Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
49835cd07387458f9a8b1d1cbc5be92b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49835cd07387458f9a8b1d1cbc5be92b.exe
Resource
win10v2004-20231215-en
General
-
Target
49835cd07387458f9a8b1d1cbc5be92b.exe
-
Size
512KB
-
MD5
49835cd07387458f9a8b1d1cbc5be92b
-
SHA1
b0945ceb63cdac77834e7a22d0e6e832df976c2f
-
SHA256
9fafc0c895dd9794412faa1191967076ab15c60b5dd1567d7ac4c502f413de96
-
SHA512
b9ed7e19389539536bb166f2294e3bfda9391ad85288a3590c22a1cbea1c795c8ebc3e51dbfaaa3f0bf3c5e9bf453690fff40a47eda84cf5ae467a8eab2b3dcb
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6X:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5W
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" eunsjhvegw.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" eunsjhvegw.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eunsjhvegw.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" eunsjhvegw.exe -
Executes dropped EXE 5 IoCs
pid Process 2828 eunsjhvegw.exe 2728 krnuqurpulvczua.exe 2744 qaqqroah.exe 2860 weshpwvvenrdn.exe 2580 qaqqroah.exe -
Loads dropped DLL 5 IoCs
pid Process 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 2828 eunsjhvegw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eunsjhvegw.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bqtcxyou = "eunsjhvegw.exe" krnuqurpulvczua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\alwrnboc = "krnuqurpulvczua.exe" krnuqurpulvczua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "weshpwvvenrdn.exe" krnuqurpulvczua.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: qaqqroah.exe File opened (read-only) \??\n: eunsjhvegw.exe File opened (read-only) \??\p: eunsjhvegw.exe File opened (read-only) \??\g: qaqqroah.exe File opened (read-only) \??\i: qaqqroah.exe File opened (read-only) \??\r: eunsjhvegw.exe File opened (read-only) \??\h: qaqqroah.exe File opened (read-only) \??\y: qaqqroah.exe File opened (read-only) \??\k: qaqqroah.exe File opened (read-only) \??\w: qaqqroah.exe File opened (read-only) \??\e: eunsjhvegw.exe File opened (read-only) \??\i: eunsjhvegw.exe File opened (read-only) \??\o: qaqqroah.exe File opened (read-only) \??\u: qaqqroah.exe File opened (read-only) \??\x: qaqqroah.exe File opened (read-only) \??\a: eunsjhvegw.exe File opened (read-only) \??\b: eunsjhvegw.exe File opened (read-only) \??\u: eunsjhvegw.exe File opened (read-only) \??\n: qaqqroah.exe File opened (read-only) \??\v: qaqqroah.exe File opened (read-only) \??\x: qaqqroah.exe File opened (read-only) \??\b: qaqqroah.exe File opened (read-only) \??\e: qaqqroah.exe File opened (read-only) \??\k: eunsjhvegw.exe File opened (read-only) \??\a: qaqqroah.exe File opened (read-only) \??\j: qaqqroah.exe File opened (read-only) \??\m: eunsjhvegw.exe File opened (read-only) \??\o: qaqqroah.exe File opened (read-only) \??\q: qaqqroah.exe File opened (read-only) \??\p: qaqqroah.exe File opened (read-only) \??\g: eunsjhvegw.exe File opened (read-only) \??\o: eunsjhvegw.exe File opened (read-only) \??\q: eunsjhvegw.exe File opened (read-only) \??\w: eunsjhvegw.exe File opened (read-only) \??\g: qaqqroah.exe File opened (read-only) \??\q: qaqqroah.exe File opened (read-only) \??\y: qaqqroah.exe File opened (read-only) \??\v: eunsjhvegw.exe File opened (read-only) \??\l: qaqqroah.exe File opened (read-only) \??\a: qaqqroah.exe File opened (read-only) \??\j: qaqqroah.exe File opened (read-only) \??\l: qaqqroah.exe File opened (read-only) \??\r: qaqqroah.exe File opened (read-only) \??\h: qaqqroah.exe File opened (read-only) \??\t: qaqqroah.exe File opened (read-only) \??\j: eunsjhvegw.exe File opened (read-only) \??\n: qaqqroah.exe File opened (read-only) \??\l: eunsjhvegw.exe File opened (read-only) \??\e: qaqqroah.exe File opened (read-only) \??\w: qaqqroah.exe File opened (read-only) \??\s: eunsjhvegw.exe File opened (read-only) \??\t: eunsjhvegw.exe File opened (read-only) \??\x: eunsjhvegw.exe File opened (read-only) \??\k: qaqqroah.exe File opened (read-only) \??\t: qaqqroah.exe File opened (read-only) \??\u: qaqqroah.exe File opened (read-only) \??\y: eunsjhvegw.exe File opened (read-only) \??\z: eunsjhvegw.exe File opened (read-only) \??\b: qaqqroah.exe File opened (read-only) \??\m: qaqqroah.exe File opened (read-only) \??\s: qaqqroah.exe File opened (read-only) \??\m: qaqqroah.exe File opened (read-only) \??\r: qaqqroah.exe File opened (read-only) \??\s: qaqqroah.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" eunsjhvegw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" eunsjhvegw.