Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
6583fa1c4a931884ab20da67ff58c4a7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6583fa1c4a931884ab20da67ff58c4a7.exe
Resource
win10v2004-20231222-en
General
-
Target
6583fa1c4a931884ab20da67ff58c4a7.exe
-
Size
512KB
-
MD5
6583fa1c4a931884ab20da67ff58c4a7
-
SHA1
60ce85ffddee5f77b3dcdbbeaa0a18c6b3382670
-
SHA256
530c3e01f8ca478e81a5f867322d9d8b35369bb1fe0f9e6953a95cb09adfff4a
-
SHA512
342c49ce337a0db2fca9b9c19b5d63d1ebd45ddfd74fa3f018771c9deeadb643351e40c80e3f29c18489aa85bcc36555ebd02013eb9624d914815762bba4663c
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6b:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bsdykyngxf.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bsdykyngxf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bsdykyngxf.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bsdykyngxf.exe -
Executes dropped EXE 5 IoCs
pid Process 2260 bsdykyngxf.exe 2212 nesieliywrhkrqq.exe 2456 vpotfezo.exe 2692 kxhhpedxlcraf.exe 1976 vpotfezo.exe -
Loads dropped DLL 5 IoCs
pid Process 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 2260 bsdykyngxf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" bsdykyngxf.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\empqabup = "bsdykyngxf.exe" nesieliywrhkrqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bohkowad = "nesieliywrhkrqq.exe" nesieliywrhkrqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "kxhhpedxlcraf.exe" nesieliywrhkrqq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: vpotfezo.exe File opened (read-only) \??\y: bsdykyngxf.exe File opened (read-only) \??\u: vpotfezo.exe File opened (read-only) \??\z: vpotfezo.exe File opened (read-only) \??\b: vpotfezo.exe File opened (read-only) \??\h: vpotfezo.exe File opened (read-only) \??\a: vpotfezo.exe File opened (read-only) \??\b: bsdykyngxf.exe File opened (read-only) \??\s: bsdykyngxf.exe File opened (read-only) \??\x: vpotfezo.exe File opened (read-only) \??\g: bsdykyngxf.exe File opened (read-only) \??\q: vpotfezo.exe File opened (read-only) \??\i: vpotfezo.exe File opened (read-only) \??\r: vpotfezo.exe File opened (read-only) \??\e: bsdykyngxf.exe File opened (read-only) \??\u: bsdykyngxf.exe File opened (read-only) \??\j: vpotfezo.exe File opened (read-only) \??\l: vpotfezo.exe File opened (read-only) \??\y: vpotfezo.exe File opened (read-only) \??\o: bsdykyngxf.exe File opened (read-only) \??\n: vpotfezo.exe File opened (read-only) \??\k: bsdykyngxf.exe File opened (read-only) \??\l: bsdykyngxf.exe File opened (read-only) \??\q: bsdykyngxf.exe File opened (read-only) \??\w: bsdykyngxf.exe File opened (read-only) \??\t: vpotfezo.exe File opened (read-only) \??\v: vpotfezo.exe File opened (read-only) \??\o: vpotfezo.exe File opened (read-only) \??\a: bsdykyngxf.exe File opened (read-only) \??\m: bsdykyngxf.exe File opened (read-only) \??\v: bsdykyngxf.exe File opened (read-only) \??\e: vpotfezo.exe File opened (read-only) \??\s: vpotfezo.exe File opened (read-only) \??\j: bsdykyngxf.exe File opened (read-only) \??\n: bsdykyngxf.exe File opened (read-only) \??\y: vpotfezo.exe File opened (read-only) \??\t: vpotfezo.exe File opened (read-only) \??\v: vpotfezo.exe File opened (read-only) \??\r: vpotfezo.exe File opened (read-only) \??\g: vpotfezo.exe File opened (read-only) \??\i: vpotfezo.exe File opened (read-only) \??\p: vpotfezo.exe File opened (read-only) \??\g: vpotfezo.exe File opened (read-only) \??\u: vpotfezo.exe File opened (read-only) \??\z: bsdykyngxf.exe File opened (read-only) \??\b: vpotfezo.exe File opened (read-only) \??\h: vpotfezo.exe File opened (read-only) \??\k: vpotfezo.exe File opened (read-only) \??\w: vpotfezo.exe File opened (read-only) \??\x: vpotfezo.exe File opened (read-only) \??\x: bsdykyngxf.exe File opened (read-only) \??\n: vpotfezo.exe File opened (read-only) \??\i: bsdykyngxf.exe File opened (read-only) \??\p: bsdykyngxf.exe File opened (read-only) \??\t: bsdykyngxf.exe File opened (read-only) \??\z: vpotfezo.exe File opened (read-only) \??\j: vpotfezo.exe File opened (read-only) \??\m: vpotfezo.exe File opened (read-only) \??\s: vpotfezo.exe File opened (read-only) \??\w: vpotfezo.exe File opened (read-only) \??\p: vpotfezo.exe File opened (read-only) \??