Analysis
-
max time kernel
151s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 06:46
Static task
static1
Behavioral task
behavioral1
Sample
5a9a3c0573ad6bbf8ab99941801dbeec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a9a3c0573ad6bbf8ab99941801dbeec.exe
Resource
win10v2004-20231215-en
General
-
Target
5a9a3c0573ad6bbf8ab99941801dbeec.exe
-
Size
512KB
-
MD5
5a9a3c0573ad6bbf8ab99941801dbeec
-
SHA1
7445faccb3896c4e18e0140b5a208ad5f7773e88
-
SHA256
9586d4cb6b50068c7a98f5c8c05b3717712a7724754a491b0851f2de8ce122e6
-
SHA512
d5c141078fad9bddcb34e8d3fa1e8a01028c7e3c107a8806a625f02d19cf17dae5349b564d613e0f0431095f6de359eab1cf4134972f32f36662ae5c4a7d0556
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6/:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5k
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mfbapdydit.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mfbapdydit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mfbapdydit.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" mfbapdydit.exe -
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
pid Process 2840 mfbapdydit.exe 2888 kkqlenytwntzhyb.exe 2740 dswyoarg.exe 2820 bqiqdyjdgrlya.exe 2280 dswyoarg.exe -
Loads dropped DLL 5 IoCs
pid Process 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 2840 mfbapdydit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" mfbapdydit.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mbfdppdl = "kkqlenytwntzhyb.exe" kkqlenytwntzhyb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "bqiqdyjdgrlya.exe" kkqlenytwntzhyb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xxwjzbnl = "mfbapdydit.exe" kkqlenytwntzhyb.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\l: dswyoarg.exe File opened (read-only) \??\n: dswyoarg.exe File opened (read-only) \??\w: dswyoarg.exe File opened (read-only) \??\w: dswyoarg.exe File opened (read-only) \??\n: mfbapdydit.exe File opened (read-only) \??\q: mfbapdydit.exe File opened (read-only) \??\i: dswyoarg.exe File opened (read-only) \??\j: dswyoarg.exe File opened (read-only) \??\t: dswyoarg.exe File opened (read-only) \??\h: dswyoarg.exe File opened (read-only) \??\a: mfbapdydit.exe File opened (read-only) \??\b: mfbapdydit.exe File opened (read-only) \??\h: mfbapdydit.exe File opened (read-only) \??\y: mfbapdydit.exe File opened (read-only) \??\s: dswyoarg.exe File opened (read-only) \??\e: dswyoarg.exe File opened (read-only) \??\k: dswyoarg.exe File opened (read-only) \??\q: dswyoarg.exe File opened (read-only) \??\u: dswyoarg.exe File opened (read-only) \??\u: dswyoarg.exe File opened (read-only) \??\z: dswyoarg.exe File opened (read-only) \??\l: dswyoarg.exe File opened (read-only) \??\o: dswyoarg.exe File opened (read-only) \??\b: dswyoarg.exe File opened (read-only) \??\p: dswyoarg.exe File opened (read-only) \??\j: dswyoarg.exe File opened (read-only) \??\z: mfbapdydit.exe File opened (read-only) \??\i: mfbapdydit.exe File opened (read-only) \??\m: mfbapdydit.exe File opened (read-only) \??\o: mfbapdydit.exe File opened (read-only) \??\v: mfbapdydit.exe File opened (read-only) \??\t: mfbapdydit.exe File opened (read-only) \??\g: dswyoarg.exe File opened (read-only) \??\o: dswyoarg.exe File opened (read-only) \??\x: dswyoarg.exe File opened (read-only) \??\m: dswyoarg.exe File opened (read-only) \??\v: dswyoarg.exe File opened (read-only) \??\z: dswyoarg.exe File opened (read-only) \??\g: mfbapdydit.exe File opened (read-only) \??\g: dswyoarg.exe File opened (read-only) \??\j: mfbapdydit.exe File opened (read-only) \??\k: dswyoarg.exe File opened (read-only) \??\m: dswyoarg.exe File opened (read-only) \??\t: dswyoarg.exe File opened (read-only) \??\l: mfbapdydit.exe File opened (read-only) \??\x: mfbapdydit.exe File opened (read-only) \??\e: dswyoarg.exe File opened (read-only) \??\r: dswyoarg.exe File opened (read-only) \??\v: dswyoarg.exe File opened (read-only) \??\a: dswyoarg.exe File opened (read-only) \??\e: mfbapdydit.exe File opened (read-only) \??\u: mfbapdydit.exe File opened (read-only) \??\w: mfbapdydit.exe File opened (read-only) \??\r: dswyoarg.exe File opened (read-only) \??\r: mfbapdydit.exe File opened (read-only) \??\h: dswyoarg.exe File opened (read-only) \??\i: dswyoarg.exe File opened (read-only) \??\n: dswyoarg.exe File opened (read-only) \??\s: dswyoarg.exe File opened (read-only) \??\s: mfbapdydit.exe File opened (read-only) \??\b: dswyoarg.exe File opened (read-only) \??\x: dswyoarg.exe File opened (read-only) \??\p: mfbapdydit.exe File opened (read-only) \??\q: dswyoarg.