Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe
Resource
win10v2004-20220812-en
General
-
Target
b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe
-
Size
70KB
-
MD5
54d2368d604ac5852507b39ade0941f2
-
SHA1
6d9e4c37a6c6f9d893e3e8778122a1d466c5954e
-
SHA256
b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99
-
SHA512
2a0ca14b52aa10f252be724b065154a823aec86b16310d69bdce7e63052edd8c7e4aa510da19e8510a3f1ea08592b65a8471efd44b280401c54c72bc27a8c54e
-
SSDEEP
768:1iCHI1nffAkGisSQ6KRcJZOYoBudWaDyqzlL49FLdS5yA+jz+CEt+R5nOwekfZUW:1LHIlfH7Q6qRBwWa2qxQFZA+j6wWw+9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Lubang Hitam.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Black Hole.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe -
Disables RegEdit via registry modification 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 62 IoCs
pid Process 216 Black Hole.exe 5072 Lubang Hitam.exe 4840 WINLOGON.EXE 2072 CSRSS.EXE 2724 SERVICES.EXE 1500 LSASS.EXE 3444 SMSS.EXE 5016 Black Hole.exe 4808 Conhost.exe 3604 WINLOGON.EXE 2296 CSRSS.EXE 4072 SERVICES.EXE 1452 LSASS.EXE 1168 Black Hole.exe 3648 Black Hole.exe 4144 Black Hole.exe 4860 Black Hole.exe 4552 Lubang Hitam.exe 3156 Lubang Hitam.exe 220 Lubang Hitam.exe 2332 LSASS.EXE 4916 Black Hole.exe 2320 WINLOGON.EXE 3896 WINLOGON.EXE 3380 Lubang Hitam.exe 2004 WINLOGON.EXE 4672 WINLOGON.EXE 4568 CSRSS.EXE 3440 CSRSS.EXE 2052 CSRSS.EXE 4352 CSRSS.EXE 2084 WINLOGON.EXE 3188 SERVICES.EXE 2348 SERVICES.EXE 1900 CSRSS.EXE 1768 SERVICES.EXE 4872 SERVICES.EXE 8 Black Hole.exe 1756 LSASS.EXE 4220 LSASS.EXE 3924 LSASS.EXE 2332 LSASS.EXE 4448 SERVICES.EXE 216 Lubang Hitam.exe 3788 SMSS.EXE 3520 SMSS.EXE 4996 SMSS.EXE 3416 Black Hole.exe 3176 SMSS.EXE 4392 LSASS.EXE 3780 WINLOGON.EXE 3940 Lubang Hitam.exe 4588 SMSS.EXE 2208 CSRSS.EXE 4480 WINLOGON.EXE 4240 CSRSS.EXE 1824 SERVICES.EXE 5036 LSASS.EXE 3552 SERVICES.EXE 4944 SMSS.EXE 1556 LSASS.EXE 2376 SMSS.EXE -
Loads dropped DLL 8 IoCs
pid Process 5016 Black Hole.exe 1168 Black Hole.exe 3648 Black Hole.exe 4144 Black Hole.exe 4860 Black Hole.exe 4916 Black Hole.exe 8 Black Hole.exe 3416 Black Hole.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\ LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: SMSS.EXE File opened (read-only) \??\F: Lubang Hitam.exe File opened (read-only) \??\H: Lubang Hitam.exe File opened (read-only) \??\Y: Lubang Hitam.exe File opened (read-only) \??\U: Lubang Hitam.exe File opened (read-only) \??\Y: SERVICES.EXE File opened (read-only) \??\R: SMSS.EXE File opened (read-only) \??\E: WINLOGON.EXE File opened (read-only) \??\T: LSASS.EXE File opened (read-only) \??\W: LSASS.EXE File opened (read-only) \??\Q: SMSS.EXE File opened (read-only) \??\U: SMSS.EXE File opened (read-only) \??\L: b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened (read-only) \??\Y: b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened (read-only) \??\I: Lubang Hitam.exe File opened (read-only) \??\B: Black Hole.exe File opened (read-only) \??\N: Black Hole.exe File opened (read-only) \??\R: Lubang Hitam.exe File opened (read-only) \??\Z: LSASS.EXE File opened (read-only) \??\L: SMSS.EXE File opened (read-only) \??\V: Black Hole.exe File opened (read-only) \??\I: Lubang Hitam.exe File opened (read-only) \??\Z: Lubang Hitam.exe File opened (read-only) \??\F: WINLOGON.EXE File opened (read-only) \??\V: WINLOGON.EXE File opened (read-only) \??\J: LSASS.EXE File opened (read-only) \??\S: SERVICES.EXE File opened (read-only) \??\J: SMSS.EXE File opened (read-only) \??\T: Black Hole.exe File opened (read-only) \??\J: b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened (read-only) \??\K: CSRSS.EXE File opened (read-only) \??\B: SERVICES.EXE File opened (read-only) \??\P: WINLOGON.EXE File opened (read-only) \??\U: CSRSS.EXE File opened (read-only) \??\R: SERVICES.EXE File opened (read-only) \??\B: Lubang Hitam.exe File opened (read-only) \??\M: Lubang Hitam.exe File opened (read-only) \??\H: WINLOGON.EXE File opened (read-only) \??\K: WINLOGON.EXE File opened (read-only) \??\O: WINLOGON.EXE File opened (read-only) \??