Analysis
-
max time kernel
115s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 14:53
Behavioral task
behavioral1
Sample
824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe
Resource
win10v2004-20220901-en
General
-
Target
824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe
-
Size
91KB
-
MD5
67b84a88fcab472acb2a5c8f44d78320
-
SHA1
88a60ff1eadefff89566202cf81c7f6fe27b2e27
-
SHA256
824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7
-
SHA512
895f174f68867caa2f08537d0399a5544d6a8b30547f9d8da0fe7428610d920f2e168174096ec2abee69335caf20b1b8c93fa4c8d56c53c7f6c8da580e67392c
-
SSDEEP
1536:yOcjUpkWb2TTghpwuFCOcjUpkWb2TTghpwuh:yOcjWJuutFCOcjWJuuth
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE -
Disables RegEdit via registry modification 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 63 IoCs
pid Process 2044 4k51k4.exe 276 IExplorer.exe 596 WINLOGON.EXE 1128 CSRSS.EXE 1940 SERVICES.EXE 632 LSASS.EXE 2020 SMSS.EXE 1588 4k51k4.exe 876 4k51k4.exe 1436 IExplorer.exe 1772 IExplorer.exe 1680 4k51k4.exe 1040 IExplorer.exe 1524 4k51k4.exe 1780 4k51k4.exe 1724 WINLOGON.EXE 700 4k51k4.exe 1416 4k51k4.exe 460 4k51k4.exe 640 WINLOGON.EXE 1968 CSRSS.EXE 1976 IExplorer.exe 904 IExplorer.exe 1996 IExplorer.exe 344 CSRSS.EXE 1852 IExplorer.exe 876 WINLOGON.EXE 1588 IExplorer.exe 1428 WINLOGON.EXE 2004 WINLOGON.EXE 1680 SERVICES.EXE 572 WINLOGON.EXE 1728 WINLOGON.EXE 1044 CSRSS.EXE 564 CSRSS.EXE 932 WINLOGON.EXE 1980 LSASS.EXE 1972 CSRSS.EXE 1412 CSRSS.EXE 1568 CSRSS.EXE 936 SMSS.EXE 1664 SERVICES.EXE 1032 SERVICES.EXE 1096 CSRSS.EXE 2028 SERVICES.EXE 1528 LSASS.EXE 1964 SERVICES.EXE 2004 LSASS.EXE 556 LSASS.EXE 1212 SMSS.EXE 772 LSASS.EXE 1636 SERVICES.EXE 2012 SERVICES.EXE 1900 SERVICES.EXE 640 SMSS.EXE 1420 SMSS.EXE 1524 SMSS.EXE 992 LSASS.EXE 2008 LSASS.EXE 1664 SMSS.EXE 564 LSASS.EXE 344 SMSS.EXE 836 SMSS.EXE -
resource yara_rule behavioral1/files/0x00060000000142d7-58.dat upx behavioral1/files/0x000600000001448d-62.dat upx behavioral1/files/0x000600000001448d-63.dat upx behavioral1/files/0x000600000001448d-65.dat upx behavioral1/files/0x000600000001460b-69.dat upx behavioral1/files/0x000600000001460b-70.dat upx behavioral1/files/0x000600000001460b-72.dat upx behavioral1/files/0x000600000001468b-76.dat upx behavioral1/files/0x000600000001468b-77.dat upx behavioral1/files/0x000600000001468b-79.dat upx behavioral1/files/0x00060000000146af-83.dat upx behavioral1/files/0x00060000000146af-84.dat upx behavioral1/files/0x00060000000146af-86.dat upx behavioral1/files/0x000600000001482d-90.dat upx behavioral1/files/0x000600000001482d-91.dat upx behavioral1/files/0x000600000001482d-93.dat upx behavioral1/memory/1204-97-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0006000000014930-101.dat upx behavioral1/files/0x0006000000014930-100.dat upx behavioral1/memory/276-104-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/596-105-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/2044-103-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1128-107-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0006000000014930-106.dat upx behavioral1/memory/1940-108-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/632-109-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x000600000001460b-112.dat upx behavioral1/files/0x000600000001482d-113.dat