Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.9a80d24836f6176ed8ea905836958050.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.9a80d24836f6176ed8ea905836958050.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.9a80d24836f6176ed8ea905836958050.exe
-
Size
222KB
-
MD5
9a80d24836f6176ed8ea905836958050
-
SHA1
4a8b2388076edf92bb66cb65a6ab5f28a77a0710
-
SHA256
6dcf54625fee659e41e75ac47bbeeadf172b3447fcc9be02f7db87c1f654cc22
-
SHA512
cda3bf2aee167308148426d283b8eeec0fe1f7426bb338da96a6cae0addd073753cc38328d89cd3968079d4c320d92bc8205a2522c445b0762f7970d8b52269e
-
SSDEEP
3072:X/5F/E7tEf0h+p+tYlpJH7iXQNgggHlxDZiYLK5WplwS4or4wS4M:XhF4cE+wWJH7igNgjdFKs6or4qM
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
pid Process 1820 xk.exe 1672 IExplorer.exe 1952 xk.exe 4740 IExplorer.exe 4780 WINLOGON.EXE 1436 CSRSS.EXE 5076 SERVICES.EXE 3424 LSASS.EXE 4852 SMSS.EXE 2184 WINLOGON.EXE 1052 CSRSS.EXE 528 SERVICES.EXE 3768 LSASS.EXE 1436 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini NEAS.9a80d24836f6176ed8ea905836958050.exe File created C:\desktop.ini NEAS.9a80d24836f6176ed8ea905836958050.exe File opened for modification F:\desktop.ini NEAS.9a80d24836f6176ed8ea905836958050.exe File created F:\desktop.ini NEAS.9a80d24836f6176ed8ea905836958050.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\X: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\Y: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\O: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\P: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\U: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\T: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\E: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\H: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\J: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\S: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\V: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\Z: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\I: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\L: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\N: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\M: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\Q: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\R: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\B: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\G: NEAS.9a80d24836f6176ed8ea905836958050.exe File opened (read-only) \??\K: NEAS.9a80d24836f6176ed8ea905836958050.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe NEAS.9a80d24836f6176ed8ea905836958050.exe File created C:\Windows\SysWOW64\shell.exe NEAS.9a80d24836f6176ed8ea905836958050.exe File created C:\Windows\SysWOW64\Mig2.scr NEAS.9a80d24836f6176ed8ea905836958050.exe File created C:\Windows\SysWOW64\IExplorer.exe NEAS.9a80d24836f6176ed8ea905836958050.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe NEAS.9a80d24836f6176ed8ea905836958050.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr NEAS.9a80d24836f6176ed8ea905836958050.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe NEAS.9a80d24836f6176ed8ea905836958050.exe File created C:\Windows\xk.exe NEAS.9a80d24836f6176ed8ea905836958050.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\Desktop\ NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" NEAS.9a80d24836f6176ed8ea905836958050.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command NEAS.9a80d24836f6176ed8ea905836958050.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 1820 xk.exe 1672 IExplorer.exe 1952 xk.exe 4740 IExplorer.exe 4780 WINLOGON.EXE 1436 CSRSS.EXE 5076 SERVICES.EXE 3424 LSASS.EXE 4852 SMSS.EXE 2184 WINLOGON.EXE 1052 CSRSS.EXE 528 SERVICES.EXE 3768 LSASS.EXE 1436 SMSS.