\V: Lubang Hitam.exe File opened (read-only) \??\F: SMSS.EXE File opened (read-only) \??\I: Black Hole.exe File opened (read-only) \??\U: WINLOGON.EXE File opened (read-only) \??\V: SERVICES.EXE File opened (read-only) \??\E: SMSS.EXE File opened (read-only) \??\S: Black Hole.exe File opened (read-only) \??\W: Lubang Hitam.exe File opened (read-only) \??\L: CSRSS.EXE File opened (read-only) \??\I: SERVICES.EXE File opened (read-only) \??\T: SERVICES.EXE File opened (read-only) \??\V: b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened (read-only) \??\O: SMSS.EXE File opened (read-only) \??\T: Lubang Hitam.exe File opened (read-only) \??\S: WINLOGON.EXE File opened (read-only) \??\L: LSASS.EXE File opened (read-only) \??\U: Lubang Hitam.exe File opened (read-only) \??\T: CSRSS.EXE File opened (read-only) \??\G: SMSS.EXE File opened (read-only) \??\W: Black Hole.exe File opened (read-only) \??\Q: Lubang Hitam.exe File opened (read-only) \??\N: Lubang Hitam.exe File opened (read-only) \??\J: WINLOGON.EXE File opened (read-only) \??\G: CSRSS.EXE -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Autorun.inf b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\Autorun.inf b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\1042022105538.bmp Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\1042022105414.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105517.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105537.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105601.bmp Lubang Hitam.exe File created C:\Windows\SysWOW64\Destruction.scr b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105526.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105534.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105621.bmp Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105540.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105543.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr Black Hole.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe Black Hole.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105520.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\1042022105453.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105508.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105555.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105610.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105459.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105510.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105532.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105619.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105550.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105535.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105544.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105622.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105455.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105513.bmp Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\Destruction.scr Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105553.bmp Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105617.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105529.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105607.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\Windows\SysWOW64\Shell.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\1042022105436.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105501.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105541.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\1042022105616.bmp Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr LSASS.EXE File opened for modification C:\Windows\SysWOW64\Destruction.scr SMSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\SysWOW64\msvbvm60.dll LSASS.EXE -
Drops file in Windows directory 55 IoCs
