Analysis
-
max time kernel
289s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe
Resource
win10v2004-20221111-en
General
-
Target
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe
-
Size
713KB
-
MD5
44f760f812725dd21c7761dd7221dfa0
-
SHA1
d945e95f9dad6ae149a843199db39b76f7138b2c
-
SHA256
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
-
SHA512
c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
SSDEEP
12288:ySo6xg5kN530xuooqMVwsgS0Tyv9H7efCRyL:+6u5030x+gS0TyvNRyL
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\G_Host = "\"C:\\Windows\\System\\gHost.exe\" /Reproduce" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run KHATRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\G_Host = "\"C:\\Windows\\System\\gHost.exe\" /Reproduce" KHATRA.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" KHATRA.exe -
Executes dropped EXE 5 IoCs
Processes:
KHATRA.exeXplorer.exeXplorer.exegHost.exegHost.exepid process 4152 KHATRA.exe 3704 Xplorer.exe 4600 Xplorer.exe 1072 gHost.exe 4924 gHost.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1 = "C:\\Windows\\Xplorer.exe" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Xplorer = "\"C:\\Windows\\Xplorer.exe\" /Windows" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run KHATRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Xplorer = "\"C:\\Windows\\Xplorer.exe\" /Windows" KHATRA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1 = "C:\\Windows\\system32\\KHATRA.exe" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1 = "C:\\Windows\\system32\\KHATRA.exe" KHATRA.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman = "C:\\Windows\\system32\\KHATRA.exe" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Taskman = "C:\\Windows\\system32\\KHATRA.exe" KHATRA.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/4152-138-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/3704-147-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/4600-148-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/3704-156-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/4600-154-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/1072-160-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/4924-159-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/2756-166-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral2/memory/4152-167-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
KHATRA.exe30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exedescription ioc process File created C:\Users\Admin\Local Settings\Application Data\Microsoft\CD Burning\AUTORUN.inF KHATRA.exe File created C:\Users\Admin\Local Settings\Application Data\Microsoft\CD Burning\AUTORUN.inF 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe -
Drops file in System32 directory 6 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process File created C:\Windows\SysWOW64\avphost.dll 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\SysWOW64\avphost.dll 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File created C:\Windows\SysWOW64\KHATRA.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\SysWOW64\KHATRA.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\SysWOW64\KHATRA.exe KHATRA.exe File opened for modification C:\Windows\SysWOW64\avphost.dll KHATRA.exe -
Drops file in Windows directory 13 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exedescription ioc process File created C:\Windows\System\gHost.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\System\gHost.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File created C:\Windows\KHATARNAKH.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\KHATARNAKH.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\inf\Autoplay.inF 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\INF\Autoplay.inF 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\KHATARNAKH.exe KHATRA.exe File opened for modification C:\Windows\Xplorer.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe File opened for modification C:\Windows\INF\Autoplay.inF KHATRA.exe File opened for modification C:\Windows\Xplorer.exe KHATRA.exe File opened for modification C:\Windows\System\gHost.exe KHATRA.exe File opened for modification C:\Windows\inf\Autoplay.inF KHATRA.exe File created C:\Windows\Xplorer.exe 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
KHATRA.exe30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main KHATRA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Internet Exploiter" KHATRA.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "Internet Exploiter" 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exepid process 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exepid process 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 4152 KHATRA.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.exepid process 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe 4152 KHATRA.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exeKHATRA.