Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:56
Behavioral task
behavioral1
Sample
0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe
Resource
win10v2004-20220901-en
General
-
Target
0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe
-
Size
188KB
-
MD5
076f8351f13f7b87f0770d611b441c2c
-
SHA1
ce60352c94d720928b66b191bd3f2b6df6f64505
-
SHA256
0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
-
SHA512
01667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
SSDEEP
1536:VjPzy7rAVb3n3gX72IEJ5NwE4G/a3hd+g/:JPzyXANQX729D4G/aR3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" h2s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\WINDOWS\\userinit.exe" nacl.exe -
Disables RegEdit via registry modification 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" h2s.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nacl.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 3972 h2s.exe 3192 lsass.exe 4516 nacl.exe 2316 lsass.exe 4980 h2s.exe 1012 lsass.exe -
resource yara_rule behavioral2/memory/4708-132-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/files/0x0001000000022e19-139.dat upx behavioral2/files/0x0001000000022e19-138.dat upx behavioral2/files/0x0001000000022e16-145.dat upx behavioral2/memory/3972-147-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/files/0x0001000000022e1a-150.dat upx behavioral2/files/0x0001000000022e1a-151.dat upx behavioral2/files/0x0001000000022e16-156.dat upx behavioral2/files/0x0001000000022e1b-158.dat upx behavioral2/files/0x0001000000022e1b-160.dat upx behavioral2/memory/3192-166-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4516-169-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/files/0x0001000000022e1a-168.dat upx behavioral2/files/0x0001000000022e16-174.dat upx behavioral2/memory/2316-176-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/files/0x0001000000022e19-178.dat upx behavioral2/files/0x0001000000022e16-164.dat upx behavioral2/files/0x0001000000022e16-182.dat upx behavioral2/files/0x0001000000022e1a-186.dat upx behavioral2/memory/4980-188-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/files/0x0001000000022e16-191.dat upx behavioral2/memory/4980-184-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4708-193-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/4516-195-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/3972-194-0x0000000000400000-0x000000000048D000-memory.dmp upx behavioral2/memory/3192-196-0x0000000000400000-0x000000000048D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" h2s.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" lsass.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run nacl.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pikachu = "C:\\WINDOWS\\nacl.exe" nacl.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run h2s.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\WINDOWS\userinit.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File opened for modification C:\WINDOWS\userinit.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File created C:\WINDOWS\system\lsass.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File created C:\WINDOWS\system\lsass.exe h2s.exe File opened for modification C:\WINDOWS\system\lsass.exe h2s.exe File created C:\WINDOWS\h2s.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File opened for modification C:\WINDOWS\h2s.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File opened for modification C:\WINDOWS\system\lsass.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File created C:\WINDOWS\nacl.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File opened for modification C:\WINDOWS\nacl.exe 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe File created C:\WINDOWS\nacl.exe h2s.exe File opened for modification C:\WINDOWS\nacl.exe h2s.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7800310000000000875551141100557365727300640009000400efbe874f7748875551142e000000c70500000000010000000000000000003a000000000011e6370055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = ca003100000000008755511410003042313538327e310000b20009000400efbe87555114875551142e000000172e02000000010000000000000000000000000000009c7d35003000620031003500380032006500370030003400390065003200380065003000300036003700640064003800660063006400320061006400610034003600330036006400650064003500640066003500340063006500640032003500300035006600320038003500320064003900360061003800380035003700630062003400000018000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 50003100000000002155fc5a10004c6f63616c003c0009000400efbe21550a58875551142e00000092e10100000001000000000000000000000000000000a64ac5004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4e0031000000000087555214100054656d7000003a0009000400efbe21550a58875552142e00000093e10100000001000000000000000000000000000000a4d52400540065006d007000000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 560031000000000021550a5812004170704461746100400009000400efbe21550a58875551142e0000007fe101000000010000000000000000000000000000008909d9004100700070004400610074006100000016000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 500031000000000021552260100041646d696e003c0009000400efbe21550a58875551142e00000074e10100000001000000000000000000000000000000ca214000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4444 explorer.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3972 h2s.exe 3972 h2s.exe 3972 h2s.exe 3972 h2s.exe 3192 lsass.exe 3192 lsass.exe 4516 nacl.exe 4516 nacl.exe 2316 lsass.exe 2316 lsass.exe 3192 lsass.exe 3192 lsass.exe 4980 h2s.exe 4980 h2s.exe 4516 nacl.exe 4516 nacl.exe 3972 h2s.exe 3972 h2s.exe 1012 lsass.exe 1012 lsass.exe 3192 lsass.exe 3192 lsass.exe 4516 nacl.exe 4516 nacl.exe 3972 h2s.exe 3972 h2s.exe 3192 lsass.exe 3192 lsass.exe 4516 nacl.exe 4516 nacl.exe 3972 h2s.exe 3972 h2s.exe 3192 lsass.exe 3192 lsass.exe 4516 nacl.exe 4516 nacl.exe 3192 lsass.exe 3192 lsass.exe 3972 h2s.exe 3972 h2s.exe 4516 nacl.exe 4516 nacl.exe 3192 lsass.exe 3192 lsass.exe 3972 h2s.exe 3972 h2s.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 3972 h2s.exe 3972 h2s.exe 3192 lsass.exe 3192 lsass.exe 4516 nacl.exe 4516 nacl.exe 2316 lsass.exe 2316 lsass.exe 4980 h2s.exe 4980 h2s.exe 1012 lsass.exe 1012 lsass.exe 4444 explorer.exe 4444 explorer.