Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 18:58
Behavioral task
behavioral1
Sample
0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe
Resource
win10v2004-20220901-en
General
-
Target
0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe
-
Size
222KB
-
MD5
84e95345ec269c444dcdd98ef38f6a50
-
SHA1
bbefa0bc6ef240eb5a360012347aa90d2bc26777
-
SHA256
0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74
-
SHA512
dccce9f713680470ca2bce9da096eb0fe9c55215c9c59b9f686f63cf5a3ca4a812fcb191f98daa636e49440eee31c69a6e999df68d81396518d34e90ad1a4175
-
SSDEEP
3072:K5jsqRqkJXJ0/7Xn5Aer05Gas9NhOyLPCA7OF+6aLK2IJqi6uS+gkDstXKJVICsR:aYJkJXJea5QNhtL6VJVICY+
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 5016 system.exe 2328 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 3276 explorer.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NPFMntor.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ArSwp3.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wsyscheck.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\auto.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cross.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logogo.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREngPS.EXE\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\appdllman.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwmain.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQPCRTP.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Wsyscheck.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safebox.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UFO.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\niu.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rsnetsvr.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tmp.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360sdrun.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sos.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Navapw32.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ghost.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\webscanx.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe\Debugger = "ntsd -d" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ghost.exe\Debugger = "ntsd -d" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guangd.exe explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe\Debugger = "ntsd -d" explorer.exe -
Stops running service(s) 3 TTPs
-
resource yara_rule behavioral2/memory/4844-132-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral2/files/0x0001000000022e03-155.dat upx behavioral2/files/0x0001000000022e03-156.dat upx behavioral2/files/0x0001000000022e04-158.dat upx behavioral2/files/0x0001000000022e04-159.dat upx behavioral2/memory/2328-160-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/3276-161-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/2328-165-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/3276-166-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Rundll32.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TSPS.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1681.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8970.lnk explorer.exe -
Loads dropped DLL 5 IoCs
pid Process 1812 Rundll32.exe 4380 Rundll32.exe 4380 Rundll32.exe 3276 explorer.exe 3276 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 45 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\o: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\h: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\k: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\r: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\y: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\D: Rundll32.exe File opened (read-only) \??\l: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\i: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\q: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\x: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\g: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\n: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\s: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\u: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\v: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\w: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\z: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\e: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\m: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\t: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\f: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\f: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\j: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\p: 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\y: explorer.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File created C:\Windows\SysWOW64\psliifaa.dll system.exe File created C:\Windows\SysWOW64\kuxjifaa.dll system.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe File created C:\Program Files (x86)\Common Files\ips888.