description ioc Process File opened for modification C:\WINDOWS\Hacked By Gerry.txt Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt SERVICES.EXE File created C:\WINDOWS\Hacked By Gerry.txt b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Conhost.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe Black Hole.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt CSRSS.EXE File opened for modification C:\Windows\Black Hole.exe Lubang Hitam.exe File opened for modification C:\WINDOWS\Black Hole.txt WINLOGON.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll LSASS.EXE File created C:\Windows\Black Hole.exe Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe LSASS.EXE File created C:\Windows\Black Hole.exe SERVICES.EXE File opened for modification C:\Windows\Black Hole.exe SMSS.EXE File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll LSASS.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt Black Hole.exe File opened for modification C:\WINDOWS\Black Hole.txt Lubang Hitam.exe File created C:\Windows\Black Hole.exe b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Black Hole.txt SMSS.EXE File opened for modification C:\Windows\Black Hole.exe CSRSS.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt WINLOGON.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt LSASS.EXE File created C:\Windows\Black Hole.exe WINLOGON.EXE File created C:\WINDOWS\Black Hole.txt b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\WINDOWS\Black Hole.txt LSASS.EXE File opened for modification C:\WINDOWS\Black Hole.txt Black Hole.exe File opened for modification C:\WINDOWS\Black Hole.txt CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe WINLOGON.EXE File created C:\Windows\Black Hole.exe SMSS.EXE File created C:\Windows\Black Hole.exe Black Hole.exe File opened for modification C:\Windows\Black Hole.exe Lubang Hitam.exe File created C:\Windows\Black Hole.exe CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Conhost.exe File created C:\Windows\Black Hole.exe LSASS.EXE File opened for modification C:\Windows\Black Hole.exe SERVICES.EXE File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\WINDOWS\Black Hole.txt b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe File opened for modification C:\WINDOWS\Black Hole.txt SERVICES.EXE File opened for modification C:\WINDOWS\Black Hole.txt Lubang Hitam.exe -
Modifies Control Panel 60 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\SwapMouseButtons = "1" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Mouse\ CSRSS.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 216 Black Hole.exe 216 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe 5016 Black Hole.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 4552 Lubang Hitam.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1904 shutdown.exe Token: SeRemoteShutdownPrivilege 1904 shutdown.exe Token: SeShutdownPrivilege 4304 shutdown.exe Token: SeRemoteShutdownPrivilege 4304 shutdown.exe Token: SeShutdownPrivilege 724 shutdown.exe Token: SeRemoteShutdownPrivilege 724 shutdown.exe Token: SeShutdownPrivilege 4928 shutdown.exe Token: SeRemoteShutdownPrivilege 4928 shutdown.exe Token: SeShutdownPrivilege 2212 shutdown.exe Token: SeRemoteShutdownPrivilege 2212 shutdown.exe Token: SeShutdownPrivilege 3632 shutdown.exe Token: SeRemoteShutdownPrivilege 3632 shutdown.exe Token: SeShutdownPrivilege 3800 shutdown.exe Token: SeRemoteShutdownPrivilege 3800 shutdown.exe Token: SeShutdownPrivilege 1892 shutdown.exe Token: SeRemoteShutdownPrivilege 1892 shutdown.exe Token: SeShutdownPrivilege 4100 shutdown.exe Token: SeRemoteShutdownPrivilege 4100 shutdown.exe Token: SeShutdownPrivilege 3516 shutdown.exe Token: SeRemoteShutdownPrivilege 3516 shutdown.exe Token: SeShutdownPrivilege 3176 shutdown.exe Token: SeRemoteShutdownPrivilege 3176 shutdown.exe Token: SeShutdownPrivilege 1908 shutdown.exe Token: SeRemoteShutdownPrivilege 1908 shutdown.exe Token: SeShutdownPrivilege 2516 shutdown.exe Token: SeRemoteShutdownPrivilege 2516 shutdown.exe Token: SeShutdownPrivilege 1660 shutdown.exe Token: SeRemoteShutdownPrivilege 1660 shutdown.exe Token: SeShutdownPrivilege 2572 shutdown.exe Token: SeRemoteShutdownPrivilege 2572 shutdown.exe Token: SeShutdownPrivilege 4728 shutdown.exe Token: SeRemoteShutdownPrivilege 4728 shutdown.exe Token: SeShutdownPrivilege 224 shutdown.exe Token: SeRemoteShutdownPrivilege 224 shutdown.exe Token: SeShutdownPrivilege 480 shutdown.exe Token: SeRemoteShutdownPrivilege 480 shutdown.exe Token: SeShutdownPrivilege 216 Lubang Hitam.exe Token: SeRemoteShutdownPrivilege 216 Lubang Hitam.exe Token: SeShutdownPrivilege 1808 shutdown.exe Token: SeRemoteShutdownPrivilege 1808 shutdown.exe Token: SeShutdownPrivilege 3788 SMSS.EXE Token: SeRemoteShutdownPrivilege 3788 SMSS.EXE Token: SeShutdownPrivilege 4512 shutdown.exe Token: SeRemoteShutdownPrivilege 4512 shutdown.exe Token: SeShutdownPrivilege 876 shutdown.exe Token: SeRemoteShutdownPrivilege 876 shutdown.exe Token: SeShutdownPrivilege 4592 shutdown.exe Token: SeRemoteShutdownPrivilege 4592 shutdown.exe Token: SeShutdownPrivilege 4228 shutdown.exe Token: SeRemoteShutdownPrivilege 4228 shutdown.exe Token: SeShutdownPrivilege 4948 shutdown.exe Token: SeRemoteShutdownPrivilege 4948 shutdown.exe Token: SeShutdownPrivilege 3528 shutdown.exe Token: SeRemoteShutdownPrivilege 3528 shutdown.exe Token: SeShutdownPrivilege 1972 shutdown.exe Token: SeRemoteShutdownPrivilege 1972 shutdown.exe Token: SeShutdownPrivilege 764 shutdown.exe Token: SeRemoteShutdownPrivilege 764 shutdown.exe Token: SeShutdownPrivilege 1456 shutdown.exe Token: SeRemoteShutdownPrivilege 1456 shutdown.exe Token: SeShutdownPrivilege 2804 shutdown.exe Token: SeRemoteShutdownPrivilege 2804 shutdown.exe Token: SeShutdownPrivilege 3680 shutdown.exe Token: SeRemoteShutdownPrivilege 3680 shutdown.exe -
Suspicious use of SetWindowsHookEx 62 IoCs
pid Process 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 216 Black Hole.exe 5072 Lubang Hitam.exe 4840 WINLOGON.EXE 2072 CSRSS.EXE 2724 SERVICES.EXE 1500 LSASS.EXE 3444 SMSS.EXE 5016 Black Hole.exe 4808 Conhost.exe 3604 WINLOGON.EXE 2296 CSRSS.EXE 4072 SERVICES.EXE 1452 LSASS.EXE 1168 Black Hole.exe 3648 Black Hole.exe 4144 Black Hole.exe 4552 Lubang Hitam.exe 3156 Lubang Hitam.exe 220 Lubang Hitam.exe 2332 LSASS.EXE 4916 Black Hole.exe 2320 WINLOGON.EXE 3896 WINLOGON.EXE 2004 WINLOGON.EXE 3380 Lubang Hitam.exe 4672 WINLOGON.EXE 4568 CSRSS.EXE 3440 CSRSS.EXE 2052 CSRSS.EXE 2084 WINLOGON.EXE 4352 CSRSS.EXE 3188 SERVICES.EXE 2348 SERVICES.EXE 1768 SERVICES.EXE 1900 CSRSS.EXE 4872 SERVICES.EXE 4220 LSASS.EXE 1756 LSASS.EXE 8 Black Hole.exe 3924 LSASS.EXE 4448 SERVICES.EXE 2332 LSASS.EXE 216 Lubang Hitam.exe 3520 SMSS.EXE 3788 SMSS.EXE 4996 SMSS.EXE 3416 Black Hole.exe 4392 LSASS.EXE 3176 SMSS.EXE 3780 WINLOGON.EXE 3940 Lubang Hitam.exe 4480 WINLOGON.EXE 2208 CSRSS.EXE 4588 SMSS.EXE 1824 SERVICES.EXE 4240 CSRSS.EXE 5036 LSASS.EXE 3552 SERVICES.EXE 1556 LSASS.EXE 4944 SMSS.EXE 2376 SMSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1904 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 82 PID 1696 wrote to memory of 1904 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 82 PID 1696 wrote to memory of 1904 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 82 PID 1696 wrote to memory of 216 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 87 PID 1696 wrote to memory of 216 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 87 PID 1696 wrote to memory of 216 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 87 PID 216 wrote to memory of 4304 216 Black Hole.exe 88 PID 216 wrote to memory of 4304 216 Black Hole.exe 88 PID 216 wrote to memory of 4304 216 Black Hole.exe 88 PID 1696 wrote to memory of 5072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 90 PID 1696 wrote to memory of 5072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 90 PID 1696 wrote to memory of 5072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 90 PID 5072 wrote to memory of 724 5072 Lubang Hitam.exe 91 PID 5072 wrote to memory of 724 5072 Lubang Hitam.exe 91 PID 5072 wrote to memory of 724 5072 Lubang Hitam.exe 91 PID 1696 wrote to memory of 4840 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 93 PID 1696 wrote to memory of 4840 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 93 PID 1696 wrote to memory of 4840 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 93 PID 4840 wrote to memory of 4928 4840 WINLOGON.EXE 94 PID 4840 wrote to memory of 4928 4840 WINLOGON.EXE 94 PID 4840 wrote to memory