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1820 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 86 PID 1044 wrote to memory of 1820 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 86 PID 1044 wrote to memory of 1820 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 86 PID 1044 wrote to memory of 1672 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 87 PID 1044 wrote to memory of 1672 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 87 PID 1044 wrote to memory of 1672 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 87 PID 1044 wrote to memory of 1952 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 88 PID 1044 wrote to memory of 1952 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 88 PID 1044 wrote to memory of 1952 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 88 PID 1044 wrote to memory of 4740 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 89 PID 1044 wrote to memory of 4740 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 89 PID 1044 wrote to memory of 4740 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 89 PID 1044 wrote to memory of 4780 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 90 PID 1044 wrote to memory of 4780 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 90 PID 1044 wrote to memory of 4780 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 90 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 91 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 91 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 91 PID 1044 wrote to memory of 5076 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 92 PID 1044 wrote to memory of 5076 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 92 PID 1044 wrote to memory of 5076 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 92 PID 1044 wrote to memory of 3424 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 93 PID 1044 wrote to memory of 3424 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 93 PID 1044 wrote to memory of 3424 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 93 PID 1044 wrote to memory of 4852 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 94 PID 1044 wrote to memory of 4852 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 94 PID 1044 wrote to memory of 4852 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 94 PID 1044 wrote to memory of 2184 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 104 PID 1044 wrote to memory of 2184 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 104 PID 1044 wrote to memory of 2184 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 104 PID 1044 wrote to memory of 1052 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 105 PID 1044 wrote to memory of 1052 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 105 PID 1044 wrote to memory of 1052 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 105 PID 1044 wrote to memory of 528 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 108 PID 1044 wrote to memory of 528 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 108 PID 1044 wrote to memory of 528 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 108 PID 1044 wrote to memory of 3768 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 109 PID 1044 wrote to memory of 3768 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 109 PID 1044 wrote to memory of 3768 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 109 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 110 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 110 PID 1044 wrote to memory of 1436 1044 NEAS.9a80d24836f6176ed8ea905836958050.exe 110 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.9a80d24836f6176ed8ea905836958050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NEAS.9a80d24836f6176ed8ea905836958050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.9a80d24836f6176ed8ea905836958050.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.9a80d24836f6176ed8ea905836958050.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.9a80d24836f6176ed8ea905836958050.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1044 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3768
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD560d692aee4bb130e42c34fd601541ef7
SHA14960061adce9f4996ddd772245daa474ddca8357
SHA256aaca8a06a8bc938a3f9b57a91287015c2fff31b6fcad5b44c59189a070c46cf0
SHA512ddde27ac965a3332f092060010d886d8c9d91f8d8fb4452192d9b02ab0efa253f40e289c8ad6aab028fc769493b948585886a8f90b210f44e45f90de782a1890