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" mfbapdydit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" mfbapdydit.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/836-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000d000000012731-5.dat autoit_exe behavioral1/files/0x000b000000012267-17.dat autoit_exe behavioral1/files/0x000d000000012731-30.dat autoit_exe behavioral1/files/0x0032000000016047-35.dat autoit_exe behavioral1/files/0x0032000000016047-41.dat autoit_exe behavioral1/files/0x0007000000016577-32.dat autoit_exe behavioral1/files/0x0006000000016fd0-71.dat autoit_exe behavioral1/files/0x0006000000016fd5-74.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\mfbapdydit.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File created C:\Windows\SysWOW64\kkqlenytwntzhyb.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File opened for modification C:\Windows\SysWOW64\kkqlenytwntzhyb.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File created C:\Windows\SysWOW64\dswyoarg.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File opened for modification C:\Windows\SysWOW64\dswyoarg.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File created C:\Windows\SysWOW64\bqiqdyjdgrlya.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll mfbapdydit.exe File opened for modification C:\Windows\SysWOW64\mfbapdydit.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe File opened for modification C:\Windows\SysWOW64\bqiqdyjdgrlya.exe 5a9a3c0573ad6bbf8ab99941801dbeec.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dswyoarg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal dswyoarg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal dswyoarg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal dswyoarg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dswyoarg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dswyoarg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dswyoarg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 5a9a3c0573ad6bbf8ab99941801dbeec.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mfbapdydit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg mfbapdydit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf mfbapdydit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "334E2C7E9C5283276D4576D4772F2CDA7D8765DD" 5a9a3c0573ad6bbf8ab99941801dbeec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E08668C4FF1A21A9D17AD0D38A0C9166" 5a9a3c0573ad6bbf8ab99941801dbeec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh mfbapdydit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" mfbapdydit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABEFABFFE17F19583753B3081EB3E95B38802FA42130233E1BD45E908A8" 5a9a3c0573ad6bbf8ab99941801dbeec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat mfbapdydit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2420 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2280 dswyoarg.exe 2280 dswyoarg.exe 2280 dswyoarg.exe 2280 dswyoarg.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2888 kkqlenytwntzhyb.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1044 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 1604 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe Token: SeShutdownPrivilege 2432 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2280 dswyoarg.exe 2280 dswyoarg.exe 2280 dswyoarg.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2840 mfbapdydit.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2888 kkqlenytwntzhyb.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2820 bqiqdyjdgrlya.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 2740 dswyoarg.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1044 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 1604 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe 2432 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2420 WINWORD.EXE 2420 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 836 wrote to memory of 2840 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 28 PID 836 wrote to memory of 2840 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 28 PID 836 wrote to memory of 2840 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 28 PID 836 wrote to memory of 2840 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 28 PID 836 wrote to memory of 2888 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 29 PID 836 wrote to memory of 2888 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 29 PID 836 wrote to memory of 2888 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 29 PID 836 wrote to memory of 2888 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 