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1752-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0037000000015daa-5.dat autoit_exe behavioral1/files/0x0009000000012270-17.dat autoit_exe behavioral1/files/0x000700000001604f-34.dat autoit_exe behavioral1/files/0x000700000001604f-39.dat autoit_exe behavioral1/files/0x0007000000016047-43.dat autoit_exe behavioral1/files/0x0007000000016047-42.dat autoit_exe behavioral1/files/0x000700000001604f-41.dat autoit_exe behavioral1/files/0x0007000000016047-35.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qaqqroah.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File opened for modification C:\Windows\SysWOW64\weshpwvvenrdn.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File created C:\Windows\SysWOW64\eunsjhvegw.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File created C:\Windows\SysWOW64\krnuqurpulvczua.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File opened for modification C:\Windows\SysWOW64\krnuqurpulvczua.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File created C:\Windows\SysWOW64\qaqqroah.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File created C:\Windows\SysWOW64\weshpwvvenrdn.exe 49835cd07387458f9a8b1d1cbc5be92b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll eunsjhvegw.exe File opened for modification C:\Windows\SysWOW64\eunsjhvegw.exe 49835cd07387458f9a8b1d1cbc5be92b.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qaqqroah.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qaqqroah.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qaqqroah.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal qaqqroah.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe qaqqroah.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qaqqroah.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal qaqqroah.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe qaqqroah.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 49835cd07387458f9a8b1d1cbc5be92b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 49835cd07387458f9a8b1d1cbc5be92b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat eunsjhvegw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc eunsjhvegw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" eunsjhvegw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1838C67D14E5DBC0B8CA7CE6ED9134CA" 49835cd07387458f9a8b1d1cbc5be92b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" eunsjhvegw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg eunsjhvegw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F368B4FF1B21DBD178D1A78A0F9016" 49835cd07387458f9a8b1d1cbc5be92b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" eunsjhvegw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2704 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2580 qaqqroah.exe 2728 krnuqurpulvczua.exe 2580 qaqqroah.exe 2580 qaqqroah.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2580 qaqqroah.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2728 krnuqurpulvczua.exe 2860 weshpwvvenrdn.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2580 qaqqroah.exe 2580 qaqqroah.exe 2580 qaqqroah.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2828 eunsjhvegw.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2728 krnuqurpulvczua.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2744 qaqqroah.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2860 weshpwvvenrdn.exe 2580 qaqqroah.exe 2580 qaqqroah.exe 2580 qaqqroah.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 WINWORD.EXE 2704 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2828 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 33 PID 1752 wrote to memory of 2828 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 33 PID 1752 wrote to memory of 2828 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 33 PID 1752 wrote to memory of 2828 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 33 PID 1752 wrote to memory of 2728 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 28 PID 1752 wrote to memory of 2728 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 28 PID 1752 wrote to memory of 2728 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 28 PID 1752 wrote to memory of 2728 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 28 PID 1752 wrote to memory of 2744 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 32 PID 1752 wrote to memory of 2744 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 32 PID 1752 wrote to memory of 2744 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 32 PID 1752 wrote to memory of 2744 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 32 PID 1752 wrote