Analysis
-
max time kernel
1610s -
max time network
1613s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 03:56
Static task
static1
Behavioral task
behavioral1
Sample
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe
Resource
win10v2004-20220414-en
General
-
Target
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe
-
Size
196KB
-
MD5
76a87f38773537055dc197c98182f4aa
-
SHA1
c43348da0830418f4faba651caf147c830da0f06
-
SHA256
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138
-
SHA512
d387ca6d152e5a8267af15dcd60ff42976320b86f0617f91db81804b80b37bda8c5be19445320cdc3bc62417637e96687fa96adfb854106bb2c08633ed3c0f7b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 1312 xk.exe 1756 IExplorer.exe 1292 WINLOGON.EXE 964 CSRSS.EXE 896 SERVICES.EXE 680 LSASS.EXE 1392 SMSS.EXE -
Processes:
resource yara_rule C:\Windows\xk.exe upx \Windows\SysWOW64\IExplorer.exe upx behavioral1/memory/1312-61-0x0000000000400000-0x000000000042F000-memory.dmp upx \Windows\SysWOW64\IExplorer.exe upx C:\Windows\SysWOW64\IExplorer.exe upx behavioral1/memory/1756-68-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral1/memory/1292-75-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx behavioral1/memory/964-82-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx behavioral1/memory/896-89-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx behavioral1/memory/680-96-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx behavioral1/memory/1972-104-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1392-103-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Loads dropped DLL 12 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exepid process 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Drops file in System32 directory 6 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process File created C:\Windows\SysWOW64\shell.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File created C:\Windows\SysWOW64\Mig2.scr 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File created C:\Windows\SysWOW64\IExplorer.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File opened for modification C:\Windows\SysWOW64\shell.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Drops file in Windows directory 2 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process File opened for modification C:\Windows\xk.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe File created C:\Windows\xk.exe 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 4 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\ 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Modifies registry class 15 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exepid process 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe 1312 xk.exe 1756 IExplorer.exe 1292 WINLOGON.EXE 964 CSRSS.EXE 896 SERVICES.EXE 680 LSASS.EXE 1392 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription pid process target process PID 1972 wrote to memory of 1312 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe xk.exe PID 1972 wrote to memory of 1312 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe xk.exe PID 1972 wrote to memory of 1312 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe xk.exe PID 1972 wrote to memory of 1312 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe xk.exe PID 1972 wrote to memory of 1756 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe IExplorer.exe PID 1972 wrote to memory of 1756 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe IExplorer.exe PID 1972 wrote to memory of 1756 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe IExplorer.exe PID 1972 wrote to memory of 1756 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe IExplorer.exe PID 1972 wrote to memory of 1292 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe WINLOGON.EXE PID 1972 wrote to memory of 1292 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe