Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 01:53
Behavioral task
behavioral1
Sample
b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe
Resource
win7-20240221-en
General
-
Target
b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe
-
Size
255KB
-
MD5
784ca39bd620e09f428f473f68b6b3b0
-
SHA1
e1d757386b645059e944145b3ac0b6dbfbebb1a5
-
SHA256
b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c
-
SHA512
effbdb85d52cc58f57f2dfd9f86bf7b7823981240db70180b63b36d114019c7a77c8db187a1dd0b8dae50b839b84c2e0a7660b56841f39f9f771d4a7be262831
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJm:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gofyeqrsyu.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gofyeqrsyu.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gofyeqrsyu.exe -
UPX dump on OEP (original entry point) 60 IoCs
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/files/0x0037000000014712-5.dat UPX behavioral1/files/0x000d000000012350-17.dat UPX behavioral1/files/0x0037000000014712-21.dat UPX behavioral1/memory/2068-27-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/files/0x0008000000014a9a-25.dat UPX behavioral1/memory/2628-39-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/files/0x0007000000014b18-38.dat UPX behavioral1/memory/2568-32-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2960-44-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2988-46-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-74-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-75-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-77-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2960-78-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2628-76-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-79-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2628-80-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2628-84-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2960-83-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-86-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-88-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-87-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-85-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-90-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-91-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-92-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-93-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-94-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-95-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-96-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-97-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-98-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-101-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-100-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-102-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-105-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-104-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-103-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-106-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-108-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-107-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-109-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-111-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-110-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-131-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-133-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-132-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-134-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-136-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-135-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-137-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-138-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-139-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-140-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-141-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-142-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2068-143-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2648-145-0x0000000000400000-0x00000000004A0000-memory.dmp UPX behavioral1/memory/2568-144-0x0000000000400000-0x00000000004A0000-memory.dmp UPX -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gofyeqrsyu.exe -
Executes dropped EXE 5 IoCs
pid Process 2068 gofyeqrsyu.exe 2568 hhhmgyhqvxqnyau.exe 2628 dmuoiopx.exe 2648 ifsflfznzgynd.exe 2960 dmuoiopx.exe -
Loads dropped DLL 5 IoCs
pid Process 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2068 gofyeqrsyu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2988-0-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0037000000014712-5.dat upx behavioral1/files/0x000d000000012350-17.dat upx behavioral1/files/0x0037000000014712-21.dat upx behavioral1/memory/2068-27-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0008000000014a9a-25.dat upx behavioral1/memory/2628-39-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/files/0x0007000000014b18-38.dat upx behavioral1/memory/2568-32-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2960-44-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2988-46-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-74-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-75-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-77-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2960-78-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2628-76-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-79-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2628-80-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2628-84-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2960-83-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-86-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-88-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-87-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-85-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-90-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-91-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-92-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-93-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-94-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-95-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-96-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-97-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-98-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-101-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-100-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-102-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-105-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-104-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-103-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-106-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-108-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-107-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-109-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-111-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-110-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-131-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-133-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-134-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-135-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-137-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-138-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-139-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-141-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-142-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2068-143-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2648-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral1/memory/2568-144-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gofyeqrsyu.