upx behavioral1/files/0x000600000001468b-114.dat upx behavioral1/files/0x00060000000146af-115.dat upx behavioral1/files/0x000600000001435a-119.dat upx behavioral1/files/0x00060000000142d7-118.dat upx behavioral1/files/0x0006000000014930-117.dat upx behavioral1/files/0x00060000000142d7-126.dat upx behavioral1/files/0x00060000000144ba-131.dat upx behavioral1/files/0x00060000000142d7-134.dat upx behavioral1/files/0x00060000000144ba-122.dat upx behavioral1/files/0x0006000000014486-121.dat upx behavioral1/files/0x00060000000143a3-120.dat upx behavioral1/files/0x000600000001448d-123.dat upx behavioral1/files/0x0006000000014486-130.dat upx behavioral1/files/0x00060000000143a3-129.dat upx behavioral1/files/0x000600000001435a-128.dat upx behavioral1/files/0x00060000000144ba-139.dat upx behavioral1/files/0x0006000000014486-138.dat upx behavioral1/files/0x00060000000143a3-137.dat upx behavioral1/files/0x000600000001435a-136.dat upx behavioral1/files/0x000600000001448d-144.dat upx behavioral1/files/0x000600000001448d-143.dat upx behavioral1/memory/1588-142-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x000600000001448d-151.dat upx behavioral1/files/0x000600000001448d-146.dat upx behavioral1/files/0x000600000001448d-150.dat upx behavioral1/memory/876-149-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x000600000001448d-158.dat upx behavioral1/memory/1436-157-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x0006000000014486-156.dat upx behavioral1/files/0x00060000000143a3-155.dat upx behavioral1/files/0x000600000001435a-154.dat upx behavioral1/files/0x00060000000142d7-166.dat upx behavioral1/files/0x00060000000144ba-162.dat upx behavioral1/files/0x000600000001435a-161.dat upx behavioral1/files/0x0006000000014486-160.dat upx behavioral1/files/0x00060000000144ba-159.dat upx -
Loads dropped DLL 64 IoCs
pid Process 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 2044 4k51k4.exe 2044 4k51k4.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 276 IExplorer.exe 276 IExplorer.exe 2044 4k51k4.exe 2044 4k51k4.exe 276 IExplorer.exe 276 IExplorer.exe 2044 4k51k4.exe 2044 4k51k4.exe 632 LSASS.EXE 632 LSASS.EXE 1128 CSRSS.EXE 1128 CSRSS.EXE 2020 SMSS.EXE 2020 SMSS.EXE 276 IExplorer.exe 276 IExplorer.exe 1940 SERVICES.EXE 1940 SERVICES.EXE 596 WINLOGON.EXE 596 WINLOGON.EXE 632 LSASS.EXE 632 LSASS.EXE 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 2020 SMSS.EXE 2020 SMSS.EXE 2044 4k51k4.exe 2044 4k51k4.exe 1940 SERVICES.EXE 1940 SERVICES.EXE 596 WINLOGON.EXE 2020 SMSS.EXE 2020 SMSS.EXE 632 LSASS.EXE 1128 CSRSS.EXE 632 LSASS.EXE 1128 CSRSS.EXE 2044 4k51k4.exe 596 WINLOGON.EXE 1940 SERVICES.EXE 2044 4k51k4.exe 596 WINLOGON.EXE 1940 SERVICES.EXE 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 2044 4k51k4.exe 2044 4k51k4.exe 1940 SERVICES.EXE -
Adds Run key to start application 2 TTPs 56 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\desktop.ini 4k51k4.exe File created C:\desktop.ini 4k51k4.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\E: LSASS.EXE File opened (read-only) \??\S: SERVICES.EXE File opened (read-only) \??\X: SERVICES.EXE File opened (read-only) \??\I: SMSS.EXE File opened (read-only) \??\K: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\N: CSRSS.EXE File opened (read-only) \??\W: 4k51k4.exe File opened (read-only) \??