WINLOGON.EXE PID 1972 wrote to memory of 1292 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe WINLOGON.EXE PID 1972 wrote to memory of 1292 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe WINLOGON.EXE PID 1972 wrote to memory of 964 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe CSRSS.EXE PID 1972 wrote to memory of 964 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe CSRSS.EXE PID 1972 wrote to memory of 964 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe CSRSS.EXE PID 1972 wrote to memory of 964 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe CSRSS.EXE PID 1972 wrote to memory of 896 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SERVICES.EXE PID 1972 wrote to memory of 896 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SERVICES.EXE PID 1972 wrote to memory of 896 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SERVICES.EXE PID 1972 wrote to memory of 896 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SERVICES.EXE PID 1972 wrote to memory of 680 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe LSASS.EXE PID 1972 wrote to memory of 680 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe LSASS.EXE PID 1972 wrote to memory of 680 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe LSASS.EXE PID 1972 wrote to memory of 680 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe LSASS.EXE PID 1972 wrote to memory of 1392 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SMSS.EXE PID 1972 wrote to memory of 1392 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SMSS.EXE PID 1972 wrote to memory of 1392 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SMSS.EXE PID 1972 wrote to memory of 1392 1972 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe"C:\Users\Admin\AppData\Local\Temp\5ccdbaba0b4e818fd6a30898ec037389a6d1249cc5a642b9f9760c55c7104138.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1972 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1392
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD517cfb20a8689a52b74d80edd11dcad90
SHA17b15d3d931a6b9faaf7e284d6892c04dd580302e
SHA2567e08b138b09db7a7facdafdb816d55f42c4186dfec072e76a1b635aad24a3608
SHA512a70ea1e47e4d5664e5113a070db10481ef19cfa857799d9a3dbcabe75e073445a4be8c6d0282a7d44e8c1c8926351a0fdfdce98bcaef782532c970a8b46ffa09
-
Filesize
196KB
MD5a73ddd82d280dedf23939f7031337c94
SHA1dc735130e3ff4ff66eef1da8fb0f37c1342d9d52
SHA256ce48c9c3b4f638e63c69061704164926655d600c96df21553f62982c0a6331c0
SHA5122636e55a1bbb18220ba4505536fceefa5cbff2b845794db46cdc9c941d8d7f89e3d9fda4a6e0446af0e12b46962cfda33e94f63ec120be3dd5a066b56c27fbff
-
Filesize
196KB
MD5ecfece72a21cc1c1ea972b1955c3d947
SHA1591f03a2243fb10710f3425b60bb14f7acb6da96
SHA256c7763145d6b475cfc66752445a65ad818c0237987edf16e2c8bc5d298dc0ad82
SHA5123a73a91a8a116e33231dc83538ee66721cc8437388ae575823194ddab42faab6262577d2c41ba982199a2f2305e5d24f03ff5c9c8e0d5e74988fffc881d92828
-
Filesize
196KB
MD5d0e2d2c200b19df8de531d9eeb6fa56b
SHA19de3824559c46eda7bfe376183c3856ec7a07932
SHA2561a0fc025a8c51b90d2f8d8a5cc4d68fa138c37640ee8894e52f929ff36382b5a
SHA5122cb7daefd8ac36af9970e6a7e98f18a56b0c74a9888e88a4ce28138cb3266e9a86e0753a5bfb64f75e6db52ff865a235eb9917db8428c082b70b36f558da768a
-
Filesize
196KB
MD51baf38e45eeea3a0f9034f82d0e88cdf
SHA195d88231391b80987f85073a5d12a0fa04f4c1e8
SHA256d87ac1957cd00759ea283bb4ebdfa36c68193578b3a9e1c135e7f39af93e800e
SHA512356cd18f4f005df948aa1b8c925625628f552e91a524fa15e8f01b4041f339955d280d624505ff3550d60ba60afdc44c0be8357c8b071553eabd91e0e3d46f71
-
Filesize
196KB
MD56dfbb3ee9f617c3d1ae42382407bbb88
SHA1216aa740d13c8e7160e77108aca414b0fe14d4a3
SHA2568a80aa5cd78d9009c669b7b675a0d01bca05b44617360ecc8c5ddb5d2319227b
SHA512be7566b9e9b777c913afa9083bca0a63ed9501456d5019974086ddf27ab2b82b451c71b191e28386c0ea04cc199f3ca72cd8f863425a852ac0af47d41456d5ee
-
Filesize
196KB
MD54c09f4544fdfa2a6471d84eb179025dc
