Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 20:01
Behavioral task
behavioral1
Sample
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
Resource
win10v2004-20220901-en
General
-
Target
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe
-
Size
138KB
-
MD5
b747d7d3251d18ca0e12f8a845c03213
-
SHA1
e8d6b7b0eec90a4488d4ad8f291be736907fd27a
-
SHA256
90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
-
SHA512
a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
SSDEEP
1536:dybBm4TdrvqMa4M7H8JTcdr405kanhduwf+RF:dybBm4TO4bYZ4nahXK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" h2s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" nacl.exe -
Disables RegEdit via registry modification 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nacl.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" h2s.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\hosts lsass.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts nacl.exe -
Executes dropped EXE 6 IoCs
pid Process 4816 h2s.exe 4860 lsass.exe 2716 nacl.exe 1676 lsass.exe 740 h2s.exe 2024 lsass.exe -
resource yara_rule behavioral2/memory/1848-132-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0003000000022dc2-137.dat upx behavioral2/files/0x0003000000022dc2-138.dat upx behavioral2/files/0x0003000000022dc3-143.dat upx behavioral2/files/0x0003000000022dc3-144.dat upx behavioral2/memory/4816-147-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4860-149-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0003000000022dc4-150.dat upx behavioral2/files/0x0003000000022dc4-152.dat upx behavioral2/files/0x0003000000022dc3-158.dat upx behavioral2/files/0x0003000000022dc2-163.dat upx behavioral2/memory/1676-164-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2716-167-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/740-168-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/files/0x0003000000022dc3-171.dat upx behavioral2/memory/740-172-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2024-176-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1848-177-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4816-178-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4860-179-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2716-180-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" nacl.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run h2s.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" h2s.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run nacl.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\WINDOWS\userinit.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\system\lsass.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\nacl.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\nacl.exe h2s.exe File opened for modification C:\WINDOWS\system\lsass.exe h2s.exe File opened for modification C:\WINDOWS\userinit.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\h2s.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\h2s.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\system\lsass.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File opened for modification C:\WINDOWS\nacl.exe 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe File created C:\WINDOWS\system\lsass.exe h2s.exe File opened for modification C:\WINDOWS\nacl.exe h2s.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = ca003100000000007a552b2910003930453141367e310000b20009000400efbe7a552b297a552b292e000000a62d02000000020000000000000000000000000000006267b0003900300065003100610036006100620066006300370063003600610063003300320033003400300039003300370065003300300035003700300033006300320038003000390065003700350037003400380030006300660034003000610035006400360033006400340066003400610030006500310030003100330061003100000018000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 50003100000000002155b662100041646d696e003c0009000400efbe21550a587a552d292e00000074e1010000000100000000000000000000000000000026200001410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e003100000000007a552d29100054656d7000003a0009000400efbe21550a587a552d292e00000093e101000000010000000000000000000000000000003bde8700540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 560031000000000021550a5812004170704461746100400009000400efbe21550a587a552d292e0000007fe101000000010000000000000000000000000000008909d9004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000002155fc5a10004c6f63616c003c0009000400efbe21550a587a552d292e00000092e10100000001000000000000000000000000000000a64ac5004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 780031000000000021550a581100557365727300640009000400efbe874f77487a552d292e000000c70500000000010000000000000000003a0000000000df3ef30055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1904 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 1676 lsass.exe 1676 lsass.exe 740 h2s.exe 740 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 4816 h2s.exe 4816 h2s.exe 2024 lsass.exe 2024 lsass.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 4860 lsass.exe 4860 lsass.exe 4816 h2s.exe 4816 h2s.exe 2716 nacl.exe 2716 nacl.exe 4860 lsass.exe 4860 lsass.exe 4816 h2s.exe 4816 h2s.exe 2716 nacl.exe 2716 nacl.exe 4860 lsass.exe 4860 lsass.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 explorer.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 4816 h2s.exe 4816 h2s.exe 4860 lsass.exe 4860 lsass.exe 2716 nacl.exe 2716 nacl.exe 1676 lsass.exe 1676 lsass.exe 740 h2s.exe 740 h2s.exe 2024 lsass.exe 2024 lsass.exe 1904 explorer.exe 1904 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1848 wrote to memory of 4816 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 81 PID 1848 wrote to memory of 4816 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 81 PID 1848 wrote to memory of 4816 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 81 PID 1848 wrote to memory of 4860 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 82 PID 1848 wrote to memory of 4860 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 82 PID 1848 wrote to memory of 4860 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 82 PID 4816 wrote to memory of 2716 4816 h2s.exe 84 PID 4816 wrote to memory of 2716 4816 h2s.exe 84 PID 4816 wrote to memory of 2716 4816 h2s.exe 84 PID 1848 wrote to memory of 4544 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 85 PID 1848 wrote to memory of 4544 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 85 PID 1848 wrote to memory of 4544 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 85 PID 4816 wrote to memory of 1676 4816 h2s.exe 86 PID 4816 wrote to memory of 1676 4816 h2s.exe 86 PID 4816 wrote to memory of 1676 4816 h2s.exe 86 PID 1848 wrote to memory of 740 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 87 PID 1848 wrote to memory of 740 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 87 PID 1848 wrote to memory of 740 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 87 PID 1848 wrote to memory of 2024 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 89 PID 1848 wrote to memory of 2024 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 89 PID 1848 wrote to memory of 2024 1848 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe 89 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" nacl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" nacl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer nacl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer h2s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" lsass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe"C:\Users\Admin\AppData\Local\Temp\90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4816 -
C:\WINDOWS\nacl.exeC:\WINDOWS\nacl.exe3⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2716
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4860
-
-
C:\Windows\SysWOW64\explorer.exeexplorer 90e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a12⤵PID:4544
-
-
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:740
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1904
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
2KB
MD541f66bb0ac50f2d851236170e7c71341
SHA159bcec216302151922219b51be8ad8ab6d0b8384
SHA256ec99cca58b612ce268e6ada818dfcec0acc22dd1bbe372487be9abbdd07ce073
SHA512d0d223b93236d62d60974d638d9916901c37c32a4b8ef3faebd336850bc1af8b73ce27ac57205a00d97f38ccdd0ad655c9df7e1d7da6ae89de40b173a8639fa6
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669
-
Filesize
138KB
MD5b747d7d3251d18ca0e12f8a845c03213
SHA1e8d6b7b0eec90a4488d4ad8f291be736907fd27a
SHA25690e1a6abfc7c6ac32340937e305703c2809e757480cf40a5d63d4f4a0e1013a1
SHA512a27918551e691dc3624826c74afc98e434bc3a14345db01988f25720744e83da3f6e69c7163b61d21eca6eed47cd47c97bb25c4fc5a6bc98c0e9b06477c3e669