\W: LSASS.EXE File opened (read-only) \??\H: SERVICES.EXE File opened (read-only) \??\E: CSRSS.EXE File opened (read-only) \??\M: WINLOGON.EXE File opened (read-only) \??\S: WINLOGON.EXE File opened (read-only) \??\Z: WINLOGON.EXE File opened (read-only) \??\S: LSASS.EXE File opened (read-only) \??\T: SERVICES.EXE File opened (read-only) \??\U: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\Y: WINLOGON.EXE File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\M: SERVICES.EXE File opened (read-only) \??\Y: SERVICES.EXE File opened (read-only) \??\R: WINLOGON.EXE File opened (read-only) \??\B: WINLOGON.EXE File opened (read-only) \??\O: LSASS.EXE File opened (read-only) \??\T: LSASS.EXE File opened (read-only) \??\U: LSASS.EXE File opened (read-only) \??\V: LSASS.EXE File opened (read-only) \??\X: LSASS.EXE File opened (read-only) \??\Q: CSRSS.EXE File opened (read-only) \??\U: CSRSS.EXE File opened (read-only) \??\G: WINLOGON.EXE File opened (read-only) \??\M: 4k51k4.exe File opened (read-only) \??\R: 4k51k4.exe File opened (read-only) \??\O: IExplorer.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\K: SERVICES.EXE File opened (read-only) \??\R: IExplorer.exe File opened (read-only) \??\I: LSASS.EXE File opened (read-only) \??\K: CSRSS.EXE File opened (read-only) \??\Z: CSRSS.EXE File opened (read-only) \??\L: WINLOGON.EXE File opened (read-only) \??\B: 4k51k4.exe File opened (read-only) \??\K: 4k51k4.exe File opened (read-only) \??\Y: 4k51k4.exe File opened (read-only) \??\H: LSASS.EXE File opened (read-only) \??\E: SERVICES.EXE File opened (read-only) \??\E: WINLOGON.EXE File opened (read-only) \??\X: 4k51k4.exe File opened (read-only) \??\U: SMSS.EXE File opened (read-only) \??\V: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\X: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\L: CSRSS.EXE File opened (read-only) \??\M: IExplorer.exe File opened (read-only) \??\F: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\S: 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened (read-only) \??\O: CSRSS.EXE File opened (read-only) \??\F: SERVICES.EXE File opened (read-only) \??\R: SERVICES.EXE File opened (read-only) \??\U: SERVICES.EXE File opened (read-only) \??\J: SMSS.EXE File opened (read-only) \??\F: WINLOGON.EXE File opened (read-only) \??\E: 4k51k4.exe File opened (read-only) \??\T: IExplorer.exe File opened (read-only) \??\B: LSASS.EXE -
Drops file in System32 directory 52 IoCs
description ioc Process File created C:\Windows\SysWOW64\MrHelloween.scr 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File created C:\Windows\SysWOW64\IExplorer.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\shell.exe CSRSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 4k51k4.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr CSRSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr LSASS.EXE File created C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\shell.exe SMSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\shell.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File created C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe -
Drops file in Windows directory 34 IoCs
