Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
d593053e56b42f7d28eef97fcf70af7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d593053e56b42f7d28eef97fcf70af7c.exe
Resource
win10v2004-20240226-en
General
-
Target
d593053e56b42f7d28eef97fcf70af7c.exe
-
Size
512KB
-
MD5
d593053e56b42f7d28eef97fcf70af7c
-
SHA1
422bba8f394b61f76f23906c033c9de2f3058c57
-
SHA256
989fcbe7be12611e5a1c4ce18654cfadecba92dff16ab60d9504ffd0d19d15c9
-
SHA512
a877cc70ea8f1ba911de431f3719945d03be9e9d096d0bbf805717c88f861316235787dd7c89abdc4e6e9965c2b2ea778f8bbca0c3520c3842b5d295f6d511e5
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6c:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5Z
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rkiggtrdyl.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rkiggtrdyl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rkiggtrdyl.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rkiggtrdyl.exe -
Executes dropped EXE 5 IoCs
pid Process 2936 rkiggtrdyl.exe 2524 nuysfzdjocgvmgs.exe 2696 idpqvlpg.exe 2528 xjbjxiohocdlx.exe 2564 idpqvlpg.exe -
Loads dropped DLL 5 IoCs
pid Process 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 2936 rkiggtrdyl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rkiggtrdyl.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xzeykoqs = "rkiggtrdyl.exe" nuysfzdjocgvmgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zzevyzzs = "nuysfzdjocgvmgs.exe" nuysfzdjocgvmgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "xjbjxiohocdlx.exe" nuysfzdjocgvmgs.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\u: idpqvlpg.exe File opened (read-only) \??\j: idpqvlpg.exe File opened (read-only) \??\k: rkiggtrdyl.exe File opened (read-only) \??\n: rkiggtrdyl.exe File opened (read-only) \??\m: idpqvlpg.exe File opened (read-only) \??\t: idpqvlpg.exe File opened (read-only) \??\v: idpqvlpg.exe File opened (read-only) \??\g: rkiggtrdyl.exe File opened (read-only) \??\x: rkiggtrdyl.exe File opened (read-only) \??\n: idpqvlpg.exe File opened (read-only) \??\r: idpqvlpg.exe File opened (read-only) \??\i: idpqvlpg.exe File opened (read-only) \??\a: rkiggtrdyl.exe File opened (read-only) \??\y: rkiggtrdyl.exe File opened (read-only) \??\w: idpqvlpg.exe File opened (read-only) \??\y: idpqvlpg.exe File opened (read-only) \??\n: idpqvlpg.exe File opened (read-only) \??\s: idpqvlpg.exe File opened (read-only) \??\x: idpqvlpg.exe File opened (read-only) \??\p: rkiggtrdyl.exe File opened (read-only) \??\a: idpqvlpg.exe File opened (read-only) \??\k: idpqvlpg.exe File opened (read-only) \??\o: rkiggtrdyl.exe File opened (read-only) \??\q: rkiggtrdyl.exe File opened (read-only) \??\v: rkiggtrdyl.exe File opened (read-only) \??\g: idpqvlpg.exe File opened (read-only) \??\l: rkiggtrdyl.exe File opened (read-only) \??\z: idpqvlpg.exe File opened (read-only) \??\k: idpqvlpg.exe File opened (read-only) \??\l: idpqvlpg.exe File opened (read-only) \??\q: idpqvlpg.exe File opened (read-only) \??\e: rkiggtrdyl.exe File opened (read-only) \??\p: idpqvlpg.exe File opened (read-only) \??\u: idpqvlpg.exe File opened (read-only) \??\b: rkiggtrdyl.exe File opened (read-only) \??\j: rkiggtrdyl.exe File opened (read-only) \??\s: idpqvlpg.exe File opened (read-only) \??\h: idpqvlpg.exe File opened (read-only) \??\o: idpqvlpg.exe File opened (read-only) \??\p: idpqvlpg.exe File opened (read-only) \??\i: rkiggtrdyl.exe File opened (read-only) \??\b: idpqvlpg.exe File opened (read-only) \??\i: idpqvlpg.exe File opened (read-only) \??\x: idpqvlpg.exe File opened (read-only) \??\r: idpqvlpg.exe File opened (read-only) \??\y: idpqvlpg.exe File opened (read-only) \??\z: idpqvlpg.exe File opened (read-only) \??\h: rkiggtrdyl.exe File opened (read-only) \??\t: rkiggtrdyl.exe File opened (read-only) \??\m: idpqvlpg.exe File opened (read-only) \??\s: rkiggtrdyl.exe File opened (read-only) \??\w: rkiggtrdyl.exe File opened (read-only) \??\z: rkiggtrdyl.exe File opened (read-only) \??\e: idpqvlpg.exe File opened (read-only) \??\m: rkiggtrdyl.exe File opened (read-only) \??\e: idpqvlpg.exe File opened (read-only) \??\q: idpqvlpg.exe File opened (read-only) \??\a: idpqvlpg.exe File opened (read-only) \??