Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 01:23
Static task
static1
Behavioral task
behavioral1
Sample
95e1df98c1adb6008490cbcc60e619e1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95e1df98c1adb6008490cbcc60e619e1.exe
Resource
win10v2004-20231215-en
General
-
Target
95e1df98c1adb6008490cbcc60e619e1.exe
-
Size
512KB
-
MD5
95e1df98c1adb6008490cbcc60e619e1
-
SHA1
f920789eca228acaabe99a63e390377161c3bc1d
-
SHA256
53dcdd2a996674fff20c80fa082621e04778f16b9ada224f2122465e3d777236
-
SHA512
401ee7ebb51cf34f73307d39c381c3a3a04ce0a4f8c8beac5068764ad2a9b994d7613c807349c0285675fc73deb180c7d5a61a3d0e5d69fda31a7402f500ed9d
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6U:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5H
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" alxddkudqy.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" alxddkudqy.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" alxddkudqy.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" alxddkudqy.exe -
Executes dropped EXE 5 IoCs
pid Process 2656 alxddkudqy.exe 2752 qstqjxsbljacrwu.exe 2672 bisijuve.exe 2092 qyhapxohdudsg.exe 2900 bisijuve.exe -
Loads dropped DLL 5 IoCs
pid Process 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2656 alxddkudqy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" alxddkudqy.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ecwwcbpk = "alxddkudqy.exe" qstqjxsbljacrwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\eenlnvje = "qstqjxsbljacrwu.exe" qstqjxsbljacrwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "qyhapxohdudsg.exe" qstqjxsbljacrwu.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\n: alxddkudqy.exe File opened (read-only) \??\z: bisijuve.exe File opened (read-only) \??\k: bisijuve.exe File opened (read-only) \??\l: bisijuve.exe File opened (read-only) \??\m: bisijuve.exe File opened (read-only) \??\t: bisijuve.exe File opened (read-only) \??\j: alxddkudqy.exe File opened (read-only) \??\g: alxddkudqy.exe File opened (read-only) \??\h: alxddkudqy.exe File opened (read-only) \??\y: alxddkudqy.exe File opened (read-only) \??\g: bisijuve.exe File opened (read-only) \??\x: bisijuve.exe File opened (read-only) \??\r: bisijuve.exe File opened (read-only) \??\v: bisijuve.exe File opened (read-only) \??\y: bisijuve.exe File opened (read-only) \??\h: bisijuve.exe File opened (read-only) \??\i: bisijuve.exe File opened (read-only) \??\z: bisijuve.exe File opened (read-only) \??\o: bisijuve.exe File opened (read-only) \??\q: bisijuve.exe File opened (read-only) \??\w: bisijuve.exe File opened (read-only) \??\r: alxddkudqy.exe File opened (read-only) \??\u: alxddkudqy.exe File opened (read-only) \??\a: bisijuve.exe File opened (read-only) \??\g: bisijuve.exe File opened (read-only) \??\p: bisijuve.exe File opened (read-only) \??\r: bisijuve.exe File opened (read-only) \??\u: bisijuve.exe File opened (read-only) \??\v: alxddkudqy.exe File opened (read-only) \??\n: bisijuve.exe File opened (read-only) \??\i: alxddkudqy.exe File opened (read-only) \??\j: bisijuve.exe File opened (read-only) \??\l: bisijuve.exe File opened (read-only) \??\b: bisijuve.exe File opened (read-only) \??\j: bisijuve.exe File opened (read-only) \??\s: bisijuve.exe File opened (read-only) \??\a: alxddkudqy.exe File opened (read-only) \??\w: alxddkudqy.exe File opened (read-only) \??\y: bisijuve.exe File opened (read-only) \??\q: bisijuve.exe File opened (read-only) \??\l: alxddkudqy.exe File opened (read-only) \??\e: bisijuve.exe File opened (read-only) \??\n: bisijuve.exe File opened (read-only) \??\o: bisijuve.exe File opened (read-only) \??\t: alxddkudqy.exe File opened (read-only) \??\x: alxddkudqy.exe File opened (read-only) \??\m: alxddkudqy.exe File opened (read-only) \??\i: bisijuve.exe File opened (read-only) \??\s: bisijuve.exe File opened (read-only) \??\u: bisijuve.exe File opened (read-only) \??\q: alxddkudqy.exe File opened (read-only) \??\a: bisijuve.exe File opened (read-only) \??\b: bisijuve.exe File opened (read-only) \??\h: bisijuve.exe File opened (read-only) \??\w: bisijuve.exe File opened (read-only) \??