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe explorer.exe File opened for modification C:\Program Files (x86)\ explorer.exe File opened for modification C:\Program Files\AAV\CDriver.sys Rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\ips888.dll explorer.exe File opened for modification C:\Program Files (x86)\Common Files explorer.exe File opened for modification C:\Program Files (x86)\Kaspersky Lab explorer.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3568 sc.exe 1972 sc.exe 224 sc.exe 4856 sc.exe 4860 sc.exe 4632 sc.exe 5036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt = "1" explorer.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 1812 Rundll32.exe 4380 Rundll32.exe 4380 Rundll32.exe 2328 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 2328 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe 3276 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 2328 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe Token: SeLoadDriverPrivilege 3276 explorer.exe Token: SeDebugPrivilege 3276 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3276 explorer.exe 3276 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 5016 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 85 PID 4844 wrote to memory of 5016 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 85 PID 4844 wrote to memory of 5016 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 85 PID 5016 wrote to memory of 1812 5016 system.exe 86 PID 5016 wrote to memory of 1812 5016 system.exe 86 PID 5016 wrote to memory of 1812 5016 system.exe 86 PID 1812 wrote to memory of 3848 1812 Rundll32.exe 87 PID 1812 wrote to memory of 3848 1812 Rundll32.exe 87 PID 1812 wrote to memory of 3848 1812 Rundll32.exe 87 PID 1812 wrote to memory of 3860 1812 Rundll32.exe 88 PID 1812 wrote to memory of 3860 1812 Rundll32.exe 88 PID 1812 wrote to memory of 3860 1812 Rundll32.exe 88 PID 1812 wrote to memory of 3568 1812 Rundll32.exe 91 PID 1812 wrote to memory of 3568 1812 Rundll32.exe 91 PID 1812 wrote to memory of 3568 1812 Rundll32.exe 91 PID 1812 wrote to memory of 1972 1812 Rundll32.exe 93 PID 1812 wrote to memory of 1972 1812 Rundll32.exe 93 PID 1812 wrote to memory of 1972 1812 Rundll32.exe 93 PID 1812 wrote to memory of 224 1812 Rundll32.exe 94 PID 1812 wrote to memory of 224 1812 Rundll32.exe 94 PID 1812 wrote to memory of 224 1812 Rundll32.exe 94 PID 1812 wrote to memory of 4856 1812 Rundll32.exe 96 PID 1812 wrote to memory of 4856 1812 Rundll32.exe 96 PID 1812 wrote to memory of 4856 1812 Rundll32.exe 96 PID 1812 wrote to memory of 4860 1812 Rundll32.exe 98 PID 1812 wrote to memory of 4860 1812 Rundll32.exe 98 PID 1812 wrote to memory of 4860 1812 Rundll32.exe 98 PID 1812 wrote to memory of 4632 1812 Rundll32.exe 100 PID 1812 wrote to memory of 4632 1812 Rundll32.exe 100 PID 1812 wrote to memory of 4632 1812 Rundll32.exe 100 PID 3848 wrote to memory of 4404 3848 net.exe 102 PID 3848 wrote to memory of 4404 3848 net.exe 102 PID 3848 wrote to memory of 4404 3848 net.exe 102 PID 1812 wrote to memory of 4844 1812 Rundll32.exe 83 PID 1812 wrote to memory of 4844 1812 Rundll32.exe 83 PID 1812 wrote to memory of 5016 1812 Rundll32.exe 85 PID 1812 wrote to memory of 5016 1812 Rundll32.exe 85 PID 1812 wrote to memory of 3848 1812 Rundll32.exe 87 PID 1812 wrote to memory of 3848 1812 Rundll32.exe 87 PID 1812 wrote to memory of 3860 1812 Rundll32.exe 88 PID 1812 wrote to memory of 3860 1812 Rundll32.exe 88 PID 1812 wrote to memory of 3568 1812 Rundll32.exe 91 PID 1812 wrote to memory of 3568 1812 Rundll32.exe 91 PID 1812 wrote to memory of 1972 1812 Rundll32.exe 93 PID 1812 wrote to memory of 1972 1812 Rundll32.exe 93 PID 1812 wrote to memory of 224 1812 Rundll32.exe 94 PID 1812 wrote to memory of 224 1812 Rundll32.exe 94 PID 1812 wrote to memory of 4856 1812 Rundll32.exe 96 PID 1812 wrote to memory of 4856 1812 Rundll32.exe 96 PID 1812 wrote to memory of 4860 1812 Rundll32.exe 98 PID 1812 wrote to memory of 4860 1812 Rundll32.exe 98 PID 1812 wrote to memory of 4632 1812 Rundll32.exe 100 PID 1812 wrote to memory of 4632 1812 Rundll32.exe 100 PID 3860 wrote to memory of 1988 3860 net.exe 104 PID 3860 wrote to memory of 1988 3860 net.exe 104 PID 3860 wrote to memory of 1988 3860 net.exe 104 PID 1812 wrote to memory of 5036 1812 Rundll32.exe 105 PID 1812 wrote to memory of 5036 1812 Rundll32.exe 105 PID 1812 wrote to memory of 5036 1812 Rundll32.exe 105 PID 5016 wrote to memory of 4380 5016 system.exe 107 PID 5016 wrote to memory of 4380 5016 system.exe 107 PID 5016 wrote to memory of 4380 5016 system.exe 107 PID 4844 wrote to memory of 2328 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 115 PID 4844 wrote to memory of 2328 4844 0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe 115 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System explorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe"C:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\psliifaa.dll Exbcute3⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\net.exenet stop WinDefend4⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:4404