SHA1400d9403a7d6c8b3525ab89fa7242ce795cb1717
SHA25614bb56950e93e67ccc7670ef7d866d67e4c3ea43f2525ff962452f648a7eff70
SHA512cd1fce2b44ee62c50369268dfd8a55926ed87d6c09c39eed3adb700265e1354c46223d31701780cc07bfd5bcac57fda85c210d4aaed822b78024c42ade1fc2eb
-
Filesize
196KB
MD517cfb20a8689a52b74d80edd11dcad90
SHA17b15d3d931a6b9faaf7e284d6892c04dd580302e
SHA2567e08b138b09db7a7facdafdb816d55f42c4186dfec072e76a1b635aad24a3608
SHA512a70ea1e47e4d5664e5113a070db10481ef19cfa857799d9a3dbcabe75e073445a4be8c6d0282a7d44e8c1c8926351a0fdfdce98bcaef782532c970a8b46ffa09
-
Filesize
196KB
MD517cfb20a8689a52b74d80edd11dcad90
SHA17b15d3d931a6b9faaf7e284d6892c04dd580302e
SHA2567e08b138b09db7a7facdafdb816d55f42c4186dfec072e76a1b635aad24a3608
SHA512a70ea1e47e4d5664e5113a070db10481ef19cfa857799d9a3dbcabe75e073445a4be8c6d0282a7d44e8c1c8926351a0fdfdce98bcaef782532c970a8b46ffa09
-
Filesize
196KB
MD5a73ddd82d280dedf23939f7031337c94
SHA1dc735130e3ff4ff66eef1da8fb0f37c1342d9d52
SHA256ce48c9c3b4f638e63c69061704164926655d600c96df21553f62982c0a6331c0
SHA5122636e55a1bbb18220ba4505536fceefa5cbff2b845794db46cdc9c941d8d7f89e3d9fda4a6e0446af0e12b46962cfda33e94f63ec120be3dd5a066b56c27fbff
-
Filesize
196KB
MD5a73ddd82d280dedf23939f7031337c94
SHA1dc735130e3ff4ff66eef1da8fb0f37c1342d9d52
SHA256ce48c9c3b4f638e63c69061704164926655d600c96df21553f62982c0a6331c0
SHA5122636e55a1bbb18220ba4505536fceefa5cbff2b845794db46cdc9c941d8d7f89e3d9fda4a6e0446af0e12b46962cfda33e94f63ec120be3dd5a066b56c27fbff
-
Filesize
196KB
MD5ecfece72a21cc1c1ea972b1955c3d947
SHA1591f03a2243fb10710f3425b60bb14f7acb6da96
SHA256c7763145d6b475cfc66752445a65ad818c0237987edf16e2c8bc5d298dc0ad82
SHA5123a73a91a8a116e33231dc83538ee66721cc8437388ae575823194ddab42faab6262577d2c41ba982199a2f2305e5d24f03ff5c9c8e0d5e74988fffc881d92828
-
Filesize
196KB
MD5ecfece72a21cc1c1ea972b1955c3d947
SHA1591f03a2243fb10710f3425b60bb14f7acb6da96
SHA256c7763145d6b475cfc66752445a65ad818c0237987edf16e2c8bc5d298dc0ad82
SHA5123a73a91a8a116e33231dc83538ee66721cc8437388ae575823194ddab42faab6262577d2c41ba982199a2f2305e5d24f03ff5c9c8e0d5e74988fffc881d92828
-
Filesize
196KB
MD5d0e2d2c200b19df8de531d9eeb6fa56b
SHA19de3824559c46eda7bfe376183c3856ec7a07932
SHA2561a0fc025a8c51b90d2f8d8a5cc4d68fa138c37640ee8894e52f929ff36382b5a
SHA5122cb7daefd8ac36af9970e6a7e98f18a56b0c74a9888e88a4ce28138cb3266e9a86e0753a5bfb64f75e6db52ff865a235eb9917db8428c082b70b36f558da768a
-
Filesize
196KB
MD5d0e2d2c200b19df8de531d9eeb6fa56b
SHA19de3824559c46eda7bfe376183c3856ec7a07932
SHA2561a0fc025a8c51b90d2f8d8a5cc4d68fa138c37640ee8894e52f929ff36382b5a
SHA5122cb7daefd8ac36af9970e6a7e98f18a56b0c74a9888e88a4ce28138cb3266e9a86e0753a5bfb64f75e6db52ff865a235eb9917db8428c082b70b36f558da768a
-
Filesize
196KB
MD51baf38e45eeea3a0f9034f82d0e88cdf
SHA195d88231391b80987f85073a5d12a0fa04f4c1e8
SHA256d87ac1957cd00759ea283bb4ebdfa36c68193578b3a9e1c135e7f39af93e800e
SHA512356cd18f4f005df948aa1b8c925625628f552e91a524fa15e8f01b4041f339955d280d624505ff3550d60ba60afdc44c0be8357c8b071553eabd91e0e3d46f71
-
Filesize
196KB
MD51baf38e45eeea3a0f9034f82d0e88cdf
SHA195d88231391b80987f85073a5d12a0fa04f4c1e8
SHA256d87ac1957cd00759ea283bb4ebdfa36c68193578b3a9e1c135e7f39af93e800e
SHA512356cd18f4f005df948aa1b8c925625628f552e91a524fa15e8f01b4041f339955d280d624505ff3550d60ba60afdc44c0be8357c8b071553eabd91e0e3d46f71
-
Filesize
196KB
MD56dfbb3ee9f617c3d1ae42382407bbb88
SHA1216aa740d13c8e7160e77108aca414b0fe14d4a3
SHA2568a80aa5cd78d9009c669b7b675a0d01bca05b44617360ecc8c5ddb5d2319227b
SHA512be7566b9e9b777c913afa9083bca0a63ed9501456d5019974086ddf27ab2b82b451c71b191e28386c0ea04cc199f3ca72cd8f863425a852ac0af47d41456d5ee
-
Filesize
196KB
MD56dfbb3ee9f617c3d1ae42382407bbb88
SHA1216aa740d13c8e7160e77108aca414b0fe14d4a3
SHA2568a80aa5cd78d9009c669b7b675a0d01bca05b44617360ecc8c5ddb5d2319227b
SHA512be7566b9e9b777c913afa9083bca0a63ed9501456d5019974086ddf27ab2b82b451c71b191e28386c0ea04cc199f3ca72cd8f863425a852ac0af47d41456d5ee