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jermmsef = "gofyeqrsyu.exe" hhhmgyhqvxqnyau.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\oqfournf = "hhhmgyhqvxqnyau.exe" hhhmgyhqvxqnyau.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ifsflfznzgynd.exe" hhhmgyhqvxqnyau.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: dmuoiopx.exe File opened (read-only) \??\t: dmuoiopx.exe File opened (read-only) \??\x: dmuoiopx.exe File opened (read-only) \??\i: gofyeqrsyu.exe File opened (read-only) \??\o: gofyeqrsyu.exe File opened (read-only) \??\u: gofyeqrsyu.exe File opened (read-only) \??\e: dmuoiopx.exe File opened (read-only) \??\m: dmuoiopx.exe File opened (read-only) \??\p: dmuoiopx.exe File opened (read-only) \??\n: dmuoiopx.exe File opened (read-only) \??\o: dmuoiopx.exe File opened (read-only) \??\t: dmuoiopx.exe File opened (read-only) \??\g: dmuoiopx.exe File opened (read-only) \??\m: dmuoiopx.exe File opened (read-only) \??\x: dmuoiopx.exe File opened (read-only) \??\a: gofyeqrsyu.exe File opened (read-only) \??\e: gofyeqrsyu.exe File opened (read-only) \??\w: gofyeqrsyu.exe File opened (read-only) \??\t: gofyeqrsyu.exe File opened (read-only) \??\s: dmuoiopx.exe File opened (read-only) \??\k: dmuoiopx.exe File opened (read-only) \??\h: dmuoiopx.exe File opened (read-only) \??\x: gofyeqrsyu.exe File opened (read-only) \??\h: dmuoiopx.exe File opened (read-only) \??\z: gofyeqrsyu.exe File opened (read-only) \??\b: dmuoiopx.exe File opened (read-only) \??\l: dmuoiopx.exe File opened (read-only) \??\u: dmuoiopx.exe File opened (read-only) \??\v: dmuoiopx.exe File opened (read-only) \??\q: gofyeqrsyu.exe File opened (read-only) \??\v: gofyeqrsyu.exe File opened (read-only) \??\e: dmuoiopx.exe File opened (read-only) \??\p: dmuoiopx.exe File opened (read-only) \??\r: dmuoiopx.exe File opened (read-only) \??\h: gofyeqrsyu.exe File opened (read-only) \??\n: gofyeqrsyu.exe File opened (read-only) \??\l: dmuoiopx.exe File opened (read-only) \??\b: dmuoiopx.exe File opened (read-only) \??\i: dmuoiopx.exe File opened (read-only) \??\j: gofyeqrsyu.exe File opened (read-only) \??\q: dmuoiopx.exe File opened (read-only) \??\v: dmuoiopx.exe File opened (read-only) \??\o: dmuoiopx.exe File opened (read-only) \??\s: dmuoiopx.exe File opened (read-only) \??\b: gofyeqrsyu.exe File opened (read-only) \??\j: dmuoiopx.exe File opened (read-only) \??\p: gofyeqrsyu.exe File opened (read-only) \??\w: dmuoiopx.exe File opened (read-only) \??\k: gofyeqrsyu.exe File opened (read-only) \??\r: dmuoiopx.exe File opened (read-only) \??\z: dmuoiopx.exe File opened (read-only) \??\q: dmuoiopx.exe File opened (read-only) \??\w: dmuoiopx.exe File opened (read-only) \??\z: dmuoiopx.exe File opened (read-only) \??\l: gofyeqrsyu.exe File opened (read-only) \??\m: gofyeqrsyu.exe File opened (read-only) \??\g: dmuoiopx.exe File opened (read-only) \??\k: dmuoiopx.exe File opened (read-only) \??\n: dmuoiopx.exe File opened (read-only) \??\a: dmuoiopx.exe File opened (read-only) \??\u: dmuoiopx.exe File opened (read-only) \??\y: gofyeqrsyu.exe File opened (read-only) \??\j: dmuoiopx.exe File opened (read-only) \??\y: dmuoiopx.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gofyeqrsyu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gofyeqrsyu.exe -
AutoIT Executable 52 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2628-39-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2960-44-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2988-46-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-74-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-75-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-77-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2960-78-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2628-76-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-79-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2628-80-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2628-84-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2960-83-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-86-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-88-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-87-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-85-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-90-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-91-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-92-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-93-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-94-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-95-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-96-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-97-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-98-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-101-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-100-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-102-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-105-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-104-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-103-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-106-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-108-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-107-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-109-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-111-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-110-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-131-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-133-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-132-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-134-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-136-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-135-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-137-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-138-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-139-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-140-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-141-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-142-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2068-143-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2648-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral1/memory/2568-144-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmuoiopx.