Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe
Resource
win10v2004-20241007-en
General
-
Target
5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe
-
Size
34KB
-
MD5
f6d30157008693afcf676cd01fad3c34
-
SHA1
2fc9d6e7e74a1037af398fcfc96ad7fc1cd381cd
-
SHA256
5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7
-
SHA512
0d0bbe3f8b0b4bb8593f4ac619e907b0270f0ca0fbc1973a80978ed24298dcf8ab9cb1d4391929529ca7e29ff341ad77bc3efd8d6ea936c5e05bb3eaede2825e
-
SSDEEP
768:ZUE1vUccrqXdj+Sg7ONPCM6kgjUCJS8YzXBbanqv:ZUGUcGydj+Sg7g6LobFr5YU
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe -
Executes dropped EXE 2 IoCs
pid Process 2256 WINWORD.EXE 2704 SPOOL32.EXE -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Windows\\exe.ico" 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SPOOL32.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Printer Cpl = "C:\\Windows\\SPOOL32.EXE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Word = "C:\\Windows\\system32\\WINWORD.EXE" WINWORD.EXE -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: WINWORD.EXE File opened (read-only) \??\G: SPOOL32.EXE File opened (read-only) \??\D: WINWORD.EXE File opened (read-only) \??\E: WINWORD.EXE File opened (read-only) \??\D: SPOOL32.EXE File opened (read-only) \??\E: SPOOL32.EXE File opened (read-only) \??\F: SPOOL32.EXE File opened (read-only) \??\H: SPOOL32.EXE File opened (read-only) \??\G: WINWORD.EXE File opened (read-only) \??\H: WINWORD.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WINWORD.EXE 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe File opened for modification C:\Windows\SysWOW64\WINWORD.EXE 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\help.htm WINWORD.EXE File opened for modification \??\c:\windows\Anak Kampus.jpg .exe WINWORD.EXE File opened for modification C:\Windows\help.htm SPOOL32.EXE File opened for modification C:\Windows\help.htm WINWORD.EXE File opened for modification C:\Windows\exe.ico 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe File created C:\WINDOWS\Start Menu\Programs\StartUp\SPOOL32.EXE WINWORD.EXE File created C:\WINDOWS\Start Menu\Programs\StartUp\WINWORD.EXE WINWORD.EXE File created C:\Windows\SPOOL32.EXE WINWORD.EXE File opened for modification C:\Windows\SPOOL32.EXE WINWORD.EXE File created \??\c:\windows\Anak Kampus.jpg .exe WINWORD.EXE File created C:\WINDOWS\Start Menu\Programs\StartUp\WINWORD.EXE 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe File created C:\WINDOWS\Start Menu\Programs\StartUp\SPOOL32.EXE 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SPOOL32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff720000001a000000f80400007f020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C40EC549-8685-11EF-B9B6-FE5A08828E79} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2557553730" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d016dfa5921adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136402" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136402" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2578803524" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed336312400000000020000000000106600000001000020000000f29829b19e89b4802ab01ad6efe7ddf760bc91dc036a1ebb46ee1035d82f8555000000000e8000000002000020000000d5836611869eb25d1cf646f1b032921e80d3a3ff497530160e7ce5e4d532a2fa20000000174f281b9f2a8167b45b43e51a03e31fb6d4d8e8656596cc0388f6f69a417c99400000000b4f4f1e66832775cfe1408e1c489d5672307132cde892510f74f06fa7763c5881aeba3b1c9d96b9d6bfa705f675e4053beb44b9df03b034d1daf7f37a53ebd1 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2560678408" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136402" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed336312400000000020000000000106600000001000020000000fb10a20ca7cc10d6079d745804d3407a239660749c0c5992adcedf37546a3aa7000000000e8000000002000020000000f4c30903da75cf7f04a68614561140ca11b003409dceb678ce9180d21cb2cb6320000000d9a227229ec633229ea14c2d5efd71467f15740358dce435476222a9e83bf9ff40000000b4e6e950beb6eaf02f0cf8a801670a4012a4c8d9b9d651b5ef5e7bd5a538411b25f0ea2a300ae0279acbbbc94dd85c4d54b66f0eaab40b9aa3dd77eb556c26a3 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2557553730" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136402" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e9ada4921adb01 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c42488921adb01 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435274429" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb73de6dedeff944803e966ed336312400000000020000000000106600000001000020000000f45d8bc77f054939166a5ce02d2c700846dda6f3aba024bcf6e04a29ec81b4af000000000e80000000020000200000001f1700632001972a19127a93cac0859270ca93326359e7468f864e491647800020000000011b0c994fabc7d2a90d4e18b4944cd293593b5d1706cd8400c70a58464cb719400000000dc9be55721b01e39f369a64bb30206810c009b5ff7d4b713692d467415a890d029b87e3815b1138a6ffb1843e1cbb6481e5e336160c42bab9631dd26b9e5aa6 IEXPLORE.EXE -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "C:\\Windows\\exe.ico" 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "cmd.exe /c del \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "cmd.exe /c del \"%1\"" SPOOL32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SPOOL32.