description ioc Process File created C:\Windows\4k51k4.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened for modification C:\Windows\4k51k4.exe SERVICES.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe WINLOGON.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe 4k51k4.exe File opened for modification C:\Windows\4k51k4.exe SMSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe IExplorer.exe File created C:\Windows\4k51k4.exe SMSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 32 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe -
Suspicious use of SetWindowsHookEx 61 IoCs
pid Process 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 2044 4k51k4.exe 276 IExplorer.exe 596 WINLOGON.EXE 1128 CSRSS.EXE 1940 SERVICES.EXE 632 LSASS.EXE 2020 SMSS.EXE 1588 4k51k4.exe 876 4k51k4.exe 1436 IExplorer.exe 1680 4k51k4.exe 1040 IExplorer.exe 1780 4k51k4.exe 1524 4k51k4.exe 460 4k51k4.exe 1724 WINLOGON.EXE 700 4k51k4.exe 1416 4k51k4.exe 640 WINLOGON.EXE 1976 IExplorer.exe 1968 CSRSS.EXE 1772 IExplorer.exe 904 IExplorer.exe 1852 IExplorer.exe 1588 IExplorer.exe 876 WINLOGON.EXE 1996 IExplorer.exe 344 CSRSS.EXE 572 WINLOGON.EXE 1680 SERVICES.EXE 1728 WINLOGON.EXE 1428 WINLOGON.EXE 932 WINLOGON.EXE 1044 CSRSS.EXE 564 CSRSS.EXE 1980 LSASS.EXE 1412 CSRSS.EXE 1972 CSRSS.EXE 1664 SERVICES.EXE 936 SMSS.EXE 1032 SERVICES.EXE 2028 SERVICES.EXE 1096 CSRSS.EXE 1528 LSASS.EXE 1964 SERVICES.EXE 1568 CSRSS.EXE 772 LSASS.EXE 556 LSASS.EXE 1636 SERVICES.EXE 2012 SERVICES.EXE 1212 SMSS.EXE 1900 SERVICES.EXE 1524 SMSS.EXE 640 SMSS.EXE 2008 LSASS.EXE 992 LSASS.EXE 564 LSASS.EXE 1664 SMSS.EXE 344 SMSS.EXE 836 SMSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2044 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 27 PID 1204 wrote to memory of 2044 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 27 PID 1204 wrote to memory of 2044 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 27 PID 1204 wrote to memory of 2044 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 27 PID 1204 wrote to memory of 276 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 28 PID 1204 wrote to memory of 276 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 28 PID 1204 wrote to memory of 276 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 28 PID 1204 wrote to memory of 276 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 28 PID 1204 wrote to memory of 596 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 29 PID 1204 wrote to memory of 596 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 29 PID 1204 wrote to memory of 596 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 29 PID 1204 wrote to memory of 596 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 29 PID 1204 wrote to memory of 1128 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 30 PID 1204 wrote to memory of 1128 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 30 PID 1204 wrote to memory of 1128 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 30 PID 1204 wrote to memory of 1128 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 30 PID 1204 wrote to memory of 1940 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 31 PID 1204 wrote to memory of 1940 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 31 PID 1204 wrote to memory of 1940 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 31 PID 1204 wrote to memory of 1940 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 