29 PID 836 wrote to memory of 2740 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 30 PID 836 wrote to memory of 2740 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 30 PID 836 wrote to memory of 2740 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 30 PID 836 wrote to memory of 2740 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 30 PID 836 wrote to memory of 2820 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 31 PID 836 wrote to memory of 2820 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 31 PID 836 wrote to memory of 2820 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 31 PID 836 wrote to memory of 2820 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 31 PID 2840 wrote to memory of 2280 2840 mfbapdydit.exe 33 PID 2840 wrote to memory of 2280 2840 mfbapdydit.exe 33 PID 2840 wrote to memory of 2280 2840 mfbapdydit.exe 33 PID 2840 wrote to memory of 2280 2840 mfbapdydit.exe 33 PID 836 wrote to memory of 2420 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 32 PID 836 wrote to memory of 2420 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 32 PID 836 wrote to memory of 2420 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 32 PID 836 wrote to memory of 2420 836 5a9a3c0573ad6bbf8ab99941801dbeec.exe 32 PID 2420 wrote to memory of 2208 2420 WINWORD.EXE 38 PID 2420 wrote to memory of 2208 2420 WINWORD.EXE 38 PID 2420 wrote to memory of 2208 2420 WINWORD.EXE 38 PID 2420 wrote to memory of 2208 2420 WINWORD.EXE 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a9a3c0573ad6bbf8ab99941801dbeec.exe"C:\Users\Admin\AppData\Local\Temp\5a9a3c0573ad6bbf8ab99941801dbeec.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\mfbapdydit.exemfbapdydit.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\dswyoarg.exeC:\Windows\system32\dswyoarg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2280
-
-
-
C:\Windows\SysWOW64\kkqlenytwntzhyb.exekkqlenytwntzhyb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2888
-
-
C:\Windows\SysWOW64\dswyoarg.exedswyoarg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740
-
-
C:\Windows\SysWOW64\bqiqdyjdgrlya.exebqiqdyjdgrlya.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2820
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2208
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1044
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1604
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD56c533e8e59f65f3dd144541c08a83463
SHA1a4a429d22da7402241da0c50038fe02db442c176
SHA25663ae1300aaa3b150624f050958b5611b7d981897679e8443389f5aa5d895e9d7
SHA5129d40a0e1570a9328de229b2dffc037a144e0613e55417afdb0dc469565d3f5d7f875a0357ad6b2dfe3882d8fdb729bf9e925ad9cfe08c66a967173ea8dcf2e39
-
Filesize
512KB
MD5451e45131df900ca3c5b85d5174ed629
SHA11cd887b6b52984bc25b031984b115d353a6c83ad
SHA256f6c2534eaff57ed2a4ee44b1179773ffdac5a5a3cd20d494dc5541e98a5c59e6
SHA512550e7028dff3d708d10835324315d158bae27c1e18ed28d154f818ed8b49bf179a95d44f59574735421dd84ae582bc15f52ccce049582f2a92ab279522c8b4db
-
Filesize
85KB
MD527623bf17711551baa843bbab18a4b07
SHA12d6d50bab42c5defdd9bdf3f14fb826853558392
SHA2566a2c1908feaaa4585f579f19881c7fec6c64bfe38500306f55eaeb5fa0a7b368
SHA51253f01abdb0a6c91cedd6e7bb705ad27f9dfc89722bd6bb07ad9df87ff00ca5c9fc6764706ab6edc018fd90f519cf4d12af670416b3fff7cee5e6aca87e9f153b
-
Filesize
512KB
MD507a699b0b8c986dbe7d9c335241ffdb2
SHA17605a644bdff3f1234c81251ba0b0ddd8f365c17
SHA256300df951eed1d12ac1440e76ce550d30a3063fc511f719214a6daeb58f6e2572
SHA512d8be95845e77029fcee62d0a238cb1f800f89551fdd58c4f2f50c5834dcae8c9f0bc9a07dd8bfe94673830f5ae8d83a99b10a92c50dbb0b3eda0070c7ffb84f4
-
Filesize
512KB
MD536d22b9f899bdb5265c12eafc00fe91d
SHA1a376506b7ee312189e9f699b8a9446827bc9e74d
SHA25635946a7d18774a9dedfdd4b411795833412b8c3b3974468f1012b2b58b86a445
SHA5121fb31e45116bf5239e6a3e5e989a99d68e7587c9f59884d0cbfd3560514ac3606e474d8198f2ee55e2a9239f2a798c8109f3649852c7136d564344c49dd11cb3
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD5423d1a1883be00d0a013d5828953e711
SHA16a08f492a2884a9e93fec72ff496a9bdcf704374
SHA256b57c11709479950c20d16bd699c495432af25428bc414671c86fcdf843cd230b
SHA5127b195d47f44bb0ebf8a263f080ee89dde6e8a784c45cbed54ac47023ddd460a01a9ca7e3566381702ee5cf896b2b53009c4ed8fe212c9394431593f385f90b0e
-
Filesize
512KB
MD5fb63d6120fc8f8859f8df994d779e9f4
SHA1d6e758751e10c2ad819a65d9c6b7dffc3f675d8b
SHA256b3da1bd12b9a2d522a44281c211ce62717673c9265281e01dbf68e963e92d08f
SHA5126e1c05ba150ece83ca05ad84dd5e1969eff112b6d88dfc1dfe1c18ba8efd083e9fcc6f695670646c4883d10225a5079181c3695d16385f328a23debc3b0ad113