Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 20:01
Behavioral task
behavioral1
Sample
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
Resource
win10v2004-20220901-en
General
-
Target
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
-
Size
138KB
-
MD5
b747d7d3251d18ca0e12f8a845c03213
-
SHA1
e8d6b7b0eec90a4488d4ad8f291be736907fd27a
-
SHA256
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
-
SHA512
a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
SSDEEP
1536:dybBm4TdrvqMa4M7H8JTcdr405kanhduwf+RF:dybBm4TO4bYZ4nahXK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" h2s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" nacl.exe -
Disables RegEdit via registry modification 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nacl.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" h2s.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts nacl.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts lsass.exe -
Executes dropped EXE 6 IoCs
pid Process 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1240 lsass.exe 1432 h2s.exe 1648 lsass.exe -
resource yara_rule behavioral1/memory/1700-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x000700000001347b-59.dat upx behavioral1/files/0x00070000000136cd-63.dat upx behavioral1/files/0x00070000000136cd-64.dat upx behavioral1/files/0x00070000000136cd-66.dat upx behavioral1/memory/1984-71-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-72-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x000700000001347b-74.dat upx behavioral1/files/0x00070000000136cd-76.dat upx behavioral1/files/0x000700000001399b-79.dat upx behavioral1/files/0x000700000001399b-75.dat upx behavioral1/files/0x00070000000136cd-84.dat upx behavioral1/files/0x00070000000136cd-86.dat upx behavioral1/memory/1240-90-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x000700000001347b-92.dat upx behavioral1/memory/1432-99-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/files/0x00070000000136cd-100.dat upx behavioral1/files/0x00070000000136cd-97.dat upx behavioral1/memory/1648-104-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1700-105-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/572-108-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1984-109-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1152-110-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1984-111-0x0000000002580000-0x00000000025E6000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 1984 h2s.exe 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run nacl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" nacl.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run h2s.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" h2s.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\WINDOWS\userinit.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\h2s.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\h2s.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\nacl.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\nacl.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\system\lsass.exe h2s.exe File created C:\WINDOWS\userinit.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\system\lsass.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\system\lsass.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\nacl.exe h2s.exe File created C:\WINDOWS\system\lsass.exe h2s.exe File opened for modification C:\WINDOWS\nacl.exe h2s.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000006b55837c1100557365727300600008000400efbeee3a851a6b55837c2a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000006b55c08b100041646d696e00380008000400efbe6b55837c6b55c08b2a00000031000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c6003100000000007a553a3110203930453141367e310000ae0008000400efbe7a553a317a553a312a000000ae3101000000090000000000000000000000000000003900300065003100610036006100620066006300370063003600610063003300320033003400300039003300370065003300300035003700300033006300320038003000390065003700350037003400380030006300660034003000610035006400360033006400340066003400610030006500310030003100330061003100000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000006b55837c122041707044617461003c0008000400efbe6b55837c6b55837c2a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000006b55537e10204c6f63616c00380008000400efbe6b55837c6b55537e2a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000007a553a31102054656d700000360008000400efbe6b55837c7a553a312a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 h2s.exe 1152 lsass.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1240 lsass.exe 1432 h2s.exe 1648 lsass.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 1152 lsass.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 572 nacl.exe 1984 h2s.exe 572 nacl.exe 1984 h2s.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 396 explorer.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 1984 h2s.exe 1984 h2s.exe 1152 lsass.exe 1152 lsass.exe 572 nacl.exe 572 nacl.exe 1240 lsass.exe 1240 lsass.exe 1432 h2s.exe 1432 h2s.exe 1648 lsass.exe 1648 lsass.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1984 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 28 PID 1700 wrote to memory of 1984 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 28 PID 1700 wrote to memory of 1984 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 28 PID 1700 wrote to memory of 1984 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 28 PID 1700 wrote to memory of 1152 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 29 PID 1700 wrote to memory of 1152 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 29 PID 1700 wrote to memory of 1152 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 29 PID 1700 wrote to memory of 1152 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 29 PID 1700 wrote to memory of 1388 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 31 PID 1700 wrote to memory of 1388 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 31 PID 1700 wrote to memory of 1388 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 31 PID 1700 wrote to memory of 1388 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 31 PID 1984 wrote to memory of 572 1984 h2s.exe 32 PID 1984 wrote to memory of 572 1984 h2s.exe 32 PID 1984 wrote to memory of 572 1984 h2s.exe 32 PID 1984 wrote to memory of 572 1984 h2s.exe 32 PID 1984 wrote to memory of 1240 1984 h2s.exe 33 PID 1984 wrote to memory of 1240 1984 h2s.exe 33 PID 1984 wrote to memory of 1240 1984 h2s.exe 33 PID 1984 wrote to memory of 1240 1984 h2s.exe 33 PID 1700 wrote to memory of 1432 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 34 PID 1700 wrote to memory of 1432 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 34 PID 1700 wrote to memory of 1432 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 34 PID 1700 wrote to memory of 1432 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 34 PID 1700 wrote to memory of 1648 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 36 PID 1700 wrote to memory of 1648 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 36 PID 1700 wrote to memory of 1648 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 36 PID 1700 wrote to memory of 1648 1700 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 36 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" h2s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer nacl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" nacl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" nacl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe"C:\Users\Admin\AppData\Local\Temp\90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1984 -
C:\WINDOWS\nacl.exeC:\WINDOWS\nacl.exe3⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:572
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1152
-
-
C:\Windows\SysWOW64\explorer.exeexplorer 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a12⤵PID:1388
-
-
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669