31 PID 1204 wrote to memory of 632 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 32 PID 1204 wrote to memory of 632 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 32 PID 1204 wrote to memory of 632 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 32 PID 1204 wrote to memory of 632 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 32 PID 1204 wrote to memory of 2020 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 33 PID 1204 wrote to memory of 2020 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 33 PID 1204 wrote to memory of 2020 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 33 PID 1204 wrote to memory of 2020 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 33 PID 2044 wrote to memory of 1588 2044 4k51k4.exe 34 PID 2044 wrote to memory of 1588 2044 4k51k4.exe 34 PID 2044 wrote to memory of 1588 2044 4k51k4.exe 34 PID 2044 wrote to memory of 1588 2044 4k51k4.exe 34 PID 1204 wrote to memory of 876 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 35 PID 1204 wrote to memory of 876 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 35 PID 1204 wrote to memory of 876 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 35 PID 1204 wrote to memory of 876 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 35 PID 2044 wrote to memory of 1436 2044 4k51k4.exe 36 PID 2044 wrote to memory of 1436 2044 4k51k4.exe 36 PID 2044 wrote to memory of 1436 2044 4k51k4.exe 36 PID 2044 wrote to memory of 1436 2044 4k51k4.exe 36 PID 1204 wrote to memory of 1772 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 37 PID 1204 wrote to memory of 1772 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 37 PID 1204 wrote to memory of 1772 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 37 PID 1204 wrote to memory of 1772 1204 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe 37 PID 276 wrote to memory of 1680 276 IExplorer.exe 38 PID 276 wrote to memory of 1680 276 IExplorer.exe 38 PID 276 wrote to memory of 1680 276 IExplorer.exe 38 PID 276 wrote to memory of 1680 276 IExplorer.exe 38 PID 276 wrote to memory of 1040 276 IExplorer.exe 39 PID 276 wrote to memory of 1040 276 IExplorer.exe 39 PID 276 wrote to memory of 1040 276 IExplorer.exe 39 PID 276 wrote to memory of 1040 276 IExplorer.exe 39 PID 1128 wrote to memory of 1524 1128 CSRSS.EXE 40 PID 1128 wrote to memory of 1524 1128 CSRSS.EXE 40 PID 1128 wrote to memory of 1524 1128 CSRSS.EXE 40 PID 1128 wrote to memory of 1524 1128 CSRSS.EXE 40 PID 632 wrote to memory of 1780 632 LSASS.EXE 41 PID 632 wrote to memory of 1780 632 LSASS.EXE 41 PID 632 wrote to memory of 1780 632 LSASS.EXE 41 PID 632 wrote to memory of 1780 632 LSASS.EXE 41 PID 2044 wrote to memory of 1724 2044 4k51k4.exe 42 PID 2044 wrote to memory of 1724 2044 4k51k4.exe 42 PID 2044 wrote to memory of 1724 2044 4k51k4.exe 42 PID 2044 wrote to memory of 1724 2044 4k51k4.exe 42 -
System policy modification 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe"C:\Users\Admin\AppData\Local\Temp\824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1204 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2044 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:276 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:596 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1128 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:632 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:700
