Analysis
-
max time kernel
152s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Resource
win10v2004-20220901-en
General
-
Target
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
-
Size
205KB
-
MD5
da35d0a8aa40579aead887722bccacb1
-
SHA1
7564332ecd857b2604121769e81cc04a808d03bf
-
SHA256
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412
-
SHA512
157ddd73069b4c6157fede9ba253e9c580c323c1edb9cf931c68e9104685d6ac24942485b0106c27fa9674d83235dafc8777d94cdc3a12502e67933da97129c6
-
SSDEEP
3072:fqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:fqhMPssRARoiSoS3SsQLH5AK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
winlogon.exe services.exe csrss.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
services.exe csrss.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe csrss.exencsv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ncsv.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
winlogon.exe csrss.exencsv.exeservices.exe csrss.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ncsv.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe csrss.exencsv.exeservices.exe csrss.exe lsass.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ncsv.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe -
Processes:
lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe services.exe csrss.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
csrss.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe services.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.execsrss.exe csrss.execsrss.exe ncsv.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe smss.exesmss.exe lsass.exeservices.exelsass.exeservices.exewinlogon.exewinlogon.exewinlogon.exelsass.exe services.exe services.exe lsass.exe winlogon.exe winlogon.exe winlogon.exe services.exewinlogon.exeservices.exe winlogon.exe ~Paraysutki_VM_Community~~Paraysutki_VM_Community~~Paraysutki_VM_Community~winlogon.exe~Paraysutki_VM_Community~winlogon.exe csrss.execsrss.exe ~Paraysutki_VM_Community~smss.exesmss.exe lsass.exerundll32.exeservices.exepid process 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 320 csrss.exe 1620 csrss.exe 524 csrss.exe 1596 csrss.exe 1356 ncsv.exe 1628 smss.exe 1060 smss.exe 2040 csrss.exe 1120 csrss.exe 616 smss.exe 2012 smss.exe 1228 lsass.exe 1496 lsass.exe 1092 csrss.exe 964 csrss.exe 1732 smss.exe 908 smss.exe 588 lsass.exe 1032 lsass.exe 1568 services.exe 1616 services.exe 848 csrss.exe 880 csrss.exe 556 smss.exe 1756 smss.exe 300 lsass.exe 1540 lsass.exe 1652 services.exe 836 services.exe 1884 smss.exe 1752 smss.exe 1532 lsass.exe 2040 services.exe 1792 lsass.exe 2000 services.exe 1876 winlogon.exe 1404 winlogon.exe 616 winlogon.exe 1640 lsass.exe 528 services.exe 1200 services.exe 588 lsass.exe 560 winlogon.exe 1888 winlogon.exe 1948 winlogon.exe 1596 services.exe 1036 winlogon.exe 804 services.exe 1860 winlogon.exe 1656 ~Paraysutki_VM_Community~ 1992 ~Paraysutki_VM_Community~ 1316 ~Paraysutki_VM_Community~ 1008 winlogon.exe 1120 ~Paraysutki_VM_Community~ 1584 winlogon.exe 676 csrss.exe 1464 csrss.exe 1840 ~Paraysutki_VM_Community~ 2036 smss.exe 1692 smss.exe 1792 lsass.exe 2008 rundll32.exe 612 services.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
services.exe csrss.exe winlogon.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe lsass.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "rundll32.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe\Debugger = "cmd.exe /c del" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe\Debugger = "rundll32.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe winlogon.exe -
Loads dropped DLL 64 IoCs
Processes:
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.execsrss.exe csrss.execsrss.exe smss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exepid process 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 1620 csrss.exe 1620 csrss.exe 1620 csrss.exe 524 csrss.exe 524 csrss.exe 1596 csrss.exe 524 csrss.exe 524 csrss.exe 1620 csrss.exe 1620 csrss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1060 smss.exe 1060 smss.exe 1060 smss.exe 2040 csrss.exe 2040 csrss.exe 1120 csrss.exe 1060 smss.exe 1060 smss.exe 616 smss.exe 616 smss.exe 2012 smss.exe 1060 smss.exe 1060 smss.exe 1228 lsass.exe 1228 lsass.exe 1228 lsass.exe 1496 lsass.exe 1496 lsass.exe 1496 lsass.exe 1092 csrss.exe 1092 csrss.exe 964 csrss.exe 1496 lsass.exe 1496 lsass.exe 1732 smss.exe 1732 smss.exe 908 smss.exe 1496 lsass.exe 1496 lsass.exe 588 lsass.exe 588 lsass.exe 1032 lsass.exe 1496 lsass.exe 1496 lsass.exe 1568 services.exe 1568 services.exe 1568 services.exe 1616 services.exe 1616 services.exe 1616 services.exe 848 csrss.exe 848 csrss.exe 880 csrss.exe 1616 services.exe -
Adds Run key to start application 2 TTPs 38 IoCs
Processes:
winlogon.exe services.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.exe ncsv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDOwsUPdate = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\smss.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UpDaTer = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\csrss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ViSulaBaCis = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\lsass.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BaRloNdDiLhep = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\services.exe" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RealTimeProtector = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~²\\winlogon.exe" winlogon.exe -
Processes:
smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe services.exe csrss.exe lsass.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ncsv.exedescription ioc process File opened (read-only) \??\E: ncsv.exe File opened (read-only) \??\K: ncsv.exe File opened (read-only) \??\O: ncsv.exe File opened (read-only) \??\S: ncsv.exe File opened (read-only) \??\X: ncsv.exe File opened (read-only) \??\V: ncsv.exe File opened (read-only) \??\W: ncsv.exe File opened (read-only) \??\Y: ncsv.exe File opened (read-only) \??\G: ncsv.exe File opened (read-only) \??\J: ncsv.exe File opened (read-only) \??\L: ncsv.exe File opened (read-only) \??\N: ncsv.exe File opened (read-only) \??\T: ncsv.exe File opened (read-only) \??\H: ncsv.exe File opened (read-only) \??\M: ncsv.exe File opened (read-only) \??\P: ncsv.exe File opened (read-only) \??\R: ncsv.exe File opened (read-only) \??\Z: ncsv.exe File opened (read-only) \??\B: ncsv.exe File opened (read-only) \??\F: ncsv.exe File opened (read-only) \??\I: ncsv.exe File opened (read-only) \??\Q: ncsv.exe File opened (read-only) \??\U: ncsv.exe -
Drops file in System32 directory 64 IoCs
Processes:
ncsv.exesmss.exe lsass.exe winlogon.exe90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe services.exe winlogon.exe csrss.execsrss.exe winlogon.execsrss.exelsass.exelsass.exeservices.execsrss.exeservices.execsrss.exe~Paraysutki_VM_Community~services.exewinlogon.exesmss.exelsass.exeservices.exe~Paraysutki_VM_Community~smss.exelsass.exedescription ioc process File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ncsv.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe csrss.exe File created \??\c:\windows\SysWOW64\CommandPrompt.Sysm ncsv.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File created \??\c:\windows\SysWOW64\Windows 3D.scr csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~ smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~² services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe csrss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt ~Paraysutki_VM_Community~ File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll csrss.exe -
Drops file in Program Files directory 35 IoCs
Processes:
ncsv.exedescription ioc process File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Sidebar\sidebar.exe ncsv.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe ncsv.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Mail\wab.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpenc.exe ncsv.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe ncsv.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe ncsv.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Defender\MSASCui.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Journal\PDIALOG.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPDMC.exe ncsv.exe File opened for modification \??\c:\Program Files\PublishExport.exe ncsv.exe File opened for modification \??\c:\Program Files\7-Zip\7z.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Defender\MpCmdRun.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe ncsv.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Media Player\WMPSideShowGadget.exe ncsv.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe ncsv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe ncsv.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe ncsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe winlogon.exe services.exe lsass.exe smss.exe csrss.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main smss.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe -
Modifies registry class 48 IoCs
Processes:
csrss.exencsv.exelsass.exe winlogon.exe smss.exe csrss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe services.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" ncsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" ncsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe -
Runs ping.exe 1 TTPs 18 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1048 ping.exe 2044 ping.exe 1064 ping.exe 1324 ping.exe 2508 ping.exe 664 ping.exe 1740 ping.exe 1972 ping.exe 572 ping.exe 1876 ping.exe 2016 ping.exe 984 ping.exe 2516 ping.exe 2500 ping.exe 1032 ping.exe 560 ping.exe 1404 ping.exe 1180 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exesmss.exelsass.exepid process 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 320 csrss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1628 smss.exe 1228 lsass.exe 1228 lsass.exe 1228 lsass.exe 1228 lsass.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 824 rundll32.exe 556 rundll32.exe 1784 rundll32.exe 1556 rundll32.exe 1044 rundll32.exe 2456 rundll32.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.execsrss.exe csrss.execsrss.exe ncsv.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe smss.exesmss.exe lsass.exeservices.exeservices.exewinlogon.exewinlogon.exewinlogon.exelsass.exelsass.exe services.exe services.exe winlogon.exe winlogon.exe winlogon.exe winlogon.exeservices.exelsass.exe services.exe winlogon.exe winlogon.exe~Paraysutki_VM_Community~~Paraysutki_VM_Community~~Paraysutki_VM_Community~winlogon.exe ~Paraysutki_VM_Community~csrss.exe~Paraysutki_VM_Community~csrss.exe smss.exesmss.exe lsass.exerundll32.exepid process 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 320 csrss.exe 1620 csrss.exe 524 csrss.exe 1596 csrss.exe 1356 ncsv.exe 1628 smss.exe 1060 smss.exe 2040 csrss.exe 1120 csrss.exe 616 smss.exe 2012 smss.exe 1228 lsass.exe 1496 lsass.exe 1092 csrss.exe 964 csrss.exe 1732 smss.exe 908 smss.exe 588 lsass.exe 1032 lsass.exe 1568 services.exe 1616 services.exe 848 csrss.exe 880 csrss.exe 556 smss.exe 1756 smss.exe 300 lsass.exe 1540 lsass.exe 1652 services.exe 836 services.exe 1884 smss.exe 1752 smss.exe 1532 lsass.exe 2000 services.exe 2040 services.exe 1404 winlogon.exe 1876 winlogon.exe 616 winlogon.exe 1792 lsass.exe 1640 lsass.exe 528 services.exe 1200 services.exe 1948 winlogon.exe 1888 winlogon.exe 560 winlogon.exe 1036 winlogon.exe 1596 services.exe 588 lsass.exe 804 services.exe 1860 winlogon.exe 1008 winlogon.exe 1120 ~Paraysutki_VM_Community~ 1316 ~Paraysutki_VM_Community~ 1656 ~Paraysutki_VM_Community~ 1584 winlogon.exe 1992 ~Paraysutki_VM_Community~ 676 csrss.exe 1840 ~Paraysutki_VM_Community~ 1464 csrss.exe 2036 smss.exe 1692 smss.exe 1792 lsass.exe 2008 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.execsrss.exe csrss.exesmss.exesmss.exe csrss.exesmss.exelsass.exelsass.exe csrss.exedescription pid process target process PID 1844 wrote to memory of 1108 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe PID 1844 wrote to memory of 1108 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe PID 1844 wrote to memory of 1108 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe PID 1844 wrote to memory of 1108 1844 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe PID 1108 wrote to memory of 320 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.exe PID 1108 wrote to memory of 320 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.exe PID 1108 wrote to memory of 320 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.exe PID 1108 wrote to memory of 320 1108 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe csrss.exe PID 320 wrote to memory of 1620 320 csrss.exe csrss.exe PID 320 wrote to memory of 1620 320 csrss.exe csrss.exe PID 320 wrote to memory of 1620 320 csrss.exe csrss.exe PID 320 wrote to memory of 1620 320 csrss.exe csrss.exe PID 1620 wrote to memory of 524 1620 csrss.exe csrss.exe PID 1620 wrote to memory of 524 1620 csrss.exe csrss.exe PID 1620 wrote to memory of 524 1620 csrss.exe csrss.exe PID 1620 wrote to memory of 524 1620 csrss.exe csrss.exe PID 524 wrote to memory of 1596 524 csrss.exe csrss.exe PID 524 wrote to memory of 1596 524 csrss.exe csrss.exe PID 524 wrote to memory of 1596 524 csrss.exe csrss.exe PID 524 wrote to memory of 1596 524 csrss.exe csrss.exe PID 524 wrote to memory of 1356 524 csrss.exe ncsv.exe PID 524 wrote to memory of 1356 524 csrss.exe ncsv.exe PID 524 wrote to memory of 1356 524 csrss.exe ncsv.exe PID 524 wrote to memory of 1356 524 csrss.exe ncsv.exe PID 1620 wrote to memory of 1628 1620 csrss.exe smss.exe PID 1620 wrote to memory of 1628 1620 csrss.exe smss.exe PID 1620 wrote to memory of 1628 1620 csrss.exe smss.exe PID 1620 wrote to memory of 1628 1620 csrss.exe smss.exe PID 1628 wrote to memory of 1060 1628 smss.exe smss.exe PID 1628 wrote to memory of 1060 1628 smss.exe smss.exe PID 1628 wrote to memory of 1060 1628 smss.exe smss.exe PID 1628 wrote to memory of 1060 1628 smss.exe smss.exe PID 1060 wrote to memory of 2040 1060 smss.exe csrss.exe PID 1060 wrote to memory of 2040 1060 smss.exe csrss.exe PID 1060 wrote to memory of 2040 1060 smss.exe csrss.exe PID 1060 wrote to memory of 2040 1060 