to memory of 2860 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 29 PID 1752 wrote to memory of 2860 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 29 PID 1752 wrote to memory of 2860 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 29 PID 1752 wrote to memory of 2860 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 29 PID 2828 wrote to memory of 2580 2828 eunsjhvegw.exe 30 PID 2828 wrote to memory of 2580 2828 eunsjhvegw.exe 30 PID 2828 wrote to memory of 2580 2828 eunsjhvegw.exe 30 PID 2828 wrote to memory of 2580 2828 eunsjhvegw.exe 30 PID 1752 wrote to memory of 2704 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 31 PID 1752 wrote to memory of 2704 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 31 PID 1752 wrote to memory of 2704 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 31 PID 1752 wrote to memory of 2704 1752 49835cd07387458f9a8b1d1cbc5be92b.exe 31 PID 2704 wrote to memory of 1932 2704 WINWORD.EXE 36 PID 2704 wrote to memory of 1932 2704 WINWORD.EXE 36 PID 2704 wrote to memory of 1932 2704 WINWORD.EXE 36 PID 2704 wrote to memory of 1932 2704 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\49835cd07387458f9a8b1d1cbc5be92b.exe"C:\Users\Admin\AppData\Local\Temp\49835cd07387458f9a8b1d1cbc5be92b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\krnuqurpulvczua.exekrnuqurpulvczua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2728
-
-
C:\Windows\SysWOW64\weshpwvvenrdn.exeweshpwvvenrdn.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2860
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1932
-
-
-
C:\Windows\SysWOW64\qaqqroah.exeqaqqroah.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744
-
-
C:\Windows\SysWOW64\eunsjhvegw.exeeunsjhvegw.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2828
-
-
C:\Windows\SysWOW64\qaqqroah.exeC:\Windows\system32\qaqqroah.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5b780ce7e97ffc77f54b564480c03be4b
SHA1e03f948f6d8d5633e7407e9d1c90b947d1df4d62
SHA2563b3ed3939d707dca024a45aa795ed09bb4228300dbd4f6635e7906e329af4083
SHA512feb8183247d64e1d297fa3c1a801bbfd698d1e3ba432c2f7e0a9c2b031c9449b34e1eb9ca4ab2e8fe0b1586b04e6ff2cff064b0028d7976e37e33aa65b9f16bc
-
Filesize
512KB
MD5979655dd9fb6b9bd665fa6dab6cbcc9c
SHA166982a45e6455a5e30c0740a507328c51ba60bcb
SHA256a63c15a9b4c5756f81a3638aaff6601fa45fc91ca2090e2b686c44f27f697bb9
SHA512f0a8060aeeddec36a4989a0115a75e0f5859e7bf638b7ecda827bfecfc637be900132a4712247cc86da3d9dcc7a54e6cabc1ff59bc86a0d1afef24f73bc969c9
-
Filesize
512KB
MD5e63be3f65a0d6e6ce9193959bfb72057
SHA1d5d600463b8d9ce0707519cb71806a89d6ff7043
SHA256d510eb72b1ab629ade09cf2720159b0bbc112519c18b72206ed38057a02cc995
SHA512f44c4ebdf3817f5e4248b7d5ea187dda5b9e5cc93b198b182acfee2065be11a662b005e8af05c719170f1e7d8cf6a2d2ec6e1de1a767b457b899b07a5955daa5
-
Filesize
104KB
MD5e434af8a9adb1818fcc775453315d253
SHA19c723a819a3ae37e9c88615a0b98067d82dbfb00
SHA256f318dac03557154aa948ca2cf121b5ad65afcbab97846c485e98daf8ca1aa966
SHA512b8e66e47595b290f6bd7c8bab2fb7f77db801554daa6199763d735673c7e6fa8ecf99b33147fd6b684260fad3d4a41ca622806f1732d97b973e693751410c919
-
Filesize
327KB
MD5339df21338ccfacc02320e455149296b
SHA1a51da3314313176fcfa51714c5a76857aaa657a2
SHA2566aba9195df62516882d1edac85ce66accef1b48a97f98f980b9d086a7d65baf2
SHA512c1fcb4e0cfe4d0be3b6ab257c589222926cc2ec334b292ba88724c430a5d6c169bb9a5a04472fd2a03ae6123e1a56a5e00070d1738703c1ec1db06d26074ab3a
-
Filesize
413KB
MD532ebe632698c34115cf4fde2fd26a005
SHA1c86f851ed4702ab1f9b7ecd2de33a3e5bed43cde
SHA2566914003d74626f905a9ee70fe0e84999196aa047576814767321b2fe35ffc490
SHA512cd7584948ddf8c9195ae516a828e0f93a6e149a412e86bb55085cb1fd6f8ad16242e2fbcea6b28a8bc4a09f3db528832aa27c61a1f2648a6aa13f135a8779125
-
Filesize
512KB
MD5415cfd842842124ad1f449e4abb7d6d4
SHA1cf69c77a0c34b64498ce2254bc54bb62fc81b7bd
SHA25627b75ccb5fd4a5937eaaf8b2e206474f93175021c4c15fbebeee8c3a28b165d5
SHA512be302e996b93a7a96eb72338567431247c182671beef39f8b2acc76138d9856279da813b833e29fbf7d90b897b1466b7bd60be2eb64b57260e95313bb1935d74
-
Filesize
108KB
MD515fdaa5355f7e1f570fe391de9e5450d
SHA19769d25970341d1419d6f2cc262780512d26210e
SHA256e3481e21baa08c162e0832beece51eab10ce59414926ca0aae7be5729314278a
SHA5129b375502fa6c353d71c2bd2a6aa71341de3b12bbee254de6d1f5467e694a14c7cd82086fd64656096c4f54fe69181a6fdd73a6092ca81d0c9da561007325302d
-
Filesize
320KB
MD540eccbf82b7b8fc916befc4f91646a41
SHA19b26728b4c732bfeb504f70ab523d90def972d37
SHA2561dc118e41bf637830be03d9bfe6d57960cf8dc9dbe9c8302a78e3406285bbaaa
SHA5124714d4a188098bfac7feb042ef4c6f0236e826c335c740df7f47d60f0e70d50c5eeaf73e1b94afb0408bd8c6b5ef6fa9d49577a6ac214ce115f4b6db0b341cdf