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
PID:2004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
PID:2004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
PID:1420
-
-
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5fe8d791f783713e1a230f2738e20ba60
SHA13a99637d6df6fe6ab203c1380542d89b5e843b69
SHA25684369f833d52157f325458b28d56223961e6d4b603491a96cbdfd58758060722
SHA512d2fd443f75b029f1a5eebb66f2cbb80ed292a86e65bf465a1e0321109d50f43b429ad0242233d51608ed084d6825c6949fdb466ee08e432f99119cacd6f0dff3
-
Filesize
91KB
MD567b84a88fcab472acb2a5c8f44d78320
SHA188a60ff1eadefff89566202cf81c7f6fe27b2e27
SHA256824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7
SHA512895f174f68867caa2f08537d0399a5544d6a8b30547f9d8da0fe7428610d920f2e168174096ec2abee69335caf20b1b8c93fa4c8d56c53c7f6c8da580e67392c
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5ae4362472bab7d198675508c90741b68
SHA117d54776ab318aab3fe08ad3fc3a13183d37b9f6
SHA2561a7a403d377bb0337e3af53a290b7739640a2e9ef36aba5b4f1a5d5ebdf78dc4
SHA512f2542ee8afa9ca42fb20c9b22400844f2e4d1c6948d0537ffb4ab3882594e2cfac6b19041cf300f16876fd5799b45b7a6679adcb19d25125a50cd60d84e40eda
-
Filesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
Filesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
Filesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD57ab77738bd3d83201d4d1fea8b5e772a
SHA123549aca41776d1b86ddb7be594cba434fbffdfe
SHA2561663524ea3a4f0328a8386b4358cbeb8e09ea2499ed8fce17b6a639ff967fafb
SHA512bb8210b572c26a3647606a75a3bfa7559ed459d2254bba719e153e5c4c6aa4a186df52c3ff2c27848a68f4dac3f3fb558ac165ff13b032d20747149fce23f3b2
-
Filesize
91KB
MD5eff85686e54c646541db1c8551707ea9
SHA1a0985a063c9ec1cdfeff0e3bb261fdb8ec97e173
SHA25669aace6431bba09ef4415f65d9c696a330aaeaec15a3cdf3ad2e473f2145b0e0
SHA5124de186b05ab87bb4a450208de30918f813404d4ea64c9cd86c0ad4208c2da3a516824cef13f08144c4cf70c1ec6442c90f579b64e06e4f05b4ced694d07708fc
-
Filesize
91KB
MD5f8ac51bcea795cfaa30692cca9215d52
SHA1c7f7d32625ee49f18939c356b2ba582f522ac968
SHA256aaa7ec94d154ba6e24e4417ee3e103021e4e286f2ee0dc61c7becb65987178b7
SHA512c6180e3c6168284ac897d5f1177a3ab39e6f1abffaf4f3152cadaab1e7dd10503eebd097c1551883d1ad40769206fa04d01ae985dc8ab8b2b1b25d7cb289601e
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD57ab77738bd3d83201d4d1fea8b5e772a
SHA123549aca41776d1b86ddb7be594cba434fbffdfe
SHA2561663524ea3a4f0328a8386b4358cbeb8e09ea2499ed8fce17b6a639ff967fafb
SHA512bb8210b572c26a3647606a75a3bfa7559ed459d2254bba719e153e5c4c6aa4a186df52c3ff2c27848a68f4dac3f3fb558ac165ff13b032d20747149fce23f3b2
-
Filesize
91KB
MD5eff85686e54c646541db1c8551707ea9
SHA1a0985a063c9ec1cdfeff0e3bb261fdb8ec97e173
SHA25669aace6431bba09ef4415f65d9c696a330aaeaec15a3cdf3ad2e473f2145b0e0
SHA5124de186b05ab87bb4a450208de30918f813404d4ea64c9cd86c0ad4208c2da3a516824cef13f08144c4cf70c1ec6442c90f579b64e06e4f05b4ced694d07708fc
-
Filesize
91KB
MD5f8ac51bcea795cfaa30692cca9215d52
SHA1c7f7d32625ee49f18939c356b2ba582f522ac968
SHA256aaa7ec94d154ba6e24e4417ee3e103021e4e286f2ee0dc61c7becb65987178b7
SHA512c6180e3c6168284ac897d5f1177a3ab39e6f1abffaf4f3152cadaab1e7dd10503eebd097c1551883d1ad40769206fa04d01ae985dc8ab8b2b1b25d7cb289601e
