Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
Resource
win10v2004-20240426-en
General
-
Target
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe
-
Size
512KB
-
MD5
6ddc42125dab7bef0e226b4ec8913967
-
SHA1
3d8e7a7fb00566525d13eacc0ad4dd0111ab7327
-
SHA256
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b
-
SHA512
572e2daf78c66b1f7657f269ecd3b045c5878cae34e4abf46ad02683d61ae5e6d31deb4c67e43e02ee0a9ccfe6ecfbd1e037ae42effe718c0bf6b0747f756c32
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5f
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" rmlcbffhqk.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" rmlcbffhqk.exe -
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rmlcbffhqk.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" rmlcbffhqk.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 5 IoCs
Processes:
rmlcbffhqk.exeodvtnijbbutcyam.exennzronakeoena.exemzylmtcc.exemzylmtcc.exepid process 1756 rmlcbffhqk.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2600 mzylmtcc.exe 2824 mzylmtcc.exe -
Loads dropped DLL 5 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exepid process 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 1756 rmlcbffhqk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirstRunDisabled = "1" rmlcbffhqk.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
odvtnijbbutcyam.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\azhwyslx = "rmlcbffhqk.exe" odvtnijbbutcyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\uldytues = "odvtnijbbutcyam.exe" odvtnijbbutcyam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "nnzronakeoena.exe" odvtnijbbutcyam.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
mzylmtcc.exemzylmtcc.exermlcbffhqk.exedescription ioc process File opened (read-only) \??\b: mzylmtcc.exe File opened (read-only) \??\q: mzylmtcc.exe File opened (read-only) \??\w: mzylmtcc.exe File opened (read-only) \??\q: mzylmtcc.exe File opened (read-only) \??\v: mzylmtcc.exe File opened (read-only) \??\k: mzylmtcc.exe File opened (read-only) \??\n: mzylmtcc.exe File opened (read-only) \??\n: rmlcbffhqk.exe File opened (read-only) \??\h: mzylmtcc.exe File opened (read-only) \??\l: mzylmtcc.exe File opened (read-only) \??\k: rmlcbffhqk.exe File opened (read-only) \??\m: rmlcbffhqk.exe File opened (read-only) \??\r: rmlcbffhqk.exe File opened (read-only) \??\z: rmlcbffhqk.exe File opened (read-only) \??\e: mzylmtcc.exe File opened (read-only) \??\h: mzylmtcc.exe File opened (read-only) \??\h: rmlcbffhqk.exe File opened (read-only) \??\i: rmlcbffhqk.exe File opened (read-only) \??\v: mzylmtcc.exe File opened (read-only) \??\r: mzylmtcc.exe File opened (read-only) \??\m: mzylmtcc.exe File opened (read-only) \??\z: mzylmtcc.exe File opened (read-only) \??\o: mzylmtcc.exe File opened (read-only) \??\l: rmlcbffhqk.exe File opened (read-only) \??\w: rmlcbffhqk.exe File opened (read-only) \??\y: rmlcbffhqk.exe File opened (read-only) \??\y: mzylmtcc.exe File opened (read-only) \??\r: mzylmtcc.exe File opened (read-only) \??\t: mzylmtcc.exe File opened (read-only) \??\s: rmlcbffhqk.exe File opened (read-only) \??\o: rmlcbffhqk.exe File opened (read-only) \??\t: mzylmtcc.exe File opened (read-only) \??\x: mzylmtcc.exe File opened (read-only) \??\a: rmlcbffhqk.exe File opened (read-only) \??\q: rmlcbffhqk.exe File opened (read-only) \??\x: rmlcbffhqk.exe File opened (read-only) \??\j: mzylmtcc.exe File opened (read-only) \??\k: mzylmtcc.exe File opened (read-only) \??\l: mzylmtcc.exe File opened (read-only) \??\m: mzylmtcc.exe File opened (read-only) \??\a: mzylmtcc.exe File opened (read-only) \??\p: mzylmtcc.exe File opened (read-only) \??\b: mzylmtcc.exe File opened (read-only) \??\g: mzylmtcc.exe File opened (read-only) \??\i: mzylmtcc.exe File opened (read-only) \??\u: mzylmtcc.exe File opened (read-only) \??\e: mzylmtcc.exe File opened (read-only) \??\w: mzylmtcc.exe File opened (read-only) \??\y: mzylmtcc.exe File opened (read-only) \??\u: mzylmtcc.exe File opened (read-only) \??\z: mzylmtcc.exe File opened (read-only) \??\s: mzylmtcc.exe File opened (read-only) \??\i: mzylmtcc.exe File opened (read-only) \??\n: mzylmtcc.exe File opened (read-only) \??\s: mzylmtcc.exe File opened (read-only) \??\o: mzylmtcc.exe File opened (read-only) \??\j: mzylmtcc.exe File opened (read-only) \??\x: mzylmtcc.exe File opened (read-only) \??\u: rmlcbffhqk.exe File opened (read-only) \??\p: rmlcbffhqk.exe File opened (read-only) \??\t: rmlcbffhqk.exe File opened (read-only) \??\v: rmlcbffhqk.exe File opened (read-only) \??\a: mzylmtcc.exe File opened (read-only) \??\p: mzylmtcc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