of 4928 4840 WINLOGON.EXE 94 PID 1696 wrote to memory of 2072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 96 PID 1696 wrote to memory of 2072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 96 PID 1696 wrote to memory of 2072 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 96 PID 2072 wrote to memory of 2212 2072 CSRSS.EXE 97 PID 2072 wrote to memory of 2212 2072 CSRSS.EXE 97 PID 2072 wrote to memory of 2212 2072 CSRSS.EXE 97 PID 1696 wrote to memory of 2724 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 99 PID 1696 wrote to memory of 2724 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 99 PID 1696 wrote to memory of 2724 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 99 PID 2724 wrote to memory of 3632 2724 SERVICES.EXE 100 PID 2724 wrote to memory of 3632 2724 SERVICES.EXE 100 PID 2724 wrote to memory of 3632 2724 SERVICES.EXE 100 PID 1696 wrote to memory of 1500 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 102 PID 1696 wrote to memory of 1500 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 102 PID 1696 wrote to memory of 1500 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 102 PID 1500 wrote to memory of 3800 1500 LSASS.EXE 104 PID 1500 wrote to memory of 3800 1500 LSASS.EXE 104 PID 1500 wrote to memory of 3800 1500 LSASS.EXE 104 PID 1696 wrote to memory of 3444 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 105 PID 1696 wrote to memory of 3444 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 105 PID 1696 wrote to memory of 3444 1696 b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe 105 PID 3444 wrote to memory of 1892 3444 SMSS.EXE 106 PID 3444 wrote to memory of 1892 3444 SMSS.EXE 106 PID 3444 wrote to memory of 1892 3444 SMSS.EXE 106 PID 5072 wrote to memory of 5016 5072 Lubang Hitam.exe 108 PID 5072 wrote to memory of 5016 5072 Lubang Hitam.exe 108 PID 5072 wrote to memory of 5016 5072 Lubang Hitam.exe 108 PID 5016 wrote to memory of 4100 5016 Black Hole.exe 110 PID 5016 wrote to memory of 4100 5016 Black Hole.exe 110 PID 5016 wrote to memory of 4100 5016 Black Hole.exe 110 PID 5072 wrote to memory of 4808 5072 Lubang Hitam.exe 166 PID 5072 wrote to memory of 4808 5072 Lubang Hitam.exe 166 PID 5072 wrote to memory of 4808 5072 Lubang Hitam.exe 166 PID 4808 wrote to memory of 3516 4808 Conhost.exe 114 PID 4808 wrote to memory of 3516 4808 Conhost.exe 114 PID 4808 wrote to memory of 3516 4808 Conhost.exe 114 PID 5072 wrote to memory of 3604 5072 Lubang Hitam.exe 116 PID 5072 wrote to memory of 3604 5072 Lubang Hitam.exe 116 PID 5072 wrote to memory of 3604 5072 Lubang Hitam.exe 116 PID 3604 wrote to memory of 3176 3604 WINLOGON.EXE 117 PID 3604 wrote to memory of 3176 3604 WINLOGON.EXE 117 PID 3604 wrote to memory of 3176 3604 WINLOGON.EXE 117 PID 5072 wrote to memory of 2296 5072 Lubang Hitam.exe 119 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp\Disabled = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoPwdPage = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp\Disabled = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoPwdPage = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp\Disabled = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayContextMenu = "1" Lubang Hitam.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe"C:\Users\Admin\AppData\Local\Temp\b15624e44e6de7f3b360623fef5adf40859226c81cb1ddc2540b4e54461cfa99.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1696 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:216 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5072 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5016 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:8 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:3088
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:216 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2156
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3780 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:456
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:800
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1248
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2476
