Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 01:35
Static task
static1
Behavioral task
behavioral1
Sample
a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe
-
Size
164KB
-
MD5
a7d0433ce4435d2cc4b806da76dbe360
-
SHA1
991a569024b6320e0894e2f4459cb4b4b7a05390
-
SHA256
25aeb8acc6bae3bf19beb66c996f8763ecbc0f6595068f188e157d1880a35d28
-
SHA512
2890284e536bce55062d1a10eddb1f45a9ef52e81c8af75d1bec54299eff3a25aff44683b70daa66884a46db46daadb578c6fee7ef2e433084cb0c2639aedafe
-
SSDEEP
3072:Ax/5F/E7tEf0G+p+tYlpJH7iXQNgggHlxDZiYLK5Wph:AxhF4cX+wWJH7igNgjdFKs
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
pid Process 3788 xk.exe 4224 IExplorer.exe 796 WINLOGON.EXE 1008 CSRSS.EXE 5000 SERVICES.EXE 5032 LSASS.EXE 3572 SMSS.EXE 1928 xk.exe 3200 IExplorer.exe 5116 WINLOGON.EXE 3744 CSRSS.EXE 3396 SERVICES.EXE 1188 LSASS.EXE 2096 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created C:\desktop.ini a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened for modification F:\desktop.ini a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created F:\desktop.ini a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\J: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\M: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\P: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\R: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\I: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\Q: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\U: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\V: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\X: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\Z: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\B: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\E: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\H: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\K: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\L: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\S: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\T: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\W: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\Y: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\N: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened (read-only) \??\O: a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created C:\Windows\SysWOW64\shell.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created C:\Windows\SysWOW64\Mig2.scr a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created C:\Windows\SysWOW64\IExplorer.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe File created C:\Windows\xk.exe a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\Desktop\ a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 3788 xk.exe 4224 IExplorer.exe 796 WINLOGON.EXE 1008 CSRSS.EXE 5000 SERVICES.EXE 5032 LSASS.EXE 3572 SMSS.EXE 1928 xk.exe 3200 IExplorer.exe 5116 WINLOGON.EXE 3744 CSRSS.EXE 3396 SERVICES.EXE 1188 LSASS.EXE 2096 SMSS.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1336 wrote to memory of 3788 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 83 PID 1336 wrote to memory of 3788 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 83 PID 1336 wrote to memory of 3788 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 83 PID 1336 wrote to memory of 4224 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 84 PID 1336 wrote to memory of 4224 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 84 PID 1336 wrote to memory of 4224 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 84 PID 1336 wrote to memory of 796 