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "cmd.exe /c del \"%1\"" 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3136 WINWORD.EXE 3136 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2704 SPOOL32.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 2256 WINWORD.EXE 2256 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 2256 WINWORD.EXE 2704 SPOOL32.EXE -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 3136 WINWORD.EXE 3136 WINWORD.EXE 3136 WINWORD.EXE 3136 WINWORD.EXE 3136 WINWORD.EXE 3136 WINWORD.EXE 3136 WINWORD.EXE 2256 WINWORD.EXE 3136 WINWORD.EXE 2704 SPOOL32.EXE 3136 WINWORD.EXE 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 988 IEXPLORE.EXE 988 IEXPLORE.EXE 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 448 IEXPLORE.EXE 448 IEXPLORE.EXE 3344 IEXPLORE.EXE 3344 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2256 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 91 PID 4644 wrote to memory of 2256 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 91 PID 4644 wrote to memory of 2256 4644 5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe 91 PID 2256 wrote to memory of 2704 2256 WINWORD.EXE 92 PID 2256 wrote to memory of 2704 2256 WINWORD.EXE 92 PID 2256 wrote to memory of 2704 2256 WINWORD.EXE 92 PID 2256 wrote to memory of 3344 2256 WINWORD.EXE 97 PID 2256 wrote to memory of 3344 2256 WINWORD.EXE 97 PID 3344 wrote to memory of 988 3344 IEXPLORE.EXE 99 PID 3344 wrote to memory of 988 3344 IEXPLORE.EXE 99 PID 3344 wrote to memory of 988 3344 IEXPLORE.EXE 99 PID 2704 wrote to memory of 2712 2704 SPOOL32.EXE 100 PID 2704 wrote to memory of 2712 2704 SPOOL32.EXE 100 PID 3344 wrote to memory of 3048 3344 IEXPLORE.EXE 101 PID 3344 wrote to memory of 3048 3344 IEXPLORE.EXE 101 PID 3344 wrote to memory of 3048 3344 IEXPLORE.EXE 101 PID 2256 wrote to memory of 1488 2256 WINWORD.EXE 105 PID 2256 wrote to memory of 1488 2256 WINWORD.EXE 105 PID 3344 wrote to memory of 448 3344 IEXPLORE.EXE 106 PID 3344 wrote to memory of 448 3344 IEXPLORE.EXE 106 PID 3344 wrote to memory of 448 3344 IEXPLORE.EXE 106 PID 2704 wrote to memory of 1852 2704 SPOOL32.EXE 107 PID 2704 wrote to memory of 1852 2704 SPOOL32.EXE 107 PID 3344 wrote to memory of 2144 3344 IEXPLORE.EXE 108 PID 3344 wrote to memory of 2144 3344 IEXPLORE.EXE 108 PID 3344 wrote to memory of 2144 3344 IEXPLORE.EXE 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe"C:\Users\Admin\AppData\Local\Temp\5debff980a97f2e43249b349e49097e9d93328d89e531bbb088330b5d9cd33e7.exe"1⤵
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\WINWORD.EXEC:\Windows\system32\WINWORD.EXE2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SPOOL32.EXEC:\Windows\SPOOL32.EXE3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Windows/help.htm4⤵
- Modifies Internet Explorer settings
PID:2712
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Windows/help.htm4⤵
- Modifies Internet Explorer settings
PID:1852
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Windows/help.htm3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3344 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:988
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3344 CREDAT:17414 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3344 CREDAT:17420 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:448
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3344 CREDAT:17424 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" C:\Windows/help.htm3⤵
- Modifies Internet Explorer settings
PID:1488
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
34KB
MD5240f122102d0ba7e2de4bf8f9718f651
SHA1ee482eae3dea20bc3a1e4fe62429ce5e7d7ce5e5
SHA2561b20e8f9d4881befca7fd8831eaaa8a0cd15892864bcc19d97cc4c0a2d9b5a10
SHA51245aefb2ca21777d18d822763111a3c7d24bc97f08cd2411b25340b2887aa2dbdd88f66351a3282984946634c649c0cb7e0353093f878e8e60a3af76dc91a8cee
-
Filesize
34KB
MD55500c427e89b948cb15e96242e1c2d84
SHA195b6669844c415e5191e69e23b05c0847c3ab701
SHA256c4eefc1e03d1c7a4dfa8b2d39103dbee9f2e0050f437334ea5a915c4c5674e19
SHA51224ed2ed3cce34b133de60bbccbec7f53f95661d9291c2cae92484152ee85a74f06c7d0a50b7d5f222601623a169fdaa9de13a74b29019edb6cf1ff42315b67e5
-
Filesize
209B
MD5c17f423619cdf9bc2e3f3bf8a4318cf8
SHA16b0bbec2145b0a0aa6423eb0519319a528349349
SHA256b64182d08825d678a2e9427a852d9fec27a6e9cab18c04e6c5633b4ecb126e27
SHA512ab5fe80a13c2263b64eac8cccf2dab6b0f8bc5dc866a19e80493332073ee72a6777e3c90e9ca93b36519e0ea7cdbfce5c26e52f8c9ff25ff7e113557f890a40c