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1492
-
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵PID:4808
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4840 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4552 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:216
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2164
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3940 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:4020
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:332
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4240 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1528
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3552 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:4036
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:3684
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:4540
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3440 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3976
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:5012
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4996 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3224
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2072 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3648 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2572
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3156 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3188 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:384
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4220 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:5044
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3600
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2724 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4144 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵PID:2332
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4872 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:448
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3440
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1500 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4860 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:220 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3788
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3924 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:5060
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3788 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:4820
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3444 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3380 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:4436
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2288
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4392 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:4568
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:3976
-
-
-
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!1⤵PID:1980
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!1⤵PID:956
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5b6bc048a4736e9242ef8cab049d6d16a
SHA1bc8b6b98b9e92d1718cf5020e7d127dc33f7e042
SHA256e9af6b22ebbd9385c749396b661a089d447249079f597bcdc830c508ca00f737
SHA51273780a20247c5d25559e5cb46d88beefe760830239abcf4e06a1da99c0d6a08495e618c4723588e5945d3796688b7e556be4a4a92b34f0de51479d5a9d17bcb5
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD5555891f4871e48e025e887ce5b70c845
SHA1536792c94d94a8a8d341cf6bde4db13d3dc96886
SHA2565af482f9dfcfbce4cc465fa576e9b193698671a1e2bd4ddc5ba6f92008a1f27a
SHA5123998bf855cca12fa0f5b1d776747bd6a59346a0acfcb07ad1c43d09c32f5075eaf4af18aa46d9a6da9556eab2a22b76749e3ba0bcbfdf10142d0b0bd7db74388
-
Filesize
70KB
MD5555891f4871e48e025e887ce5b70c845
SHA1536792c94d94a8a8d341cf6bde4db13d3dc96886
SHA2565af482f9dfcfbce4cc465fa576e9b193698671a1e2bd4ddc5ba6f92008a1f27a
SHA5123998bf855cca12fa0f5b1d776747bd6a59346a0acfcb07ad1c43d09c32f5075eaf4af18aa46d9a6da9556eab2a22b76749e3ba0bcbfdf10142d0b0bd7db74388
-
Filesize
70KB
MD54f7a0de15fe5467fd52af471919aeec5