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1780 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 38 PID 4708 wrote to memory of 1780 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 38 PID 4708 wrote to memory of 1780 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 38 PID 4708 wrote to memory of 3972 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 30 PID 4708 wrote to memory of 3972 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 30 PID 4708 wrote to memory of 3972 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 30 PID 1780 wrote to memory of 4368 1780 cmd.exe 31 PID 1780 wrote to memory of 4368 1780 cmd.exe 31 PID 1780 wrote to memory of 4368 1780 cmd.exe 31 PID 4368 wrote to memory of 3980 4368 net.exe 36 PID 4368 wrote to memory of 3980 4368 net.exe 36 PID 4368 wrote to memory of 3980 4368 net.exe 36 PID 3972 wrote to memory of 488 3972 h2s.exe 33 PID 3972 wrote to memory of 488 3972 h2s.exe 33 PID 3972 wrote to memory of 488 3972 h2s.exe 33 PID 488 wrote to memory of 2764 488 cmd.exe 35 PID 488 wrote to memory of 2764 488 cmd.exe 35 PID 488 wrote to memory of 2764 488 cmd.exe 35 PID 4708 wrote to memory of 3192 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 34 PID 4708 wrote to memory of 3192 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 34 PID 4708 wrote to memory of 3192 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 34 PID 2764 wrote to memory of 4612 2764 net.exe 40 PID 2764 wrote to memory of 4612 2764 net.exe 40 PID 2764 wrote to memory of 4612 2764 net.exe 40 PID 3192 wrote to memory of 2304 3192 lsass.exe 58 PID 3192 wrote to memory of 2304 3192 lsass.exe 58 PID 3192 wrote to memory of 2304 3192 lsass.exe 58 PID 3972 wrote to memory of 4516 3972 h2s.exe 54 PID 3972 wrote to memory of 4516 3972 h2s.exe 54 PID 3972 wrote to memory of 4516 3972 h2s.exe 54 PID 4516 wrote to memory of 1604 4516 nacl.exe 53 PID 4516 wrote to memory of 1604 4516 nacl.exe 53 PID 4516 wrote to memory of 1604 4516 nacl.exe 53 PID 3972 wrote to memory of 2316 3972 h2s.exe 48 PID 3972 wrote to memory of 2316 3972 h2s.exe 48 PID 3972 wrote to memory of 2316 3972 h2s.exe 48 PID 4708 wrote to memory of 2044 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 45 PID 4708 wrote to memory of 2044 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 45 PID 4708 wrote to memory of 2044 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 45 PID 2316 wrote to memory of 4108 2316 lsass.exe 46 PID 2316 wrote to memory of 4108 2316 lsass.exe 46 PID 2316 wrote to memory of 4108 2316 lsass.exe 46 PID 4708 wrote to memory of 4980 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 50 PID 4708 wrote to memory of 4980 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 50 PID 4708 wrote to memory of 4980 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 50 PID 4980 wrote to memory of 3328 4980 h2s.exe 52 PID 4980 wrote to memory of 3328 4980 h2s.exe 52 PID 4980 wrote to memory of 3328 4980 h2s.exe 52 PID 4708 wrote to memory of 1012 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 55 PID 4708 wrote to memory of 1012 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 55 PID 4708 wrote to memory of 1012 4708 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe 55 PID 1012 wrote to memory of 3304 1012 lsass.exe 57 PID 1012 wrote to memory of 3304 1012 lsass.exe 57 PID 1012 wrote to memory of 3304 1012 lsass.exe 57 -
System policy modification 1 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" nacl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" nacl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "0" h2s.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" h2s.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer nacl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe"C:\Users\Admin\AppData\Local\Temp\0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3972 -
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &3⤵
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\net.exenet share "phim_hai_hay=C:\Documents and Settings\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share "phim_hai_hay=C:\Documents and Settings\Temp"5⤵PID:4612
-
-
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316
-
-
C:\WINDOWS\nacl.exeC:\WINDOWS\nacl.exe3⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4516
-
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3192 -
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &3⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &2⤵
- Suspicious use of WriteProcessMemory
PID:1780
-
-
C:\Windows\SysWOW64\explorer.exeexplorer 0b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb42⤵PID:2044
-
-
C:\WINDOWS\h2s.exeC:\WINDOWS\h2s.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &3⤵PID:3328
-
-
-
C:\WINDOWS\system\lsass.exeC:\WINDOWS\system\lsass.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &3⤵PID:3304
-
-
-
C:\Windows\SysWOW64\net.exenet share "phim_hai_hay=C:\Documents and Settings\Temp"1⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share "phim_hai_hay=C:\Documents and Settings\Temp"2⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &1⤵PID:4108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4444
-
C:\Windows\SysWOW64\cmd.execmd /k net share "phim_hai_hay=C:\Documents and Settings\Temp" & exit &1⤵PID:1604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
578B
MD54cedd41692993cf5a0a40baeb724b871
SHA1fc1eeb1d88966ea4a816bcbdab320830b6f70261
SHA256fc50ea976a803f4b75f0754c470753049cb6ad93466ec9a55f0b922e112a7695
SHA512e7124fdba0a6580da6c48cd77777c6aa1aa23f304db8383551931db1e5e814d2d03de92eeaeeb64f4a0654ee7de640956abeffdd94bcd23c08a875cdc6907862
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78
-
Filesize
188KB
MD5076f8351f13f7b87f0770d611b441c2c
SHA1ce60352c94d720928b66b191bd3f2b6df6f64505
SHA2560b1582e7049e28e0067dd8fcd2ada4636ded5df54ced2505f2852d96a8857cb4
SHA51201667becb2906a2000467db6b8af51f086ce0424eb5d5cea73b5f622aaaaf1e14110c841acd304721fda35cb45d70fdcd392a846450e028274f72b4db44c2c78