smss.exe csrss.exe PID 2040 wrote to memory of 1120 2040 csrss.exe csrss.exe PID 2040 wrote to memory of 1120 2040 csrss.exe csrss.exe PID 2040 wrote to memory of 1120 2040 csrss.exe csrss.exe PID 2040 wrote to memory of 1120 2040 csrss.exe csrss.exe PID 1060 wrote to memory of 616 1060 smss.exe smss.exe PID 1060 wrote to memory of 616 1060 smss.exe smss.exe PID 1060 wrote to memory of 616 1060 smss.exe smss.exe PID 1060 wrote to memory of 616 1060 smss.exe smss.exe PID 616 wrote to memory of 2012 616 smss.exe smss.exe PID 616 wrote to memory of 2012 616 smss.exe smss.exe PID 616 wrote to memory of 2012 616 smss.exe smss.exe PID 616 wrote to memory of 2012 616 smss.exe smss.exe PID 1060 wrote to memory of 1228 1060 smss.exe lsass.exe PID 1060 wrote to memory of 1228 1060 smss.exe lsass.exe PID 1060 wrote to memory of 1228 1060 smss.exe lsass.exe PID 1060 wrote to memory of 1228 1060 smss.exe lsass.exe PID 1228 wrote to memory of 1496 1228 lsass.exe lsass.exe PID 1228 wrote to memory of 1496 1228 lsass.exe lsass.exe PID 1228 wrote to memory of 1496 1228 lsass.exe lsass.exe PID 1228 wrote to memory of 1496 1228 lsass.exe lsass.exe PID 1496 wrote to memory of 1092 1496 lsass.exe csrss.exe PID 1496 wrote to memory of 1092 1496 lsass.exe csrss.exe PID 1496 wrote to memory of 1092 1496 lsass.exe csrss.exe PID 1496 wrote to memory of 1092 1496 lsass.exe csrss.exe PID 1092 wrote to memory of 964 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 964 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 964 1092 csrss.exe csrss.exe PID 1092 wrote to memory of 964 1092 csrss.exe csrss.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
winlogon.exe csrss.exe lsass.exe smss.exe 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe services.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe"C:\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exeC:\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1108 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1620 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1596 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\ncsv.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\ncsv.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1060 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1496 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:964 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:908 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:300 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵
- Suspicious use of FindShellTrayWindow
PID:1556 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
PID:1740 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
PID:1324 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 121011⤵
- Runs ping.exe
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe11⤵PID:1264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe11⤵PID:300
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe11⤵PID:388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe11⤵PID:1820
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe11⤵PID:388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe11⤵PID:1264
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1464 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe12⤵PID:2008
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:612 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe12⤵PID:1956
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe11⤵PID:2392
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe12⤵PID:2408
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~11⤵
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵
- Suspicious use of FindShellTrayWindow
PID:2456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe11⤵PID:2524
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 121011⤵
- Runs ping.exe
PID:2516 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe11⤵PID:2612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe11⤵PID:2588
-
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe11⤵PID:2636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe11⤵PID:2648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe11⤵PID:2664
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵
- Suspicious use of FindShellTrayWindow
PID:556 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
PID:2044 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
PID:560 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12109⤵
- Runs ping.exe
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe9⤵PID:1540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe9⤵PID:1644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe9⤵PID:836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe9⤵PID:676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe9⤵PID:1568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe9⤵PID:836
