Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 07:46
Behavioral task
behavioral1
Sample
2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe
Resource
win10v2004-20220812-en
General
-
Target
2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe
-
Size
81KB
-
MD5
6dd61f72a98662d8690ba63420910090
-
SHA1
85c007ea2f1d2616a45a32fd50656a06e201f541
-
SHA256
2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5
-
SHA512
90bb1d739341df8371f02d945cf3ab866f868656030d584ae38cd331d09ee7eae3ddc26a5a8cab1019b5d3319fbe311a2e3c3bcba6d2ceb63e51f18e60a55d5a
-
SSDEEP
1536:Bi9nYGoQzoqZulWd3bisHcMbdYojw7Qag:yYGoQzoTYd3b1cMJj6E
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 explorer.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngPS.EXE explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kpfwsvc.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stormii.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\servet.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfserver.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwcfg.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kissvc.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TxoMoU.Exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ScanU3.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zxsweep.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DSMain.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWSMain.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\upiea.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\av.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastU3.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP_1.kxp explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TNT.Exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsTray.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmp.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCMgr.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRepair.com\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\~.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCRTP.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pagefile.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sxgame.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconsol.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EGHOST.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe\Debugger = "ntsd -d" explorer.exe -
resource yara_rule behavioral2/memory/4636-132-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/files/0x0008000000022e3e-134.dat upx behavioral2/files/0x0008000000022e3e-135.dat upx behavioral2/memory/5072-136-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4636-140-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5072-141-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TSPS.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1681.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8970.lnk explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 5072 explorer.exe 5072 explorer.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\q: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\r: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\t: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\y: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\e: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\k: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\s: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\i: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\p: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\j: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\m: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\v: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\x: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\z: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\f: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\h: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\u: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\w: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\n: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\o: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\g: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened (read-only) \??\l: 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files explorer.exe File opened for modification C:\Program Files (x86)\ explorer.exe File opened for modification C:\Program Files (x86)\Kaspersky Lab explorer.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe File opened for modification C:\Program Files (x86)\Common Files\ips888.dll explorer.exe File created C:\Program Files (x86)\Common Files\ips888.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe 5072 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe Token: SeLoadDriverPrivilege 5072 explorer.exe Token: SeDebugPrivilege 5072 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5072 explorer.exe 5072 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 5072 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe 81 PID 4636 wrote to memory of 5072 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe 81 PID 4636 wrote to memory of 5072 4636 2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe 81 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe"C:\Users\Admin\AppData\Local\Temp\2cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"2⤵
- Modifies system executable filetype association
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD56dd61f72a98662d8690ba63420910090
SHA185c007ea2f1d2616a45a32fd50656a06e201f541
SHA2562cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5
SHA51290bb1d739341df8371f02d945cf3ab866f868656030d584ae38cd331d09ee7eae3ddc26a5a8cab1019b5d3319fbe311a2e3c3bcba6d2ceb63e51f18e60a55d5a
-
Filesize
81KB
MD56dd61f72a98662d8690ba63420910090
SHA185c007ea2f1d2616a45a32fd50656a06e201f541
SHA2562cfcf0d1f5c5d42132acf4c53bac0a772eacc6ff91b1315d2beb6a3c9f2639e5
SHA51290bb1d739341df8371f02d945cf3ab866f868656030d584ae38cd331d09ee7eae3ddc26a5a8cab1019b5d3319fbe311a2e3c3bcba6d2ceb63e51f18e60a55d5a
-
Filesize
17KB
MD552ed87e5be3f265816b4ecadc24f2c1a
SHA1ed8165a7175bd45b0cb42c5fcffd0bcd502bc07c
SHA256b900c5dc3e36cd246bd11e754c29725ac99c4457cd3a9e6b32c4b3d7db7b53d6
SHA512462c23917e901474149ad7ace20e16136fb02c712dad7c4134fc1ea2d33789b3459dcac8ca08da3347e1f92ab14f211e5b6bc99d4c0e625ba59768d7c40d70e3
-
Filesize
17KB
MD552ed87e5be3f265816b4ecadc24f2c1a
SHA1ed8165a7175bd45b0cb42c5fcffd0bcd502bc07c
SHA256b900c5dc3e36cd246bd11e754c29725ac99c4457cd3a9e6b32c4b3d7db7b53d6
SHA512462c23917e901474149ad7ace20e16136fb02c712dad7c4134fc1ea2d33789b3459dcac8ca08da3347e1f92ab14f211e5b6bc99d4c0e625ba59768d7c40d70e3