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 85 PID 1336 wrote to memory of 796 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 85 PID 1336 wrote to memory of 796 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 85 PID 1336 wrote to memory of 1008 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 86 PID 1336 wrote to memory of 1008 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 86 PID 1336 wrote to memory of 1008 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 86 PID 1336 wrote to memory of 5000 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 88 PID 1336 wrote to memory of 5000 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 88 PID 1336 wrote to memory of 5000 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 88 PID 1336 wrote to memory of 5032 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 87 PID 1336 wrote to memory of 5032 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 87 PID 1336 wrote to memory of 5032 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 87 PID 1336 wrote to memory of 3572 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 89 PID 1336 wrote to memory of 3572 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 89 PID 1336 wrote to memory of 3572 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 89 PID 1336 wrote to memory of 1928 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 98 PID 1336 wrote to memory of 1928 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 98 PID 1336 wrote to memory of 1928 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 98 PID 1336 wrote to memory of 3200 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 99 PID 1336 wrote to memory of 3200 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 99 PID 1336 wrote to memory of 3200 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 99 PID 1336 wrote to memory of 5116 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 100 PID 1336 wrote to memory of 5116 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 100 PID 1336 wrote to memory of 5116 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 100 PID 1336 wrote to memory of 3744 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 101 PID 1336 wrote to memory of 3744 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 101 PID 1336 wrote to memory of 3744 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 101 PID 1336 wrote to memory of 3396 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 103 PID 1336 wrote to memory of 3396 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 103 PID 1336 wrote to memory of 3396 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 103 PID 1336 wrote to memory of 1188 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 104 PID 1336 wrote to memory of 1188 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 104 PID 1336 wrote to memory of 1188 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 104 PID 1336 wrote to memory of 2096 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 105 PID 1336 wrote to memory of 2096 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 105 PID 1336 wrote to memory of 2096 1336 a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe 105 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\a7d0433ce4435d2cc4b806da76dbe360exe_JC.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1336 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3788
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5032
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3572
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3200
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5116