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵PID:1988
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:3568
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
- Launches sc.exe
PID:1972
-
-
C:\Windows\SysWOW64\sc.exesc stop ZhuDongFangYu4⤵
- Launches sc.exe
PID:224
-
-
C:\Windows\SysWOW64\sc.exesc delete ZhuDongFangYu4⤵
- Launches sc.exe
PID:4856
-
-
C:\Windows\SysWOW64\sc.exesc stop 360rp4⤵
- Launches sc.exe
PID:4860
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp4⤵
- Launches sc.exe
PID:4632
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent4⤵
- Launches sc.exe
PID:5036
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\kuxjifaa.dll Exbcute3⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exeC:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\explorer.exe"3⤵
- Modifies system executable filetype association
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Drops startup file
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD52fa48a277ed630e0c2d76b7b47c3a935
SHA1eed41134ce8a069c1b678839117fac1f091555c5
SHA256a3a1a141d6fe200cdc61162bd30158e19b43b1273df135db9a37256b158f995d
SHA512e5f7a422eea7354cba7cbaff844e00dac2a01aaa7f40cacca25e4c893e094ab4673277934ad231a108412fe0a6813365db5ff94846bb423bb7f72fb11d5f2a7c
-
Filesize
74KB
MD52fa48a277ed630e0c2d76b7b47c3a935
SHA1eed41134ce8a069c1b678839117fac1f091555c5
SHA256a3a1a141d6fe200cdc61162bd30158e19b43b1273df135db9a37256b158f995d
SHA512e5f7a422eea7354cba7cbaff844e00dac2a01aaa7f40cacca25e4c893e094ab4673277934ad231a108412fe0a6813365db5ff94846bb423bb7f72fb11d5f2a7c
-
Filesize
17KB
MD544361213f431c9b1827531d5513c83a1
SHA1b4d6580083610a98cec70d0ee35b71bc9da5f1ae
SHA25637affa117a089f4a31c83b41a2e562f65333fcf2b3f91461f2b311bc29bc5319
SHA51219b38703f1cd4aff9461b8cdc1bcf149315059685babfa02c4960e41cb1498918729353e317d580f090ac1f4db3d794e83e0c913c8dd8b531274ad8b3d4940ed
-
Filesize
17KB
MD544361213f431c9b1827531d5513c83a1
SHA1b4d6580083610a98cec70d0ee35b71bc9da5f1ae
SHA25637affa117a089f4a31c83b41a2e562f65333fcf2b3f91461f2b311bc29bc5319
SHA51219b38703f1cd4aff9461b8cdc1bcf149315059685babfa02c4960e41cb1498918729353e317d580f090ac1f4db3d794e83e0c913c8dd8b531274ad8b3d4940ed
-
C:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe
Filesize74KB
MD52fa48a277ed630e0c2d76b7b47c3a935
SHA1eed41134ce8a069c1b678839117fac1f091555c5
SHA256a3a1a141d6fe200cdc61162bd30158e19b43b1273df135db9a37256b158f995d
SHA512e5f7a422eea7354cba7cbaff844e00dac2a01aaa7f40cacca25e4c893e094ab4673277934ad231a108412fe0a6813365db5ff94846bb423bb7f72fb11d5f2a7c
-
C:\Users\Admin\AppData\Local\Temp\0a5753780529888e1728113c86a8970fbaffb4a9a7f52377028a7f63f92d0e74.exe
Filesize74KB
MD52fa48a277ed630e0c2d76b7b47c3a935
SHA1eed41134ce8a069c1b678839117fac1f091555c5
SHA256a3a1a141d6fe200cdc61162bd30158e19b43b1273df135db9a37256b158f995d
SHA512e5f7a422eea7354cba7cbaff844e00dac2a01aaa7f40cacca25e4c893e094ab4673277934ad231a108412fe0a6813365db5ff94846bb423bb7f72fb11d5f2a7c
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
24KB
MD59e60343a051d990b2ecd83d8419e0971
SHA15dcbf8abb0d20bcd49782328bd36cecb098d6fc5
SHA25601ac2c504e860f7f17fae7d6520a5b073dbdafe790e206314d7951e25b3a8de8
SHA5120f6c685d3d2417b20b1603b3d5349339ee176e51287fba9cac9371d459023d62731327ccc728898df5d0cdc4370600eaad0629e6ba6770855343f19cb1e0d1f4
-
Filesize
24KB
MD59e60343a051d990b2ecd83d8419e0971
SHA15dcbf8abb0d20bcd49782328bd36cecb098d6fc5
SHA25601ac2c504e860f7f17fae7d6520a5b073dbdafe790e206314d7951e25b3a8de8
SHA5120f6c685d3d2417b20b1603b3d5349339ee176e51287fba9cac9371d459023d62731327ccc728898df5d0cdc4370600eaad0629e6ba6770855343f19cb1e0d1f4
-
Filesize
75KB
MD5366ef5e42971e4f1c35147799054a7dd
SHA1b2b4a81c226565d35ffc1874eec45b1dc6bb4a7c
SHA25670fd5d7b2459a0c730149ba7e408339d2ff52640238a2accf63f82219e775f99
SHA512f8e3e29be97b1af52c47f6ff57e988bbafc6f76d9144f8510d045e74259843e318e7e8aed5ea80e3ab7a57a00d9c5e753e9bc2a4b848d480f71ce5090498c05c
-
Filesize
75KB
MD5366ef5e42971e4f1c35147799054a7dd
SHA1b2b4a81c226565d35ffc1874eec45b1dc6bb4a7c
SHA25670fd5d7b2459a0c730149ba7e408339d2ff52640238a2accf63f82219e775f99
SHA512f8e3e29be97b1af52c47f6ff57e988bbafc6f76d9144f8510d045e74259843e318e7e8aed5ea80e3ab7a57a00d9c5e753e9bc2a4b848d480f71ce5090498c05c
-
Filesize
144KB
MD59479b46d4a1d2a9ed447701fd1c169db
SHA11d1b8de38ce4c660baa6c3825044c6046f930725
SHA256ae390e56ced75c9ed48b57d09e7b26608423a991c7c447171c8c2bf8ef31972d
SHA512877a6d1dc13613b1aa40ab0abb13d145827b6540d15006cc0ae3f298a255b636d64c53b7b211455e6c74820cb13489949492af4e556aebca427930c84c55247d
-
Filesize
144KB
MD59479b46d4a1d2a9ed447701fd1c169db
SHA11d1b8de38ce4c660baa6c3825044c6046f930725
SHA256ae390e56ced75c9ed48b57d09e7b26608423a991c7c447171c8c2bf8ef31972d
SHA512877a6d1dc13613b1aa40ab0abb13d145827b6540d15006cc0ae3f298a255b636d64c53b7b211455e6c74820cb13489949492af4e556aebca427930c84c55247d