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5103a99fca085c1ff94930e63d8675fab
SHA1c318eaf621ac90cdfd04d8ff733be3ea8c4a10fc
SHA256f4cc7698efe19dab59410b0e8b9aba5e5919f00af472aa80c40b518bcdfb4b57
SHA512e3fb1be994c575c3c5a4259bec5c303c2a336cfa7245a0ce627f677e889323c9b58ec7f356ef94ad0eee3226ac0e31b55bf4a7e60626f573605fb71e483642c2
-
Filesize
91KB
MD567b84a88fcab472acb2a5c8f44d78320
SHA188a60ff1eadefff89566202cf81c7f6fe27b2e27
SHA256824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7
SHA512895f174f68867caa2f08537d0399a5544d6a8b30547f9d8da0fe7428610d920f2e168174096ec2abee69335caf20b1b8c93fa4c8d56c53c7f6c8da580e67392c
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5454da51daad70c02ab83dcec7c82db5e
SHA1b9922d18f603f5fab682fb63fb36bd86c6771eb4
SHA256e99e4dca73caa5a7d8befc1d4cb39d9167d8cb04e8d2cbd19811abd6a9c6b431
SHA512c919320a0a7fda18bff300b3ad95bcc7ea03ed1ce7c03d1451dc57f06e45d128aa4c13e50a5fb12f14e22e086d776d963908a57d70bd65083df4191a3fb17a83
-
Filesize
91KB
MD5454da51daad70c02ab83dcec7c82db5e
SHA1b9922d18f603f5fab682fb63fb36bd86c6771eb4
SHA256e99e4dca73caa5a7d8befc1d4cb39d9167d8cb04e8d2cbd19811abd6a9c6b431
SHA512c919320a0a7fda18bff300b3ad95bcc7ea03ed1ce7c03d1451dc57f06e45d128aa4c13e50a5fb12f14e22e086d776d963908a57d70bd65083df4191a3fb17a83
-
Filesize
91KB
MD5454da51daad70c02ab83dcec7c82db5e
SHA1b9922d18f603f5fab682fb63fb36bd86c6771eb4
SHA256e99e4dca73caa5a7d8befc1d4cb39d9167d8cb04e8d2cbd19811abd6a9c6b431
SHA512c919320a0a7fda18bff300b3ad95bcc7ea03ed1ce7c03d1451dc57f06e45d128aa4c13e50a5fb12f14e22e086d776d963908a57d70bd65083df4191a3fb17a83
-
Filesize
91KB
MD5454da51daad70c02ab83dcec7c82db5e
SHA1b9922d18f603f5fab682fb63fb36bd86c6771eb4
SHA256e99e4dca73caa5a7d8befc1d4cb39d9167d8cb04e8d2cbd19811abd6a9c6b431
SHA512c919320a0a7fda18bff300b3ad95bcc7ea03ed1ce7c03d1451dc57f06e45d128aa4c13e50a5fb12f14e22e086d776d963908a57d70bd65083df4191a3fb17a83
-
Filesize
91KB
MD5454da51daad70c02ab83dcec7c82db5e
SHA1b9922d18f603f5fab682fb63fb36bd86c6771eb4
SHA256e99e4dca73caa5a7d8befc1d4cb39d9167d8cb04e8d2cbd19811abd6a9c6b431
SHA512c919320a0a7fda18bff300b3ad95bcc7ea03ed1ce7c03d1451dc57f06e45d128aa4c13e50a5fb12f14e22e086d776d963908a57d70bd65083df4191a3fb17a83
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD51cdd32c02315985fdbb7769591235b4b
SHA1cce3e2121a428fe03e492f77feabdd1a8baa188c
SHA25674a28c7cd1f95667eb2cc0ca1732365271097cbcc087892fb5cac8e83a4484c4
SHA512b7b58295e69b979d1cee09f0c3f951332ab452a7b9a90f205fd3bb9b9cb381bfe495137bb5320913e1c866d36ec6c13c3a2c0836af27fdc7e6b15ff47979b72f
-
Filesize
91KB
MD567b84a88fcab472acb2a5c8f44d78320
SHA188a60ff1eadefff89566202cf81c7f6fe27b2e27
SHA256824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7
SHA512895f174f68867caa2f08537d0399a5544d6a8b30547f9d8da0fe7428610d920f2e168174096ec2abee69335caf20b1b8c93fa4c8d56c53c7f6c8da580e67392c
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5a3328a9523aec7587a3816ff11a4be11
SHA1ac41ebf72d54262d1a6264988bc10242ab9c6c5a
SHA256a57ee6f3d3ee124f7734cee7578507e8190d1cdd97eb76266f7a69fe45bdc10b
SHA512cf5b228828eb16948f7a5e05abdc5c128dfc4547638a8c32da31ea0ca29a91bab5d09ca87c573b21bdd6cc0de12bc40b58099daf53f4263ce7faa1a0fda0deb0
-
Filesize
91KB
MD567b84a88fcab472acb2a5c8f44d78320
SHA188a60ff1eadefff89566202cf81c7f6fe27b2e27
SHA256824e63316a908e28848e81ce7c8b2a0924c7d9e5030078278e8bbb394ae704c7