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3396
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD52639ef8ca7a59eced0ee556411fef065
SHA18b5819ee8c072b4267589925d367aaef38891029
SHA256253b14b184f4542261f183a4e3f65a9e43bd9c64eb15fe992c00fd53c932bd5b
SHA512ce63e9036b13b57186b9852def564b77563a8f0e057ed545a9e72e91a611ebecb1f0a7fb7e66c1cb2ab801d3f9dbf676d75496062e5101f888e4d2d01d64428d
-
Filesize
164KB
MD5a483d0ffd2e799c8631f8d7377294a03
SHA1abb20558147d5055c0645b5d707ffe7df654833f
SHA256c45c687910d0da1cd2c03c71c1b38d9da5f4130a36524d5b09578197fff04bf1
SHA512b0da63534e9d3594406332325c1bba6cda20bd65122aa3b5ae6c9f29983671029b02d885a30bc6795c61187b96cfa15e1d5d5de1ab84214b16b37375c3a6d7e4
-
Filesize
164KB
MD5ed3c6df4e02d527e5f00eba5b4f42cd0
SHA1a936a34d590631e7037e2faa60d7675b8957f007
SHA25668f2b24da725bf5a1de3d3fd71d96a95d96241e93ea780d4fb676ee1e03c88b1
SHA512bb1f91b3bbf1e51594be8cb892635abfda24c1cb4ba4734b02d0c1af74a3f10f9a95caa830e2f0ddf0a8e9d0ae20e16a40264238918ded2b5dbfe8bef68857df
-
Filesize
164KB
MD5a306b813f4c43a532249360889d73048
SHA19ab8f24e802ffa5348da4a1b4835e28fc9073500
SHA256385521db24dd9bb18d936fbbdbf8daed57dac645981343a1becbfb33f4cb19cf
SHA5124b19be548acbd0fc8431a3512904a615bcec90a30b9a0fe17ab1518d25cfe8f74612120248e51a83f6f0be648fced3229940d24a338aa2f8c94ba602652e98e4
-
Filesize
164KB
MD510b2670c2931f4b831b0c16d5415e293
SHA16aa4fffb1bc2f67266764478c3db1e06760f618b
SHA2563a8ced2d0c8b1b5343e3dd47933027339b9e1e24e2c642ccd852df1857ae4a14
SHA51294b8d89de9d3476ff93225af62845c291d3709c5ff193064704967db6fa9d5bec41e0b7c0f4f85353e19ecbde0332548eb48ae6bfa7322c61d399db23bf19036
-
Filesize
164KB
MD560d4feeeec7eed4fb255be021f93cbcc
SHA199300f5eaea4abf5ccb4ff3e9f0a731f3fb98fe6
SHA256b17f62115278f2df7a039b95cb2690a18b56a22e29574baae1ce791964216225
SHA5120b0f14b033a73c6ab7b5d5f778a527b81dbfab217254735bd389defa021a0b7fd911124a46126fc1d30ee40a9273a7c334208940a15870d8fae55d9d1a8f30b0
-
Filesize
164KB
MD53c6d5c0c7459a1cd0a57bed13d200573
SHA184277318f5f61c656e1cfd1ff47f5b1ce413be07
SHA25696649dde039757f931239d624cf56230fb9139fc7df2633cb7b2b7c229b17868
SHA512a547a393c4847a70e02298d9c755b9cc4a33b2a42f900a25cc99fb56eff37fa4bef1012dbc328db22c3973207e74e89c3ea449290ef21ad458418d31f09f9de2
-
Filesize
164KB
MD544b491719fbd0d86eacb994bc26856f3
SHA105ecbdf1ee436b470aad99f818c0a63eea9e9c64
SHA256adb234ae7beaff35fc097d34fa9945664e6f9a7adf8e4a9df08870d0e58cbebe
SHA512ae9daf64a509044a6626b34663b1aabffac2691979be89acf4ead6c96c2718d0e5a93615be9c7196029040ae7b91213a29958a94fdaf7a16673cc3ef8cf5314e
-
Filesize
164KB
MD5ec8a0303d0f2f19d98be942bd37f58c4
SHA18807d808f3b32ce70358719597c3ae753ed6d509
SHA2562f7231b01b768405c229f8c53f6896503f69a3baca96aabc17bd2f61192eaf2a
SHA5124c2a17ba1957747198961c22058a1ed892c2209f3a5389696243471c2f56e6d247611d511c681d55d862612503eadde249983e0c015f1c88635e3074cd032685
-
Filesize
164KB
MD56cc97dedb3a7d66b056941585586a7a0
SHA1ed2e52954cee865fac641a9624a364037eb319ea
SHA256ea6836d626adb0394e97fa80350fe176d3031e7a870e38355e35877f6b0e4bf4
SHA512722163a2c66f8cb7a8c3c79f47c753ba309c04e05f5aebda7124d150b27ff56c5b0c7c44b540dd20c7624081c7f83785586447b521f725acd1666f6ab4ff23ae
-
Filesize
164KB
MD5a7d0433ce4435d2cc4b806da76dbe360
SHA1991a569024b6320e0894e2f4459cb4b4b7a05390
SHA25625aeb8acc6bae3bf19beb66c996f8763ecbc0f6595068f188e157d1880a35d28
SHA5122890284e536bce55062d1a10eddb1f45a9ef52e81c8af75d1bec54299eff3a25aff44683b70daa66884a46db46daadb578c6fee7ef2e433084cb0c2639aedafe
-
Filesize
164KB
MD5a483d0ffd2e799c8631f8d7377294a03
SHA1abb20558147d5055c0645b5d707ffe7df654833f
SHA256c45c687910d0da1cd2c03c71c1b38d9da5f4130a36524d5b09578197fff04bf1