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\SysWOW64\dmuoiopx.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File created C:\Windows\SysWOW64\ifsflfznzgynd.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File created C:\Windows\SysWOW64\hhhmgyhqvxqnyau.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\SysWOW64\gofyeqrsyu.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\SysWOW64\hhhmgyhqvxqnyau.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\SysWOW64\ifsflfznzgynd.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gofyeqrsyu.exe File created C:\Windows\SysWOW64\gofyeqrsyu.exe b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dmuoiopx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dmuoiopx.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal dmuoiopx.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dmuoiopx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal dmuoiopx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dmuoiopx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe dmuoiopx.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe dmuoiopx.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg gofyeqrsyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7806BB0FF6621ACD27DD1D48A7C9117" b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gofyeqrsyu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gofyeqrsyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" gofyeqrsyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2480 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2628 dmuoiopx.exe 2628 dmuoiopx.exe 2628 dmuoiopx.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2068 gofyeqrsyu.exe 2068 gofyeqrsyu.exe 2068 gofyeqrsyu.exe 2068 gofyeqrsyu.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2568 hhhmgyhqvxqnyau.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2068 gofyeqrsyu.exe 2628 dmuoiopx.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2568 hhhmgyhqvxqnyau.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2628 dmuoiopx.exe 2068 gofyeqrsyu.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2648 ifsflfznzgynd.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe 2960 dmuoiopx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 WINWORD.EXE 2480 WINWORD.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2068 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 28 PID 2988 wrote to memory of 2068 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 28 PID 2988 wrote to memory of 2068 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 28 PID 2988 wrote to memory of 2068 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 28 PID 2988 wrote to memory of 2568 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 29 PID 2988 wrote to memory of 2568 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 29 PID 2988 wrote to memory of 2568 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 29 PID 2988 wrote to memory of 2568 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 29 PID 2988 wrote to memory of 2628 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 30 PID 2988 wrote to memory of 2628 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 30 PID 2988 wrote to memory of 2628 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 30 PID 2988 wrote to memory of 2628 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 30 PID 2988 wrote to memory of 2648 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 31 PID 2988 wrote to memory of 2648 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 31 PID 2988 wrote to memory of 2648 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 31 PID 2988 wrote to memory of 2648 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 31 PID 2068 wrote to memory of 2960 2068 gofyeqrsyu.exe 32 PID 2068 wrote to memory of 2960 2068 gofyeqrsyu.exe 32 PID 2068 wrote to memory of 2960 2068 gofyeqrsyu.exe 32 PID 2068 wrote to memory of 2960 2068 gofyeqrsyu.exe 32 PID 2988 wrote to memory of 2480 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 33 PID 2988 wrote to memory of 2480 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 33 PID 2988 wrote to memory of 2480 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 33 PID 2988 wrote to memory of 2480 2988 b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe 33 PID 2480 wrote to memory of 1604 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 1604 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 1604 2480 WINWORD.EXE 36 PID 2480 wrote to memory of 1604 2480 WINWORD.EXE 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe"C:\Users\Admin\AppData\Local\Temp\b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\gofyeqrsyu.exegofyeqrsyu.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\dmuoiopx.exeC:\Windows\system32\dmuoiopx.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2960
-
-
-
C:\Windows\SysWOW64\hhhmgyhqvxqnyau.exehhhmgyhqvxqnyau.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568
-
-
C:\Windows\SysWOW64\dmuoiopx.exedmuoiopx.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2628
-
-
C:\Windows\SysWOW64\ifsflfznzgynd.exeifsflfznzgynd.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2648
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1604
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c9d1f640264af92d9e8018873acea15a
SHA1e7e22640a814e605274f53ab4e3b244bb8f84b24
SHA256b6cd37aa5663b52d9695fddcdfaf0093f5bfe1f8ef07af0c4ef542b2aa20b7c5
SHA51280ce8d0265c647f1da794b79265c2668f89256b1a25ae67409c7390f804917cfa52c347a63e402939d3d8e4a095f010d40e5f6ccb7ef7a9a6aec129b85a03e9c
-
Filesize
255KB
MD5784ca39bd620e09f428f473f68b6b3b0
SHA1e1d757386b645059e944145b3ac0b6dbfbebb1a5
SHA256b93bd158355c7fb53b409241f3ecbd16f0e65d67dc38765a1352a9b03c595a2c
SHA512effbdb85d52cc58f57f2dfd9f86bf7b7823981240db70180b63b36d114019c7a77c8db187a1dd0b8dae50b839b84c2e0a7660b56841f39f9f771d4a7be262831
-
Filesize
255KB
MD591266ad81d27ec03777ecc59eb7f4d0e
SHA1fc6278bd0060d1b6ebf03bfac0a4004eb68386c7
SHA2563cd76486236cc7f63969260627000c20fc010e0dea6125824a999f0f70874217
SHA51221919cb82bdb1c98b190db7618e6ccd36e1bc84edc66aa91658b42bc0b28f6ed577601824bf0124e3915c4cdd76ad58a0bb08cd8d9c5790f549722c89232365c
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD5409f25c482b3371844b26fc3acd9805a
SHA1cb8555af640e297592d9ba0ab0ceddb58a7e9739
SHA256c36f484e890b3e60dc4777c8ccb213ef8682f13f6bd633e8ff1b5cb9f6c1d9b3
SHA51210dba73ac3de055421ef5dd41308569451f98687a9919f700ee82622197603abf29d70161ede4519eb0af628a66e876a70e3890885131dff8095df8c42be60ad
-
Filesize
255KB
MD54a00e4e0bac492908e3a315f99069e1b
SHA1e9a62b82dc96e6bfa36e79aff625afdc43290e82
SHA2564335e83a86469ae50334e959ade31d908eace57a09da7e97714c787499c3ac39
SHA51206a9fa72022fb1734da94968f4d4fe174efd4fa8273e38f5ba9edacf56010935ff1d846595c50ca95a23e12d035896675e62a61bfc8a844b0723e203e460c76c
-
Filesize
255KB
MD54f6e9f9a912abc488d650f447106921f
SHA18156eec428021196b5bede95f89adb1e25dacba5
SHA25670a1e4dc1ce1c1d3991624a2eae8e2c82767ab5bf9bfa2aad53f76241b03d43d
SHA512e7c3f8e2a5560c457e16fc3234c2701b6f1a18722b9a01d4ca49888a0227b9dde35ca80f7e4a1ef79b53413937f3b7e1acee4953bab55b3e3a2532b011b478fd