rmlcbffhqk.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" rmlcbffhqk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rmlcbffhqk.exe -
AutoIT Executable 7 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe C:\Windows\SysWOW64\odvtnijbbutcyam.exe autoit_exe \Windows\SysWOW64\rmlcbffhqk.exe autoit_exe \Windows\SysWOW64\mzylmtcc.exe autoit_exe C:\Windows\SysWOW64\nnzronakeoena.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe autoit_exe C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe autoit_exe -
Drops file in System32 directory 9 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exedescription ioc process File created C:\Windows\SysWOW64\rmlcbffhqk.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\odvtnijbbutcyam.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\odvtnijbbutcyam.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\mzylmtcc.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File created C:\Windows\SysWOW64\nnzronakeoena.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll rmlcbffhqk.exe File opened for modification C:\Windows\SysWOW64\rmlcbffhqk.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\mzylmtcc.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe File opened for modification C:\Windows\SysWOW64\nnzronakeoena.exe 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe -
Drops file in Program Files directory 15 IoCs
Processes:
mzylmtcc.exemzylmtcc.exedescription ioc process File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mzylmtcc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mzylmtcc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File created \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mzylmtcc.exe File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.nal mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mzylmtcc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.nal mzylmtcc.exe -
Drops file in Windows directory 4 IoCs
Processes:
WINWORD.EXE4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exedescription ioc process File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\mydoc.rtf 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEexplorer.exe4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs rmlcbffhqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" rmlcbffhqk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC6B02044E739EE53BAB9D632EFD7C5" 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" rmlcbffhqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2684 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exeodvtnijbbutcyam.exermlcbffhqk.exennzronakeoena.exemzylmtcc.exemzylmtcc.exepid process 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2824 mzylmtcc.exe 2824 mzylmtcc.exe 2824 mzylmtcc.exe 2824 mzylmtcc.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2176 odvtnijbbutcyam.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe Token: SeShutdownPrivilege 1248 explorer.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exeodvtnijbbutcyam.exennzronakeoena.exemzylmtcc.exemzylmtcc.exeexplorer.exepid process 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2824 mzylmtcc.exe 2824 mzylmtcc.exe 2824 mzylmtcc.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exeodvtnijbbutcyam.exennzronakeoena.exemzylmtcc.exeexplorer.exepid process 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 1756 rmlcbffhqk.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2176 odvtnijbbutcyam.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2716 nnzronakeoena.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 2600 mzylmtcc.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe 1248 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2684 WINWORD.EXE 2684 WINWORD.