SHA512895f174f68867caa2f08537d0399a5544d6a8b30547f9d8da0fe7428610d920f2e168174096ec2abee69335caf20b1b8c93fa4c8d56c53c7f6c8da580e67392c
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD57ab77738bd3d83201d4d1fea8b5e772a
SHA123549aca41776d1b86ddb7be594cba434fbffdfe
SHA2561663524ea3a4f0328a8386b4358cbeb8e09ea2499ed8fce17b6a639ff967fafb
SHA512bb8210b572c26a3647606a75a3bfa7559ed459d2254bba719e153e5c4c6aa4a186df52c3ff2c27848a68f4dac3f3fb558ac165ff13b032d20747149fce23f3b2
-
Filesize
91KB
MD5a026219e676e2ea89c7cb58c6cf1ebc8
SHA1c48cec858113ec0fe2de96c916cada22ed9642ef
SHA256526901faa7a66d9c979bf36306a53063199ecc62432a12408400d4b0e4f9b126
SHA5122d91cc3a8706ecc10f19e7638172cdb8a63a8499f268d88842f530e81ede7dd99b8e2b0984a83442d600db591869010dc5976447a67ea5584a815aa183742c56
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD57ab77738bd3d83201d4d1fea8b5e772a
SHA123549aca41776d1b86ddb7be594cba434fbffdfe
SHA2561663524ea3a4f0328a8386b4358cbeb8e09ea2499ed8fce17b6a639ff967fafb
SHA512bb8210b572c26a3647606a75a3bfa7559ed459d2254bba719e153e5c4c6aa4a186df52c3ff2c27848a68f4dac3f3fb558ac165ff13b032d20747149fce23f3b2
-
Filesize
91KB
MD57ab77738bd3d83201d4d1fea8b5e772a
SHA123549aca41776d1b86ddb7be594cba434fbffdfe
SHA2561663524ea3a4f0328a8386b4358cbeb8e09ea2499ed8fce17b6a639ff967fafb
SHA512bb8210b572c26a3647606a75a3bfa7559ed459d2254bba719e153e5c4c6aa4a186df52c3ff2c27848a68f4dac3f3fb558ac165ff13b032d20747149fce23f3b2
-
Filesize
91KB
MD5eff85686e54c646541db1c8551707ea9
SHA1a0985a063c9ec1cdfeff0e3bb261fdb8ec97e173
SHA25669aace6431bba09ef4415f65d9c696a330aaeaec15a3cdf3ad2e473f2145b0e0
SHA5124de186b05ab87bb4a450208de30918f813404d4ea64c9cd86c0ad4208c2da3a516824cef13f08144c4cf70c1ec6442c90f579b64e06e4f05b4ced694d07708fc
-
Filesize
91KB
MD5eff85686e54c646541db1c8551707ea9
SHA1a0985a063c9ec1cdfeff0e3bb261fdb8ec97e173
SHA25669aace6431bba09ef4415f65d9c696a330aaeaec15a3cdf3ad2e473f2145b0e0
SHA5124de186b05ab87bb4a450208de30918f813404d4ea64c9cd86c0ad4208c2da3a516824cef13f08144c4cf70c1ec6442c90f579b64e06e4f05b4ced694d07708fc
-
Filesize
91KB
MD5f8ac51bcea795cfaa30692cca9215d52
SHA1c7f7d32625ee49f18939c356b2ba582f522ac968
SHA256aaa7ec94d154ba6e24e4417ee3e103021e4e286f2ee0dc61c7becb65987178b7
SHA512c6180e3c6168284ac897d5f1177a3ab39e6f1abffaf4f3152cadaab1e7dd10503eebd097c1551883d1ad40769206fa04d01ae985dc8ab8b2b1b25d7cb289601e
-
Filesize
91KB
MD5f8ac51bcea795cfaa30692cca9215d52
SHA1c7f7d32625ee49f18939c356b2ba582f522ac968
SHA256aaa7ec94d154ba6e24e4417ee3e103021e4e286f2ee0dc61c7becb65987178b7
SHA512c6180e3c6168284ac897d5f1177a3ab39e6f1abffaf4f3152cadaab1e7dd10503eebd097c1551883d1ad40769206fa04d01ae985dc8ab8b2b1b25d7cb289601e
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD5efc402c3b722ad097d329af16f43f071
SHA1ad24386d9aa80ad9c4b4dec02a9cba99622a6062
SHA256573a683b63b14d86921456f5862c564916c714d18339d5e99318a3e232efe73d
SHA512aa3b43aec328479a6bffc8397ee6b8ae96574f8ba8c316f77893e42e2ea2a57062b729a600dc871e3aa237a7f157c9309b665291f0dccce5633c23ddcb1a857c
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5
-
Filesize
91KB
MD531f4555dcd7c4dc76b10d76c0f7990d1
SHA1ba8c8ee8c0f2b91f2141547322dcacaa0ba7afb4
SHA256c63bcff3a074499ce5e6acedd19ee4b3da6cbab2728d9ba55ce17dcdc1822e48
SHA512d6ec42381fe48d7e80a2d29e2d6ee13fc312665ec68216b8d9a3c5cfc338f1b985e87eaf1a6365da076f038fec6485b3de8f0fbef5e065cb5db384cb6d4d98a5