6ed5c
SHA256bf013f7f0860fa836ff027afee4457944af31bd039e3646e44b53fb55da5aea6
SHA51270bfbaed7e86208251ffd3d552b288b4c211290be288fa62baac24f5732a2ef973faa16620f632eb34f73bbee4f10e7571a07274b0b75ed490a9fcd0dbeebe54
-
Filesize
512KB
MD53a87d3e90ed79fa1f0c23f40f258866e
SHA15224d422ced6fa04a928d7b04f97cbdcba67f6a0
SHA256ee93d94700d926d80ee8c4e3593082d23a7947091e5c70a6e131186f893cca81
SHA512a9dbaa934103942670a345882f7fb837192621e6769bd25924d95e173227cbbf99f2f0c5e3e0ecdfd1418e9d7e8c0d56b18a13c1bc8fc57f4239b8596f4bd8ad
-
Filesize
20KB
MD529df83496d78af93a9b9098095573345
SHA196ffdea3b58cdc6626923079ca9694ce121ec813
SHA2568aae0a4496f3d57c1cd41de14735584560d14352546aff7560ca843a3ac7eda6
SHA512ddf3452e39c198130b19faa9e7aaad41444937b6dba287ec41b2cca630563a201744f261631e172f47812b53010fa741f8a3efa25403424163029e776d0da823
-
Filesize
512KB
MD51b34aca2fad745062c7111f3ea6d8137
SHA16dba785a412890a5cd4b8d0c1846410fe3170772
SHA25610305108e38fec20d55e7916e07db7a1bd7bcb763a776ef230c8202101eadbce
SHA51208ef53ab7d52eb68d5a3256b750a4ea4a37c11fbb07109831e41ef0bd454b9ea75936064d8a5474dc4c150fad1563d59375e79c0295a09f460f9b85c53269c2e
-
Filesize
512KB
MD5427afd2b39902f8a6eaf14c15f52a751
SHA1162023b5de3996c446677e0b8bf8ff9bd32f412d
SHA256d21818f823bff3991524d29d448f946e94271f35313f083cdc25db2be099267d
SHA512d9526966ce66ac914d3c43eaef3ce1a69c8dca551e84901235ba27cf46b75a5f8b8109e33ad14f008336562db261cba6007520f203f22c68766b3c00b755e621
-
Filesize
512KB
MD515e93c2312ded587870cea7411d17b4c
SHA138979cfc6d51482d1e4547f2edf1d473142e240e
SHA256297e476a015c547c5db6f58a3b356b2552d5e9d67a074ad61b9f10dfc70434b8
SHA512429c36cf6bcc1bd7c0b101b09821ff0fe66b50ca880b338b1882be30f2df7a7231d44f6373cffd1263c99b62ff054643b84163d38794865fed095be319687206
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD55d5183d1a48ed3bf262514c8f6e419c5
SHA1c65d5fed969bbac028e64112f7e80a6946ad7f80
SHA256307cdf1c3de38c66ce3a90665313869b45a4e3933c208a5197fe42c8b56c9f5b
SHA51282c01cfdffbdbf3684ee9dfa9099f827992b92ec16772f84d527ddc67af01a3de3216808ab1d27b2a1ecd8b641a76e43fd7c18c67de0bd7a6828555be0a2eb13