\e: alxddkudqy.exe File opened (read-only) \??\k: alxddkudqy.exe File opened (read-only) \??\p: alxddkudqy.exe File opened (read-only) \??\s: alxddkudqy.exe File opened (read-only) \??\t: bisijuve.exe File opened (read-only) \??\b: alxddkudqy.exe File opened (read-only) \??\o: alxddkudqy.exe File opened (read-only) \??\z: alxddkudqy.exe File opened (read-only) \??\k: bisijuve.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" alxddkudqy.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" alxddkudqy.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2000-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000a000000012251-5.dat autoit_exe behavioral1/files/0x00090000000120e1-17.dat autoit_exe behavioral1/files/0x000f00000001529f-27.dat autoit_exe behavioral1/files/0x0007000000015610-33.dat autoit_exe behavioral1/files/0x0006000000018a8f-73.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\alxddkudqy.exe 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\SysWOW64\alxddkudqy.exe 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\SysWOW64\qstqjxsbljacrwu.exe 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll alxddkudqy.exe File created C:\Windows\SysWOW64\qstqjxsbljacrwu.exe 95e1df98c1adb6008490cbcc60e619e1.exe File created C:\Windows\SysWOW64\bisijuve.exe 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\SysWOW64\bisijuve.exe 95e1df98c1adb6008490cbcc60e619e1.exe File created C:\Windows\SysWOW64\qyhapxohdudsg.exe 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\SysWOW64\qyhapxohdudsg.exe 95e1df98c1adb6008490cbcc60e619e1.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bisijuve.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bisijuve.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bisijuve.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal bisijuve.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bisijuve.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal bisijuve.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe bisijuve.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 95e1df98c1adb6008490cbcc60e619e1.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" alxddkudqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf alxddkudqy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7F89FC8E482885699047D62F7DE1BDE5E136584267436246D7EA" 95e1df98c1adb6008490cbcc60e619e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 95e1df98c1adb6008490cbcc60e619e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" alxddkudqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2808 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2672 bisijuve.exe 2672 bisijuve.exe 2672 bisijuve.exe 2672 bisijuve.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2900 bisijuve.exe 2900 bisijuve.exe 2900 bisijuve.exe 2900 bisijuve.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2752 qstqjxsbljacrwu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2672 bisijuve.exe 2672 bisijuve.exe 2672 bisijuve.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2900 bisijuve.exe 2900 bisijuve.exe 2900 bisijuve.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2000 95e1df98c1adb6008490cbcc60e619e1.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2656 alxddkudqy.exe 2672 bisijuve.exe 2672 bisijuve.exe 2672 bisijuve.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2752 qstqjxsbljacrwu.exe 2900 bisijuve.exe 2900 bisijuve.exe 2900 bisijuve.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe 2092 qyhapxohdudsg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 WINWORD.EXE 2808 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2656 2000 95e1df98c1adb6008490cbcc60e619e1.exe 28 PID 2000 wrote to memory of 2656 2000 95e1df98c1adb6008490cbcc60e619e1.exe 28 PID 2000 wrote to memory of 2656 2000 95e1df98c1adb6008490cbcc60e619e1.exe 28 PID 2000 wrote to memory of 2656 2000 95e1df98c1adb6008490cbcc60e619e1.exe 28 PID 2000 wrote to memory of 2752 2000 95e1df98c1adb6008490cbcc60e619e1.exe 29 PID 2000 wrote to memory of 2752 2000 95e1df98c1adb6008490cbcc60e619e1.exe 29 PID 2000 wrote to memory of 2752 2000 