\q: vpotfezo.exe File opened (read-only) \??\h: bsdykyngxf.exe File opened (read-only) \??\o: vpotfezo.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" bsdykyngxf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" bsdykyngxf.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1016-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0009000000012270-5.dat autoit_exe behavioral1/files/0x000b000000012262-17.dat autoit_exe behavioral1/files/0x0009000000015e9f-28.dat autoit_exe behavioral1/files/0x0007000000016441-37.dat autoit_exe behavioral1/files/0x0005000000018683-65.dat autoit_exe behavioral1/files/0x00050000000186b6-73.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\vpotfezo.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\SysWOW64\kxhhpedxlcraf.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File created C:\Windows\SysWOW64\nesieliywrhkrqq.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\SysWOW64\bsdykyngxf.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\SysWOW64\nesieliywrhkrqq.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\SysWOW64\vpotfezo.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File created C:\Windows\SysWOW64\kxhhpedxlcraf.exe 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll bsdykyngxf.exe File created C:\Windows\SysWOW64\bsdykyngxf.exe 6583fa1c4a931884ab20da67ff58c4a7.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vpotfezo.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vpotfezo.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vpotfezo.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vpotfezo.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe vpotfezo.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal vpotfezo.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe vpotfezo.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 6583fa1c4a931884ab20da67ff58c4a7.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bsdykyngxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh bsdykyngxf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" bsdykyngxf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs bsdykyngxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33412D7B9C2D82566A3777A070512CD97C8664DF" 6583fa1c4a931884ab20da67ff58c4a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFAFC8F482885199047D75B7D91BCE5E14759446645633FD7E9" 6583fa1c4a931884ab20da67ff58c4a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBFAB1FE11F19083753B3686EB3E98B388038F43600332E2CC459A09D2" 6583fa1c4a931884ab20da67ff58c4a7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" bsdykyngxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2728 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 1976 vpotfezo.exe 1976 vpotfezo.exe 1976 vpotfezo.exe 1976 vpotfezo.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 1976 vpotfezo.exe 1976 vpotfezo.exe 1976 vpotfezo.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2260 bsdykyngxf.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2456 vpotfezo.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2692 kxhhpedxlcraf.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 2212 nesieliywrhkrqq.exe 1976 vpotfezo.exe 1976 vpotfezo.exe 1976 vpotfezo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 WINWORD.EXE 2728 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2260 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 28 PID 1016 wrote to memory of 2260 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 28 PID 1016 wrote to memory of 2260 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 28 PID 1016 wrote to memory of 2260 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 28 PID 1016 wrote to memory of 2212 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 29 PID 1016 wrote to memory of 2212 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 29 PID 1016 wrote to memory of 2212 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 29 PID 1016 wrote to memory of 2212 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 29 PID 1016 wrote to memory of 2456 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 30 PID 1016 wrote to memory of 2456 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 30 