\b: idpqvlpg.exe File opened (read-only) \??\j: idpqvlpg.exe File opened (read-only) \??\t: idpqvlpg.exe File opened (read-only) \??\v: idpqvlpg.exe File opened (read-only) \??\w: idpqvlpg.exe File opened (read-only) \??\r: rkiggtrdyl.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rkiggtrdyl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rkiggtrdyl.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1908-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x0009000000015c5d-5.dat autoit_exe behavioral1/files/0x000c000000012262-17.dat autoit_exe behavioral1/files/0x0027000000015d88-27.dat autoit_exe behavioral1/files/0x0007000000015e6f-33.dat autoit_exe behavioral1/files/0x00050000000193b0-66.dat autoit_exe behavioral1/files/0x0005000000019410-72.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nuysfzdjocgvmgs.exe d593053e56b42f7d28eef97fcf70af7c.exe File created C:\Windows\SysWOW64\idpqvlpg.exe d593053e56b42f7d28eef97fcf70af7c.exe File opened for modification C:\Windows\SysWOW64\idpqvlpg.exe d593053e56b42f7d28eef97fcf70af7c.exe File created C:\Windows\SysWOW64\xjbjxiohocdlx.exe d593053e56b42f7d28eef97fcf70af7c.exe File opened for modification C:\Windows\SysWOW64\xjbjxiohocdlx.exe d593053e56b42f7d28eef97fcf70af7c.exe File created C:\Windows\SysWOW64\rkiggtrdyl.exe d593053e56b42f7d28eef97fcf70af7c.exe File opened for modification C:\Windows\SysWOW64\rkiggtrdyl.exe d593053e56b42f7d28eef97fcf70af7c.exe File created C:\Windows\SysWOW64\nuysfzdjocgvmgs.exe d593053e56b42f7d28eef97fcf70af7c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rkiggtrdyl.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal idpqvlpg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe idpqvlpg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe idpqvlpg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal idpqvlpg.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal idpqvlpg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe idpqvlpg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal idpqvlpg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe idpqvlpg.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf d593053e56b42f7d28eef97fcf70af7c.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" rkiggtrdyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ABBF9B1FE64F2E3830F3A4B869F39E2B080028C4316023FE1BA42E709A9" d593053e56b42f7d28eef97fcf70af7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat rkiggtrdyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes d593053e56b42f7d28eef97fcf70af7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32412C0A9C2083586A4477D477242CDA7C8764AC" d593053e56b42f7d28eef97fcf70af7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg rkiggtrdyl.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2408 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2524 nuysfzdjocgvmgs.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2524 nuysfzdjocgvmgs.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 1908 d593053e56b42f7d28eef97fcf70af7c.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2524 nuysfzdjocgvmgs.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2936 rkiggtrdyl.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2528 xjbjxiohocdlx.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2696 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe 2564 idpqvlpg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2408 WINWORD.EXE 2408 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2936 1908 d593053e56b42f7d28eef97fcf70af7c.exe 28 PID 1908 wrote to memory of 2936 1908 d593053e56b42f7d28eef97fcf70af7c.exe 28 PID 1908 wrote to memory of 2936 1908 d593053e56b42f7d28eef97fcf70af7c.exe 28 PID 1908 wrote to memory of 2936 1908 d593053e56b42f7d28eef97fcf70af7c.exe 28 PID 1908 wrote to memory of 2524 1908 d593053e56b42f7d28eef97fcf70af7c.exe 29 PID 1908 wrote to memory of 2524 1908 d593053e56b42f7d28eef97fcf70af7c.exe 29 PID 1908 wrote to memory of 2524 1908 d593053e56b42f7d28eef97fcf70af7c.exe 29 PID 1908 wrote to memory of 2524 1908 d593053e56b42f7d28eef97fcf70af7c.exe 29 PID 1908 wrote to memory of 2696 1908 d593053e56b42f7d28eef97fcf70af7c.exe 30 PID 1908 wrote to memory of 2696 1908 