95e1df98c1adb6008490cbcc60e619e1.exe 29 PID 2000 wrote to memory of 2752 2000 95e1df98c1adb6008490cbcc60e619e1.exe 29 PID 2000 wrote to memory of 2672 2000 95e1df98c1adb6008490cbcc60e619e1.exe 30 PID 2000 wrote to memory of 2672 2000 95e1df98c1adb6008490cbcc60e619e1.exe 30 PID 2000 wrote to memory of 2672 2000 95e1df98c1adb6008490cbcc60e619e1.exe 30 PID 2000 wrote to memory of 2672 2000 95e1df98c1adb6008490cbcc60e619e1.exe 30 PID 2000 wrote to memory of 2092 2000 95e1df98c1adb6008490cbcc60e619e1.exe 31 PID 2000 wrote to memory of 2092 2000 95e1df98c1adb6008490cbcc60e619e1.exe 31 PID 2000 wrote to memory of 2092 2000 95e1df98c1adb6008490cbcc60e619e1.exe 31 PID 2000 wrote to memory of 2092 2000 95e1df98c1adb6008490cbcc60e619e1.exe 31 PID 2656 wrote to memory of 2900 2656 alxddkudqy.exe 32 PID 2656 wrote to memory of 2900 2656 alxddkudqy.exe 32 PID 2656 wrote to memory of 2900 2656 alxddkudqy.exe 32 PID 2656 wrote to memory of 2900 2656 alxddkudqy.exe 32 PID 2000 wrote to memory of 2808 2000 95e1df98c1adb6008490cbcc60e619e1.exe 33 PID 2000 wrote to memory of 2808 2000 95e1df98c1adb6008490cbcc60e619e1.exe 33 PID 2000 wrote to memory of 2808 2000 95e1df98c1adb6008490cbcc60e619e1.exe 33 PID 2000 wrote to memory of 2808 2000 95e1df98c1adb6008490cbcc60e619e1.exe 33 PID 2808 wrote to memory of 916 2808 WINWORD.EXE 36 PID 2808 wrote to memory of 916 2808 WINWORD.EXE 36 PID 2808 wrote to memory of 916 2808 WINWORD.EXE 36 PID 2808 wrote to memory of 916 2808 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e1df98c1adb6008490cbcc60e619e1.exe"C:\Users\Admin\AppData\Local\Temp\95e1df98c1adb6008490cbcc60e619e1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\alxddkudqy.exealxddkudqy.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\bisijuve.exeC:\Windows\system32\bisijuve.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2900
-
-
-
C:\Windows\SysWOW64\qstqjxsbljacrwu.exeqstqjxsbljacrwu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2752
-
-
C:\Windows\SysWOW64\bisijuve.exebisijuve.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672
-
-
C:\Windows\SysWOW64\qyhapxohdudsg.exeqyhapxohdudsg.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2092
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:916
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5746969d09d6af48baa373d8b0acf9cac
SHA10d61d9b08c176ca16af3951edb89957290bf4995
SHA2565174633384ad1493c89e048565f4ea56519297c26b50c0918d41d5f5d99cf839
SHA5120e3d6663b3047ebec9c9225e61af7706f16d947b53e6641398f35bb3740b31591ded2a692dfcedd894705399ed4a66412efa741c7070e3d6d9fa1e0b7bd089c4
-
Filesize
20KB
MD5e9c2c4805e30a845986e7c05add54156
SHA1a99d442462b9e268da4363550272914f5095e12b
SHA2566d9b08655b7c3ca46cc7f8ea96eb7730c304203e420a266c18e9e0245a1a536f
SHA512a88565318d838c37da7e764a49839fcfa3b6d9ff33790a81a5f442837f52079f3cb1b9d85d3c7b383780cc4aeb9fb4531db262ac5808f8e12dc83546cade049e
-
Filesize
512KB
MD529170b3b0b29c7957e25a5dd69410911
SHA16931d217392322ebb799ee19a29048e178a8174e
SHA256553ffaac561b46f1db1bc0a1819ca190a06d7936b61f45c29936b806e34c935f
SHA512f8fbc10938631951819422d5128433af42e22a46db3c2244fb9c4aba13cdfbbfd380a83598bce30fa6961fa288cb67e70528e15e674856745048f645019a3589
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD563abad99ffe6dfff8cb02737a59b1284
SHA1479279e1edf63b5c15c214f1a93bc853568cdca4
SHA256cc646a6a92c44928a05a45310a956f615ec854e366264960ba536cc2064daf52
SHA512d37fae43a5fc06d1269475749a7846168ed85d75fedbc0d652095d1bff0133ed1e2ed69d647d55c93498d9c1e67d35f7fb63162dc794ef6ddd2c9f3771627777
-
Filesize
512KB
MD5233aa0450bac80e5209267281dbf1d89
SHA107b87d9aee0dc52a0d94419ed0a4923616338edc
SHA256a23a03ebc7b711cb75452774656f593b6ee5304e6ca6ef40c1e465d9ae3addf2
SHA51235d5929af1fda3e610eda8d977882f27c2e93e79d665d431ab0613dfac728ff4d153ec8036daeae5eb09bc469d47a6c8d88ff479aec0d9a0b80e8e965e3d21e9
-
Filesize
512KB
MD51f7bfae4d4c24dad21206a893943dd0c
SHA1534ab6500ba24717cf60fb5b928351f89d5a7cd2
SHA2563f591b211a8c894cf57cc56e3b478019601868554795bc9bd1984722947909f8
SHA512c97cfc17e24182df6325cbc1c5603f2658362a3b1d9fc9f8d2176bf500044db42a818072f95cfe66871850711c4d568c07b434a2ff20f4dbca6828f238373370