PID 1016 wrote to memory of 2456 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 30 PID 1016 wrote to memory of 2456 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 30 PID 1016 wrote to memory of 2692 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 31 PID 1016 wrote to memory of 2692 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 31 PID 1016 wrote to memory of 2692 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 31 PID 1016 wrote to memory of 2692 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 31 PID 2260 wrote to memory of 1976 2260 bsdykyngxf.exe 32 PID 2260 wrote to memory of 1976 2260 bsdykyngxf.exe 32 PID 2260 wrote to memory of 1976 2260 bsdykyngxf.exe 32 PID 2260 wrote to memory of 1976 2260 bsdykyngxf.exe 32 PID 1016 wrote to memory of 2728 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 33 PID 1016 wrote to memory of 2728 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 33 PID 1016 wrote to memory of 2728 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 33 PID 1016 wrote to memory of 2728 1016 6583fa1c4a931884ab20da67ff58c4a7.exe 33 PID 2728 wrote to memory of 1896 2728 WINWORD.EXE 36 PID 2728 wrote to memory of 1896 2728 WINWORD.EXE 36 PID 2728 wrote to memory of 1896 2728 WINWORD.EXE 36 PID 2728 wrote to memory of 1896 2728 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7.exe"C:\Users\Admin\AppData\Local\Temp\6583fa1c4a931884ab20da67ff58c4a7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\bsdykyngxf.exebsdykyngxf.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\vpotfezo.exeC:\Windows\system32\vpotfezo.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1976
-
-
-
C:\Windows\SysWOW64\nesieliywrhkrqq.exenesieliywrhkrqq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2212
-
-
C:\Windows\SysWOW64\vpotfezo.exevpotfezo.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2456
-
-
C:\Windows\SysWOW64\kxhhpedxlcraf.exekxhhpedxlcraf.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2692
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1896
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD598679c58aa52ac4bee7d7ebbf95f3a3f
SHA1ebfd47d87496f65068683ed0ad8441eba5b21ed3
SHA256c9ec5793ef916546894d1aeaa2a51e430f69f57f5c1266618f3bb4c776eca406
SHA51254cf430b243798c4f1e0d96147af2ce6f52eb714ea4990bf0b433fb2038768b57cd2ad77e22675b86c04371d0d491f9efc79459eb476f2d25c4aae1e274edef5
-
Filesize
512KB
MD5c1454e8ef43e806871ec31973bcc5645
SHA10fae1871becebf58c49517b9af72b97966bfe77b
SHA256bca4dd03bf90204e1050cb0730ca29b45e408948e454d0df11f31d5665a4e67f
SHA5122f1b511940c34d1ca4fa38f1d8c1a70614202e119e5f33f1486cd8dea68abf66e1720f3417e483c6924d1ea734730581bf3bd43ddbbbbfa6ad8465f2024f8b01
-
Filesize
20KB
MD5e99af0bfab5c3c61185904c7fbdd67c2
SHA14ed0fbfc4a4673e9e611eec9730844de557a21f2
SHA256fb0c8dc79227af0233af1184109a6e4012c0fd4b963aae25c94d16f24d6c6d76
SHA5125bb9a62307d79e352b8f3e083045446a7350f388854a5570739ca0523c3c60bc06b9f223065708b3c03bac41a2d7d8902aa4dda02911fe4f08dc44a2689277cd
-
Filesize
512KB
MD50f5b46fc936b91ebffb215c30c5e977f
SHA13bf14855d876f3725149658802a9b3f20c4a5795
SHA256253ebe5397500b3a9f29ec1db55750ba2be878e79380fbcc2c254a35a97dd248
SHA5123dd76f93e9abc3553c13465796e80c9470595932a24366dfc1aa8c740678d8e3b5e4b6a13703ea620ef30353711ab4f3656b639e5eac2cb72cca2d8b81087404
-
Filesize
512KB
MD555cca968e7ffc77b1fdeff07902c196e
SHA1a93bcf11683349ed9746e1c8e211292ba4cdf84d
SHA256ab96ef6ce65f755fde0401cf29bca7aacd66c5d462ab37fa26869bbbf2fac3f4
SHA51279fc3d5a9588835d1edf5f29387f7778b6833518fb8cc29d69ead0e64f965e5d27faeabfd93246e845b2c4ad76c65f81f47d0c7072bb9c8fa4fd18f57608615f
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD503bfb12387732e96aefd1c390368b482
SHA154bd4a14ff88256fdc2f546e33d406a90db2ae96
SHA256b5fa4d382460dbcf0e8019b62a573a59bf3bd7c67c27e2846f239449241cd9ef
SHA5123b54385b7b1fa8499b74c74d07e7b2754b64c47a72165f80d9d5004000692fa420182d1df7a1eb64667544f3b1b0829f035375ed1f3b25737138f382ee12b292
-
Filesize
512KB
MD5503b4af3c2628a6f51ed34d9f3fd712b
SHA141bbdc1969a94c6781bdbcf246c48c66fbb10ba9
SHA256d2119b0a0cf2586bc2ad504a6c23cdef54a410d750a064c790c14814113aa17b
SHA5128b80fffd14acfb13b69f0648aa9d4147b0e870708ab76f8c7d60fad969b1da6467cbf4278333b0a1d5891e915f698fe6470740f33b710d5dff0ff32feef0502a