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵
- Suspicious use of FindShellTrayWindow
PID:824 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
PID:1032 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
PID:1404 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12107⤵
- Runs ping.exe
PID:664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe7⤵PID:1260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe7⤵PID:1600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe7⤵PID:1568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe7⤵PID:1668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe7⤵PID:1820
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe7⤵PID:1652
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵
- Suspicious use of FindShellTrayWindow
PID:1044 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
PID:1048 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
PID:1180 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12105⤵
- Runs ping.exe
PID:1064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe5⤵PID:1668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe5⤵PID:676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe5⤵PID:1884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe5⤵PID:1540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe5⤵PID:2036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe5⤵PID:1468
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:804 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1008 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵
- Suspicious use of FindShellTrayWindow
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe3⤵PID:1600
-
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 12103⤵
- Runs ping.exe
PID:572 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
PID:1876 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
PID:984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe3⤵PID:836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im kspoold.exe /im kspool.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im tati.exe3⤵PID:1668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im wscript.exe3⤵PID:688
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe taskkill /f /im sys.exe3⤵PID:1668
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD5ca49c39173d7b78c7234ae5c6f4b9962
SHA1b44cfb1d505139eeae4c170065ff8591da5950dc
SHA256e417459dc524d867e8b8877abea4e7ce0c261e21ff525ff2a6d737cb8c08c363
SHA512dbf98f43f3405340f6205ec800938684efb47612afd510c494551668ea4a2ef3bf0543b1617b6e833550748a9fd2b5145e9b8f19022c2f5625306f7b9b740628
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
76KB
MD5ca49c39173d7b78c7234ae5c6f4b9962
SHA1b44cfb1d505139eeae4c170065ff8591da5950dc
SHA256e417459dc524d867e8b8877abea4e7ce0c261e21ff525ff2a6d737cb8c08c363
SHA512dbf98f43f3405340f6205ec800938684efb47612afd510c494551668ea4a2ef3bf0543b1617b6e833550748a9fd2b5145e9b8f19022c2f5625306f7b9b740628
-
Filesize
76KB
MD55950c86e0878f588fdcba19f249d476d
SHA183b1887a3d5abdca874737d646b8afeccf25f1fa
SHA256e003bc11da7a440d7d6b2b0a6f348298ac7c88564a27991153600f14b537f56b
SHA512d689cec81e9ed4e44e893fedd0bb722c32575bcfec56b0a4a4e5d5f4d09cdcbd4760f5534d6a356f0b1a309846277031913eede9382af7781038444e3a9c4f1b
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
\Users\Admin\AppData\Local\Temp\90df6ccc83854e8870c21931b748a00e00a45aa8208b36ac616a3b4bc5329412.exe
Filesize129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
76KB
MD5ca49c39173d7b78c7234ae5c6f4b9962
SHA1b44cfb1d505139eeae4c170065ff8591da5950dc
SHA256e417459dc524d867e8b8877abea4e7ce0c261e21ff525ff2a6d737cb8c08c363
SHA512dbf98f43f3405340f6205ec800938684efb47612afd510c494551668ea4a2ef3bf0543b1617b6e833550748a9fd2b5145e9b8f19022c2f5625306f7b9b740628
-
Filesize
76KB
MD5ca49c39173d7b78c7234ae5c6f4b9962
SHA1b44cfb1d505139eeae4c170065ff8591da5950dc
SHA256e417459dc524d867e8b8877abea4e7ce0c261e21ff525ff2a6d737cb8c08c363
SHA512dbf98f43f3405340f6205ec800938684efb47612afd510c494551668ea4a2ef3bf0543b1617b6e833550748a9fd2b5145e9b8f19022c2f5625306f7b9b740628
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
205KB
MD5a895b0b61e849b29a88c255f2d6ce215
SHA1a15391ca390eec66b2a3a58bc6a6e949e3882a4d
SHA256007dc8f9a169443ae0ace493908bef6885b4daec32875cbe46d75fbdd698b08e
SHA512e152915aafb082353c93b5489549dc2e30fe820e2060669bbedf349fc268729a98cd4ef1f89f75387922e9d3466f3614a8c4b9e90ad2b461f41b5dbbd78433ba
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8
-
Filesize
129KB
MD5e2c33f1d5b2c10d0fff92ec379577f06
SHA1db52e7c71eb6e99ad6fa38305a7c62337246cc9e
SHA2566fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01
SHA5126a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8