SHA512b0da63534e9d3594406332325c1bba6cda20bd65122aa3b5ae6c9f29983671029b02d885a30bc6795c61187b96cfa15e1d5d5de1ab84214b16b37375c3a6d7e4
-
Filesize
164KB
MD5a306b813f4c43a532249360889d73048
SHA19ab8f24e802ffa5348da4a1b4835e28fc9073500
SHA256385521db24dd9bb18d936fbbdbf8daed57dac645981343a1becbfb33f4cb19cf
SHA5124b19be548acbd0fc8431a3512904a615bcec90a30b9a0fe17ab1518d25cfe8f74612120248e51a83f6f0be648fced3229940d24a338aa2f8c94ba602652e98e4
-
Filesize
164KB
MD560d4feeeec7eed4fb255be021f93cbcc
SHA199300f5eaea4abf5ccb4ff3e9f0a731f3fb98fe6
SHA256b17f62115278f2df7a039b95cb2690a18b56a22e29574baae1ce791964216225
SHA5120b0f14b033a73c6ab7b5d5f778a527b81dbfab217254735bd389defa021a0b7fd911124a46126fc1d30ee40a9273a7c334208940a15870d8fae55d9d1a8f30b0
-
Filesize
164KB
MD544b491719fbd0d86eacb994bc26856f3
SHA105ecbdf1ee436b470aad99f818c0a63eea9e9c64
SHA256adb234ae7beaff35fc097d34fa9945664e6f9a7adf8e4a9df08870d0e58cbebe
SHA512ae9daf64a509044a6626b34663b1aabffac2691979be89acf4ead6c96c2718d0e5a93615be9c7196029040ae7b91213a29958a94fdaf7a16673cc3ef8cf5314e
-
Filesize
164KB
MD56cc97dedb3a7d66b056941585586a7a0
SHA1ed2e52954cee865fac641a9624a364037eb319ea
SHA256ea6836d626adb0394e97fa80350fe176d3031e7a870e38355e35877f6b0e4bf4
SHA512722163a2c66f8cb7a8c3c79f47c753ba309c04e05f5aebda7124d150b27ff56c5b0c7c44b540dd20c7624081c7f83785586447b521f725acd1666f6ab4ff23ae
-
Filesize
164KB
MD52dc496e7c9ac003c98a48e055d7f1c81
SHA1575a4487e1375d442d397338b9b85842ae600bf3
SHA25617d981aa8e1997b808ea60025037823d62cd3a8f270ba02b09457d20f82a4f7c
SHA51290cdd020a4356d5039e1e4157942af45b4d2a188d3893ca75c39f4723c391a4767ee252a6b2f9c8d9cd99869df5692b4ca4e87f84d37e55a59c6e0dd89eb5988
-
Filesize
164KB
MD5e4ab1e77f7398c6cbd33560f710166a7
SHA192d9dbdd6747a6d3e37fbaabfc51e6cf09f72d3d
SHA2563fc0b972218a62f4ae99aedfd189fc87428f1d72b9eef1719a7d2e163da77c55
SHA512245889ebf2e407b1d85df869bf8aeaf6b666d00b7576ae12ac87520769a5eb568f053ef09929f48a7032eaa2c1a49f352bf22f18f8360c18bd71fc7c0920cc5c
-
Filesize
164KB
MD5e4ab1e77f7398c6cbd33560f710166a7
SHA192d9dbdd6747a6d3e37fbaabfc51e6cf09f72d3d
SHA2563fc0b972218a62f4ae99aedfd189fc87428f1d72b9eef1719a7d2e163da77c55
SHA512245889ebf2e407b1d85df869bf8aeaf6b666d00b7576ae12ac87520769a5eb568f053ef09929f48a7032eaa2c1a49f352bf22f18f8360c18bd71fc7c0920cc5c
-
Filesize
164KB
MD5299480b1fc771d362428eabe55a4c3ad
SHA1b3fdd9b270f4461e18ee26ee91a64dc46e8ae266
SHA2568f823e0e1cb14775d803250d7688ea29719b670a86b4d101f4168b77fdcc253c
SHA512178fd45f91ca06e6cf2719fb051a18c7a99a5ca85c98714ef804c5765232641b662669ee7cba6d2bceac17545a51cdd26449c2ba0652ec0d2ccb108e2ee832d3
-
Filesize
164KB
MD59e1f1dedf49f1c188bd4f8a2ec17b187
SHA151b077d0af1d8250868c72586275efabad0725d3
SHA2566aec1beb40caaa3e700d63c03f07a5ce16f9f58a8a8879478bcdd1749d3a132c
SHA512fc8eaa2425748b795bd96e4c9f7fab85c761d9ae3b6a994a40c62731ea20f40f542f170167c65b933414aac9cba8b369a60ae99287a0a5a5148d36d31fdaadee
-
Filesize
164KB
MD59e1f1dedf49f1c188bd4f8a2ec17b187
SHA151b077d0af1d8250868c72586275efabad0725d3
SHA2566aec1beb40caaa3e700d63c03f07a5ce16f9f58a8a8879478bcdd1749d3a132c
SHA512fc8eaa2425748b795bd96e4c9f7fab85c761d9ae3b6a994a40c62731ea20f40f542f170167c65b933414aac9cba8b369a60ae99287a0a5a5148d36d31fdaadee
-
Filesize
640B
MD55d142e7978321fde49abd9a068b64d97
SHA170020fcf7f3d6dafb6c8cd7a55395196a487bef4
SHA256fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061
SHA5122351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9
-
Filesize
217B
MD5c00d8433fe598abff197e690231531e0
SHA14f6b87a4327ff5343e9e87275d505b9f145a7e42
SHA25652fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e
SHA512a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1