SHA16561f76ba31c4e5fef48362684faa8140d39ff54
SHA256608eaed5293acbe240c120f1408a1077006db194750983ca4d4edf31ca6c3c5f
SHA512620670360f29ea8a36e2c142b68d60b81656c66fdc9ef07afe7eb35d8b611f595791aaafd26e61eb527fe45f4022f045f62c8e20b9dd2c0a8705f551b6f2ed85
-
Filesize
70KB
MD510720a439b47757875db7d1f335f6608
SHA14f702b04020dcda88feb5b5d13324ef3d4592908
SHA256495e5a63232782917357c0716086dcacdb3f432e3557631d4d6fb3522a4061b3
SHA51258b26e5a5e34fd0aab429cad68c7ecc1a1be2bd6d0a77c060037e5ca08251e560be400ece5fa9ce4d304424be59342d5757ed2f9ad1b5cee028063aa06919029
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5f175ebf7d845e860f6c76d9a03c06c07
SHA1b008c793fe1c590b22dd1fb6245d2383c152c6ae
SHA2561b7a3b78d2f13008f8fc7fb454769d91b9a253cc61457dbcc0310b957bb5cd5f
SHA512a3a06fc11282f7fc027367973b5da2bf830165dc10544ffeddf3780822b274d17487433804588c7d94cf452a9c542733a459ffab27a4361317e1058ee4caf913
-
Filesize
70KB
MD5f175ebf7d845e860f6c76d9a03c06c07
SHA1b008c793fe1c590b22dd1fb6245d2383c152c6ae
SHA2561b7a3b78d2f13008f8fc7fb454769d91b9a253cc61457dbcc0310b957bb5cd5f
SHA512a3a06fc11282f7fc027367973b5da2bf830165dc10544ffeddf3780822b274d17487433804588c7d94cf452a9c542733a459ffab27a4361317e1058ee4caf913
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD55ae2ae145258979b76b3f752ab3e734e
SHA17f411cb00a8f5e10aa2dbf5ecdb35384e57c71c2
SHA25676ac20bc9d10a2554a8e94eaadd628543c675e3df19dd038dd5a8c91c55e7a79
SHA5122d02556d88cfc5053132b59f9b9f8994e38fa7cd2f657181e2422d42b325d5b82488013d974ec92f1e0a7eeb3a27003ed0a4464ef2a242ae44b27d3ee44dd184
-
Filesize
70KB
MD55ae2ae145258979b76b3f752ab3e734e
SHA17f411cb00a8f5e10aa2dbf5ecdb35384e57c71c2
SHA25676ac20bc9d10a2554a8e94eaadd628543c675e3df19dd038dd5a8c91c55e7a79
SHA5122d02556d88cfc5053132b59f9b9f8994e38fa7cd2f657181e2422d42b325d5b82488013d974ec92f1e0a7eeb3a27003ed0a4464ef2a242ae44b27d3ee44dd184
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5f175ebf7d845e860f6c76d9a03c06c07
SHA1b008c793fe1c590b22dd1fb6245d2383c152c6ae
SHA2561b7a3b78d2f13008f8fc7fb454769d91b9a253cc61457dbcc0310b957bb5cd5f
SHA512a3a06fc11282f7fc027367973b5da2bf830165dc10544ffeddf3780822b274d17487433804588c7d94cf452a9c542733a459ffab27a4361317e1058ee4caf913
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD55ae2ae145258979b76b3f752ab3e734e
SHA17f411cb00a8f5e10aa2dbf5ecdb35384e57c71c2
SHA25676ac20bc9d10a2554a8e94eaadd628543c675e3df19dd038dd5a8c91c55e7a79
SHA5122d02556d88cfc5053132b59f9b9f8994e38fa7cd2f657181e2422d42b325d5b82488013d974ec92f1e0a7eeb3a27003ed0a4464ef2a242ae44b27d3ee44dd184
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD55ae2ae145258979b76b3f752ab3e734e
SHA17f411cb00a8f5e10aa2dbf5ecdb35384e57c71c2
SHA25676ac20bc9d10a2554a8e94eaadd628543c675e3df19dd038dd5a8c91c55e7a79
SHA5122d02556d88cfc5053132b59f9b9f8994e38fa7cd2f657181e2422d42b325d5b82488013d974ec92f1e0a7eeb3a27003ed0a4464ef2a242ae44b27d3ee44dd184
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD5102b9b310c51a1e6a52ddf42c0572754
SHA15916a97a482a4b4738349be1a940415a80b13727
SHA256b805c5bf93a6dfab73a8c9ed0c93b93c7c57ec94dc12c1c01c053917b0496b6b
SHA5126c18a865f5ea225b75871fb9a936335a733b8a3f5c78c3f98b8ba78a31dd4931347cc89ea94d8340f8dc1fa3ff5fc579c86f8385c51bcce1c1348bf0b257cddc
-
Filesize
70KB
MD5102b9b310c51a1e6a52ddf42c0572754
SHA15916a97a482a4b4738349be1a940415a80b13727
SHA256b805c5bf93a6dfab73a8c9ed0c93b93c7c57ec94dc12c1c01c053917b0496b6b
SHA5126c18a865f5ea225b75871fb9a936335a733b8a3f5c78c3f98b8ba78a31dd4931347cc89ea94d8340f8dc1fa3ff5fc579c86f8385c51bcce1c1348bf0b257cddc
-
Filesize
1KB
MD54c7fa739f19c5a236abdba26cce2e3a5
SHA17929944ee8ba07bc85957b77ea3765d5cdfe6fe7
SHA25682309530fd14528685d3bdefd6d2ee59e33e3154e4b77b7efeea35c329fa46b3
SHA5124edd06f523a14b4b9af7e82bdf8823d231e74fa1bc4f5a3b3b94ddd677fdee4d207801a0276a5fcea519ed3962a43b138877e9afda26ee503bca5b15a19d10fa
-
Filesize
1KB
MD5e067dafcbe64a95f5045a281397732db
SHA11af7095f98c486ca247449980000d06b04ffc50c
SHA256b6085ee8c1f2de574973b9f3a7417257e25573c2b5228b5a8f87e3788e2733b6
SHA5121b575d62fee219538f8d624ab833cbce0aee431559a0adfa1e3ce9cd4f5ab8a2887b394843ebf164c884ccbed5687d644474328471b23c28edba8f99ccf08b58