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2756 wrote to memory of 4152 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe KHATRA.exe PID 2756 wrote to memory of 4152 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe KHATRA.exe PID 2756 wrote to memory of 4152 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe KHATRA.exe PID 4152 wrote to memory of 4600 4152 KHATRA.exe Xplorer.exe PID 4152 wrote to memory of 4600 4152 KHATRA.exe Xplorer.exe PID 4152 wrote to memory of 4600 4152 KHATRA.exe Xplorer.exe PID 2756 wrote to memory of 3704 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Xplorer.exe PID 2756 wrote to memory of 3704 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Xplorer.exe PID 2756 wrote to memory of 3704 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe Xplorer.exe PID 4152 wrote to memory of 1072 4152 KHATRA.exe gHost.exe PID 4152 wrote to memory of 1072 4152 KHATRA.exe gHost.exe PID 4152 wrote to memory of 1072 4152 KHATRA.exe gHost.exe PID 2756 wrote to memory of 4924 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe gHost.exe PID 2756 wrote to memory of 4924 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe gHost.exe PID 2756 wrote to memory of 4924 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe gHost.exe PID 4152 wrote to memory of 4872 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 4872 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 4872 4152 KHATRA.exe cmd.exe PID 2756 wrote to memory of 4964 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 4964 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 4964 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 4964 wrote to memory of 4428 4964 cmd.exe at.exe PID 4964 wrote to memory of 4428 4964 cmd.exe at.exe PID 4964 wrote to memory of 4428 4964 cmd.exe at.exe PID 4872 wrote to memory of 4592 4872 cmd.exe at.exe PID 4872 wrote to memory of 4592 4872 cmd.exe at.exe PID 4872 wrote to memory of 4592 4872 cmd.exe at.exe PID 4152 wrote to memory of 372 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 372 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 372 4152 KHATRA.exe cmd.exe PID 2756 wrote to memory of 4524 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 4524 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 4524 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 372 wrote to memory of 4716 372 cmd.exe at.exe PID 372 wrote to memory of 4716 372 cmd.exe at.exe PID 372 wrote to memory of 4716 372 cmd.exe at.exe PID 4524 wrote to memory of 1736 4524 cmd.exe at.exe PID 4524 wrote to memory of 1736 4524 cmd.exe at.exe PID 4524 wrote to memory of 1736 4524 cmd.exe at.exe PID 4152 wrote to memory of 380 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 380 4152 KHATRA.exe cmd.exe PID 4152 wrote to memory of 380 4152 KHATRA.exe cmd.exe PID 2756 wrote to memory of 1448 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 1448 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 2756 wrote to memory of 1448 2756 30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe cmd.exe PID 1448 wrote to memory of 1676 1448 cmd.exe regsvr32.exe PID 1448 wrote to memory of 1676 1448 cmd.exe regsvr32.exe PID 1448 wrote to memory of 1676 1448 cmd.exe regsvr32.exe PID 380 wrote to memory of 948 380 cmd.exe regsvr32.exe PID 380 wrote to memory of 948 380 cmd.exe regsvr32.exe PID 380 wrote to memory of 948 380 cmd.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe"C:\Users\Admin\AppData\Local\Temp\30e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc.exe"1⤵
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\KHATRA.exeC:\Windows\system32\KHATRA.exe2⤵
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\Xplorer.exe"C:\Windows\Xplorer.exe" /Windows3⤵
- Executes dropped EXE
PID:4600
-
-
C:\Windows\System\gHost.exe"C:\Windows\System\gHost.exe" /Reproduce3⤵
- Executes dropped EXE
PID:1072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe4⤵PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll3⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 /S C:\Windows\system32\avphost.dll4⤵PID:948
-
-
-
-
C:\Windows\Xplorer.exe"C:\Windows\Xplorer.exe" /Windows2⤵
- Executes dropped EXE
PID:3704
-
-
C:\Windows\System\gHost.exe"C:\Windows\System\gHost.exe" /Reproduce2⤵
- Executes dropped EXE
PID:4924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe3⤵PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\regsvr32.exeRegSvr32 /S C:\Windows\system32\avphost.dll3⤵PID:1676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5715970859bc43ec9bffc46fc08402305
SHA145a5b6e49a31e49b8add126bf0142c180bb5d884
SHA256ca85a00303f3fda0ed309b054606528601a0c6e9faf76d6f375bb900ad4aa44a
SHA512ccd61077de548a9507753d9aa9d7940cc04e91cfe547d26f364d0c86a849874b93cdb3996ff531f7e83f8f6ee3bf4a560d46cd5d2d3cc52ec2c89f2742b50cf5
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb
-
Filesize
234B
MD57ae2f1a7ce729d91acfef43516e5a84c
SHA1ebbc99c7e5ac5679de2881813257576ec980fb44
SHA25643b2fee4fbe5b4a83ae32589d11c3f45ad1988dd5357f790ec708fdfd6709a98
SHA512915b67d31a7034659360355cb00f9620bf9c64cc06660ea55e5fcba0096f1ac782ac7550f778c4874f63082820c03fbbf4dd05169b0de61a661a202f10a4eff9
-
Filesize
234B
MD57ae2f1a7ce729d91acfef43516e5a84c
SHA1ebbc99c7e5ac5679de2881813257576ec980fb44
SHA25643b2fee4fbe5b4a83ae32589d11c3f45ad1988dd5357f790ec708fdfd6709a98
SHA512915b67d31a7034659360355cb00f9620bf9c64cc06660ea55e5fcba0096f1ac782ac7550f778c4874f63082820c03fbbf4dd05169b0de61a661a202f10a4eff9
-
Filesize
713KB
MD544f760f812725dd21c7761dd7221dfa0
SHA1d945e95f9dad6ae149a843199db39b76f7138b2c
SHA25630e5babe61ba93f6d84c31cd4ccfe7a81a5e9784423894214b4f8e42b62c73bc
SHA512c2a0d0fdc2468cc89461c875da0bc00f20b659ad271873620bea681c168178a13103e5f6f126a43111ff72a60af01347126eee662036674443a7100cdfecdcdb