d593053e56b42f7d28eef97fcf70af7c.exe 30 PID 1908 wrote to memory of 2696 1908 d593053e56b42f7d28eef97fcf70af7c.exe 30 PID 1908 wrote to memory of 2696 1908 d593053e56b42f7d28eef97fcf70af7c.exe 30 PID 1908 wrote to memory of 2528 1908 d593053e56b42f7d28eef97fcf70af7c.exe 31 PID 1908 wrote to memory of 2528 1908 d593053e56b42f7d28eef97fcf70af7c.exe 31 PID 1908 wrote to memory of 2528 1908 d593053e56b42f7d28eef97fcf70af7c.exe 31 PID 1908 wrote to memory of 2528 1908 d593053e56b42f7d28eef97fcf70af7c.exe 31 PID 2936 wrote to memory of 2564 2936 rkiggtrdyl.exe 32 PID 2936 wrote to memory of 2564 2936 rkiggtrdyl.exe 32 PID 2936 wrote to memory of 2564 2936 rkiggtrdyl.exe 32 PID 2936 wrote to memory of 2564 2936 rkiggtrdyl.exe 32 PID 1908 wrote to memory of 2408 1908 d593053e56b42f7d28eef97fcf70af7c.exe 33 PID 1908 wrote to memory of 2408 1908 d593053e56b42f7d28eef97fcf70af7c.exe 33 PID 1908 wrote to memory of 2408 1908 d593053e56b42f7d28eef97fcf70af7c.exe 33 PID 1908 wrote to memory of 2408 1908 d593053e56b42f7d28eef97fcf70af7c.exe 33 PID 2408 wrote to memory of 2380 2408 WINWORD.EXE 36 PID 2408 wrote to memory of 2380 2408 WINWORD.EXE 36 PID 2408 wrote to memory of 2380 2408 WINWORD.EXE 36 PID 2408 wrote to memory of 2380 2408 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\d593053e56b42f7d28eef97fcf70af7c.exe"C:\Users\Admin\AppData\Local\Temp\d593053e56b42f7d28eef97fcf70af7c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rkiggtrdyl.exerkiggtrdyl.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\idpqvlpg.exeC:\Windows\system32\idpqvlpg.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2564
-
-
-
C:\Windows\SysWOW64\nuysfzdjocgvmgs.exenuysfzdjocgvmgs.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2524
-
-
C:\Windows\SysWOW64\idpqvlpg.exeidpqvlpg.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
C:\Windows\SysWOW64\xjbjxiohocdlx.exexjbjxiohocdlx.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2528
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2380
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5e0b82e2d48a467b8923534c689ca14d9
SHA15d15b0cecb1981411e3745a7c726fe865d1a7175
SHA25639381f50de8a766e217ce1da7f1a806b63e84ac1b61d3213fa69da55413bda57
SHA512aeea5f7c78f63cec736791a926fc2401adf3cd433a115b737264ed25e93a4a5251f31af2146c5b777e3cd7edae3cecfbf6db7ee776ff215d617193a381726e17
-
Filesize
512KB
MD5a762c9112429d5d971f164638e7b8ab7
SHA1f041e49dc374ee1563625eb384e99cfceb4aeafb
SHA256ef1d8172461ac68f91f8e971881879fd54484975b70124c94ec5cb6f7c57c4a3
SHA512ad4966fe5b36b84ab743cd11f9559b3988e543ab2ea5dcd7c45a91a5ab235abf196c075a81079acaeeb9f431df5a91ba5c6f64a266cd596bdec6384c4f717485
-
Filesize
20KB
MD55eaf8f2a756701bf644892c4500b7194
SHA1172854a722d6f9b13eb0e3671bc1d2479b70afd4
SHA2560a436d66fc68893e480faf121b19bbc922a6487a5c453bb2c8d77057ba0f8d5f
SHA5123ae7bf95e8250b3876da72126b19910f170ac491d3f570f4eed51315d3ceddf0837ba63beb16295ccab12bf0a46ed8806061655b17e2e5a4c57f83506e664831
-
Filesize
512KB
MD5f1354879576757459723c5d9a09d9886
SHA100d35ae1eaa5a1a1cfc3e4c2ea965b3e21bebb07
SHA256d0e02142345aea2585dbe27d749ebb97edea58843eb23d701ad0255b09dd78b3
SHA5125d7b0d858e9c7bfba8439bea7bf6cf6e8112bec91f391ca13c89a6fab6a5053ab267febfe65df343600c32131e5d8873a8a1d73be098d5d9306fa9ea0e3b6b22
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD580e30146b8ce6e5f3cbfda661ca74a78
SHA19d55d822197d21ba6a9f519ba2ed1d4a30e74e99
SHA2564a490d96c2f71b14515b69d02bd669d81845e12876fbc522adbbf78cae47a873
SHA5127c4dc3a808870c0de2f3e041006779ea6a908aefb9b6d82b44c8be57a330f7e0fd638e4767346f32096bd579ced2c46ae7a7913a9ee548d9bca1d4b7aa1732fa
-
Filesize
512KB
MD53c57d6f427b521dcf5bd626ff6e45b44
SHA151fad473a90b97dd40f33129e05b212b7e9a9b45
SHA256e82686ddff60041971eb1b47f892792bd8d9f3f76f7334f7875f311e0ed6fc56
SHA512f19e5c21f5f036e895d181494527ebda20d379d41ea67a2adb718b80d6a7bb7142dd76ec597de140ce92a46bd32df83839f9717e9637f287a8efbf3a6928ff97
-
Filesize
512KB
MD50f2d60d53a00f4cc6e97cfe6e4dec499
SHA195e8153a28255feeddf58912a2d82686fbaf208c
SHA256c8a3bc49098bbfc283f334731378b0b7a99e01f4c101722d21d76ef592e7b6e7
SHA5127428e89bf39de0eecd3d1e641cf393e36783593157282c1150fd7ef1069260884875c5906aa8ddc90476295aa71fcc22779636b8b9305ce06975dcfeb2789732