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD53977c2294190f27ed68b94f20f919870
SHA1c353ca5ebc7bb558c2a07216aae052195c230955
SHA256451e52991127304b404380cafb68279584227020090ffb95c25daa5a1fed1e74
SHA512be515f41897c77a52d1962e09a98f26be26b65c76fe5000ac9462a18aacc86592776fca1de43d77ee245c4580c857b3fdad41ed7cfa314be4454f7e655fbb99a
-
Filesize
70KB
MD5d919684329656a39d3435a4512967ab8
SHA14e13cfa723f9143ecdf9573b9c6b7368b1017ac5
SHA256509539fd9001b0c38bedfa4e3c16f673e0ad6bd31a5c9b6616472bc853199184
SHA51248d471e80f6e88ce723d7326288010413d25223780e0e0e7291ccb7ad2cfb25264b6ff32ae356ed998eeb058587f904a9127c911b51d20611aa23418840d45e9
-
Filesize
70KB
MD5d919684329656a39d3435a4512967ab8
SHA14e13cfa723f9143ecdf9573b9c6b7368b1017ac5
SHA256509539fd9001b0c38bedfa4e3c16f673e0ad6bd31a5c9b6616472bc853199184
SHA51248d471e80f6e88ce723d7326288010413d25223780e0e0e7291ccb7ad2cfb25264b6ff32ae356ed998eeb058587f904a9127c911b51d20611aa23418840d45e9
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD594341b905794e288c01a14d755b796d7
SHA126eb6db709c9d427ddbab684b25b1208b0a3946b
SHA25636977e74148cac957170c510fcde1ad030d22d45f194502bc616ff9419706a36
SHA512226ddb05b9ad7bc9bb4ffd768ff3f0b081185e0964fd02b9efcfe49829ec71dd1ab677ed05b9216e97ce2106947e9b45972ee7457bf5832b65f809521d0fa5e6
-
Filesize
70KB
MD594341b905794e288c01a14d755b796d7
SHA126eb6db709c9d427ddbab684b25b1208b0a3946b
SHA25636977e74148cac957170c510fcde1ad030d22d45f194502bc616ff9419706a36
SHA512226ddb05b9ad7bc9bb4ffd768ff3f0b081185e0964fd02b9efcfe49829ec71dd1ab677ed05b9216e97ce2106947e9b45972ee7457bf5832b65f809521d0fa5e6
-
Filesize
70KB
MD599e1ae8704f64db9546b64bb7bb33008
SHA1f305258aacfd486625df3521745599d24b860a1e
SHA25660c6b0a68ba7a8135a99e9f7500d482f30b7fd7524c5b10b4fc9bbfef024946c
SHA512ade102657ada1b32ac53d4f0d5cef5d8708928970736d65b5e1063f5bd0f4a9388a7ef0fbe113486f77c2f54df87f8c3dcf8a7953e79aea11a634105f34ae1cc
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5645ab6af99062e3f0f1c21519cf9c526
SHA16e4bd854b4113dbc16b63c90956d14506d3dd26a
SHA256c78bfe00ad27975cc49c6921b72269dce6cba4db16057c370e8a7277ca5fd3ac
SHA512708b0870ddbb79473f1f6ac058708b89ed50b490d3d0623396b0054ac1e15c1946c6a8688ebfa658e21fb50a1973c11eec55f461fa40190dc735a2f015f115f0
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5f487551786741d31752c5af0d9b76d4f
SHA14236180b1490225db0798a4e31a5462844c1eda8
SHA256677d2e33728c7d476e5136d77474125af9088b0ff7ade95e67cf49625b4df72c
SHA51297008201d2132f654759eebfcf7021665ad4232f04e69d1bbdd25e1753dca168b996a601ecd05f786121228522bf3fd0d56047e26fb431864620f6ff2b50d18a
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD5d1d52ff3ae93be79112b9f1987fbe6fe
SHA1efd61f65d5464c7ac669fbf0e212bee5c412b7e3
SHA256b23a95d1e44627c5443760150a808b6af2278af7eadee303c9e2c35bf6f6c4bc
SHA5126fda8109104cb60321393000a92618330ee98e1833936dd2b0bc4e2ad5efadee80c626be22fd935a71e5a8591688e19e7063c01994e84dd363eb47667d17dc92
-
Filesize
70KB
MD56cd6a622338a4c9d3f0521526342e129
SHA11261562ad4f56a8b014b17fb11beb96241a5d1f3
SHA256f90ac10cf777ecd5b967bee6a48c7eaacc677427074aad9755dc46c2339c36de
SHA5128a4bdc1e1b1ad4d0d9d0e5e29a00ec971cf9fe49f45b8bc0ac9c3c3fe0f0c668506130ef1b6f3673ab3cf974fe8784ced257b12673dae9684d711bb8a5597774
-
Filesize
70KB
MD5a2c0293aa7a0ca5253663f034a2cce43
SHA13d0d4892dca0a9085b7983d703f544adad61c902
SHA25692ef4e1bc3ff74e28937a0d1f670b2c7fd3f02630908f80ffbeec1443a7ee733
SHA512e83f8e8b5dae6ac9c2371cfba1e9aabbfa874b6c547ab294856c76a3155eb2ccce59f3c777a6c862ab071d95fd17118e6bb904c222f87df6f1e1896ec79f07a8
-
Filesize
70KB
MD5a2c0293aa7a0ca5253663f034a2cce43
SHA13d0d4892dca0a9085b7983d703f544adad61c902
SHA25692ef4e1bc3ff74e28937a0d1f670b2c7fd3f02630908f80ffbeec1443a7ee733
SHA512e83f8e8b5dae6ac9c2371cfba1e9aabbfa874b6c547ab294856c76a3155eb2ccce59f3c777a6c862ab071d95fd17118e6bb904c222f87df6f1e1896ec79f07a8
-
Filesize
70KB
MD509f74f0eb73a9ee46508bd03c084aa49
SHA164034747d00b064994703005c766ae00d2b38583
SHA2565325f479ac7d37cf9c4e13d853b8d00a15fc5e4b1f0b497747972ac460a647aa
SHA512d61e16ece722a4c8a3c523b5c5998dfd95b678fb8e96728ee4e6faab164b9681e7dc450882835f81bd35b602adfddf35a95893edc66c8e4c790fe99ba0a8b0a5
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a