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exermlcbffhqk.exedescription pid process target process PID 2416 wrote to memory of 1756 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe rmlcbffhqk.exe PID 2416 wrote to memory of 1756 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe rmlcbffhqk.exe PID 2416 wrote to memory of 1756 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe rmlcbffhqk.exe PID 2416 wrote to memory of 1756 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe rmlcbffhqk.exe PID 2416 wrote to memory of 2176 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe odvtnijbbutcyam.exe PID 2416 wrote to memory of 2176 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe odvtnijbbutcyam.exe PID 2416 wrote to memory of 2176 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe odvtnijbbutcyam.exe PID 2416 wrote to memory of 2176 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe odvtnijbbutcyam.exe PID 2416 wrote to memory of 2600 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe mzylmtcc.exe PID 2416 wrote to memory of 2600 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe mzylmtcc.exe PID 2416 wrote to memory of 2600 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe mzylmtcc.exe PID 2416 wrote to memory of 2600 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe mzylmtcc.exe PID 2416 wrote to memory of 2716 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe nnzronakeoena.exe PID 2416 wrote to memory of 2716 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe nnzronakeoena.exe PID 2416 wrote to memory of 2716 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe nnzronakeoena.exe PID 2416 wrote to memory of 2716 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe nnzronakeoena.exe PID 1756 wrote to memory of 2824 1756 rmlcbffhqk.exe mzylmtcc.exe PID 1756 wrote to memory of 2824 1756 rmlcbffhqk.exe mzylmtcc.exe PID 1756 wrote to memory of 2824 1756 rmlcbffhqk.exe mzylmtcc.exe PID 1756 wrote to memory of 2824 1756 rmlcbffhqk.exe mzylmtcc.exe PID 2416 wrote to memory of 2684 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE PID 2416 wrote to memory of 2684 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE PID 2416 wrote to memory of 2684 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE PID 2416 wrote to memory of 2684 2416 4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe WINWORD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe"C:\Users\Admin\AppData\Local\Temp\4aaab8c6c13b38b687a89b714c67769fcdcdb6a9b2afab733869a76f33f0304b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rmlcbffhqk.exermlcbffhqk.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\mzylmtcc.exeC:\Windows\system32\mzylmtcc.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2824 -
C:\Windows\SysWOW64\odvtnijbbutcyam.exeodvtnijbbutcyam.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176 -
C:\Windows\SysWOW64\mzylmtcc.exemzylmtcc.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2600 -
C:\Windows\SysWOW64\nnzronakeoena.exennzronakeoena.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2716 -
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2684
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD58e43ad441ef99c9244736861c12e70f3
SHA1b20b6ec18766865e6908858841db3e7a7e5bfd98
SHA256c12c9850c5bdfb1113c5dbf32a86bffb7f48c5a3faf9325c68ebd793af21ad32
SHA512b400f89ea4c4176097e42947aa4e0ff429201d9415228fbf446855fec556cbd7f4b753dbfdc84d836fdb090cecf5dff9e19e52277d2d5b8b381f57f08d38488f
-
Filesize
512KB
MD505a333e6ef9f24e3b475418e8111425d
SHA17a92cf693093d61bd47b064581f2b3bca6224a34
SHA256ef60f1e2f93e0bbb5d14fe6025372c1fac738d29c04d6c15514b6e92c34e15ee
SHA512127719796d6e99b142397942c0b79e3d4f86d6fee9a5e062f68a6d5aa73f033c8898b26c66c4a2b6496891b22b6b08d4f896d724745782e1bfc21e197abdc602
-
Filesize
512KB
MD57eea5e1b4ccc5bf124afba7bf7e425a0
SHA17d18166e462891bb509a99761f701c19025b2b83
SHA2564f4ffcac7d3543315ecb535575506ef8c10de3d0b20c19d8c7f3441a10641f54
SHA5121ab92ac572cb48ce807b48b96f94da81f6485d7c219e98603df4957de3da497d11e32dd991df536c0f9ce431f6fdf02210c6226a461c8b03ca4fc23af35adac9
-
Filesize
512KB
MD5add2ee1358852cb792b2c7730a1c8eb7
SHA16e3ed935282af042e98a5af076e92a74854d41b5
SHA256b71f796e6871a76a956e623061cdd776c828f77cabe93bfb77e39cf903a8552b
SHA5128e08ecef255fd7de05e6f561798a7c0c0b2ceda7c93c579479f20edb78390af97472f3a4650d83b48520f65953f78f22ed65501c643183efd2426c123af1d4c6
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
512KB
MD56122dd2e9b58cd7047f190c7e33a7d96
SHA148c7eea4d4b6e309d520d51c9a60ebf7e2fe9774
SHA256e5efff88cf88e59965511d00767cc8e409aaabcbacd77a63b03adc3f8c23cbf2
SHA5128223f4887f06f563a4df9135d4b88fea9915c1b3bace0fc88e14f590627d60888e4cf74c3fbca39f826846d9379b8705582d67c5149d193c1b248de4257645e5
-
Filesize
512KB
MD5c74bfd93272c14ba36e857aa71a60dd8
SHA1e8373403f856a572856637acae37a270829802d2
SHA256c655f6a1b52b0a24b851b32f3c85b8002fb742c57230a9c37fef0d34a49b9bef
SHA512dba80894d16e814d365114117bc5f8d15ae2f4fc7fac6a50f2ebfd9111a1ecbbc2529af644bac91d964ff5ce72d6a39c4c315855e7abf143b7674075edf2989e