-
Filesize
222KB
MD560d692aee4bb130e42c34fd601541ef7
SHA14960061adce9f4996ddd772245daa474ddca8357
SHA256aaca8a06a8bc938a3f9b57a91287015c2fff31b6fcad5b44c59189a070c46cf0
SHA512ddde27ac965a3332f092060010d886d8c9d91f8d8fb4452192d9b02ab0efa253f40e289c8ad6aab028fc769493b948585886a8f90b210f44e45f90de782a1890
-
Filesize
222KB
MD55201b511c2609c3ed704e9871e8c6e76
SHA17fe531c1be9e16ca3c9ba729e99418412e127469
SHA2562f9dc13a936f42ae2eb3d2da1bb5b660a812574a4c9fc6248f9c860ed978a0b6
SHA512d71daf8c3ec055c91df85e817c3d90f672c532d367b3072257a5d902d137655c1a0516704b2a74bda380011ee7dfb67cb2e64c61b8c556380bcbaf74150f84b7
-
Filesize
222KB
MD55201b511c2609c3ed704e9871e8c6e76
SHA17fe531c1be9e16ca3c9ba729e99418412e127469
SHA2562f9dc13a936f42ae2eb3d2da1bb5b660a812574a4c9fc6248f9c860ed978a0b6
SHA512d71daf8c3ec055c91df85e817c3d90f672c532d367b3072257a5d902d137655c1a0516704b2a74bda380011ee7dfb67cb2e64c61b8c556380bcbaf74150f84b7
-
Filesize
222KB
MD572f71b6e20cc8dc75f80519196c97a27
SHA1852a3e991b4a4f20db4098a7e51a2065efec702b
SHA256450cbb08683e9b88d85b4ead4eca086c8d439e27378c63f21757e7bf574a97e4
SHA512bb589d6158de5b536eba37d8256c9a426de3219cc8abc8dd335117b9552058b865342f7f7c2e7b53c695db74c3dd47aa5373600accdcb769563c72cf6fe3c285
-
Filesize
222KB
MD572f71b6e20cc8dc75f80519196c97a27
SHA1852a3e991b4a4f20db4098a7e51a2065efec702b
SHA256450cbb08683e9b88d85b4ead4eca086c8d439e27378c63f21757e7bf574a97e4
SHA512bb589d6158de5b536eba37d8256c9a426de3219cc8abc8dd335117b9552058b865342f7f7c2e7b53c695db74c3dd47aa5373600accdcb769563c72cf6fe3c285
-
Filesize
222KB
MD57b041bdd8ae2aa9cbbd899dae2d2624d
SHA1192f87fc09f9696e73d22a544a49dcfda4defc4b
SHA256978efa7955183d6ce7b0820dd7d2d34fd72721de4e82494525f1396136d586bf
SHA5123094a1d2033da76efbb2bdac5d2ece26ae751fb220ba37c04f71bac20bf0e0e47a132e0523e552cf8b67aab20008779232241fae2c7ded0c253e8270f5e239f4
-
Filesize
222KB
MD57b041bdd8ae2aa9cbbd899dae2d2624d
SHA1192f87fc09f9696e73d22a544a49dcfda4defc4b
SHA256978efa7955183d6ce7b0820dd7d2d34fd72721de4e82494525f1396136d586bf
SHA5123094a1d2033da76efbb2bdac5d2ece26ae751fb220ba37c04f71bac20bf0e0e47a132e0523e552cf8b67aab20008779232241fae2c7ded0c253e8270f5e239f4
-
Filesize
222KB
MD545c8fd93008d50294cf9c453de7a872a
SHA11e6919fad0e65bd9c3765d60bbffc277f5377ae7
SHA25699ee4be46b03d2e58370c17929db9939b62202d13cc940de45aa32944f5aeb75
SHA512223687c216ce4427985705b5b3fd928c12215c2aa938d15a5732f588fd88b34f886af6cbe5a8d8d4a33cc776fe1ba3c3a4fb51d896bedc3a603d8f24be905cdb
-
Filesize
222KB
MD545c8fd93008d50294cf9c453de7a872a
SHA11e6919fad0e65bd9c3765d60bbffc277f5377ae7
SHA25699ee4be46b03d2e58370c17929db9939b62202d13cc940de45aa32944f5aeb75
SHA512223687c216ce4427985705b5b3fd928c12215c2aa938d15a5732f588fd88b34f886af6cbe5a8d8d4a33cc776fe1ba3c3a4fb51d896bedc3a603d8f24be905cdb
-
Filesize
222KB
MD59a80d24836f6176ed8ea905836958050
SHA14a8b2388076edf92bb66cb65a6ab5f28a77a0710
SHA2566dcf54625fee659e41e75ac47bbeeadf172b3447fcc9be02f7db87c1f654cc22
SHA512cda3bf2aee167308148426d283b8eeec0fe1f7426bb338da96a6cae0addd073753cc38328d89cd3968079d4c320d92bc8205a2522c445b0762f7970d8b52269e
-
Filesize
222KB
MD560d692aee4bb130e42c34fd601541ef7
SHA14960061adce9f4996ddd772245daa474ddca8357
SHA256aaca8a06a8bc938a3f9b57a91287015c2fff31b6fcad5b44c59189a070c46cf0
SHA512ddde27ac965a3332f092060010d886d8c9d91f8d8fb4452192d9b02ab0efa253f40e289c8ad6aab028fc769493b948585886a8f90b210f44e45f90de782a1890
-
Filesize
222KB
MD55201b511c2609c3ed704e9871e8c6e76
SHA17fe531c1be9e16ca3c9ba729e99418412e127469
SHA2562f9dc13a936f42ae2eb3d2da1bb5b660a812574a4c9fc6248f9c860ed978a0b6
SHA512d71daf8c3ec055c91df85e817c3d90f672c532d367b3072257a5d902d137655c1a0516704b2a74bda380011ee7dfb67cb2e64c61b8c556380bcbaf74150f84b7
-
Filesize
222KB
MD572f71b6e20cc8dc75f80519196c97a27
SHA1852a3e991b4a4f20db4098a7e51a2065efec702b
SHA256450cbb08683e9b88d85b4ead4eca086c8d439e27378c63f21757e7bf574a97e4
SHA512bb589d6158de5b536eba37d8256c9a426de3219cc8abc8dd335117b9552058b865342f7f7c2e7b53c695db74c3dd47aa5373600accdcb769563c72cf6fe3c285
-
Filesize
222KB
MD57b041bdd8ae2aa9cbbd899dae2d2624d
SHA1192f87fc09f9696e73d22a544a49dcfda4defc4b
SHA256978efa7955183d6ce7b0820dd7d2d34fd72721de4e82494525f1396136d586bf
SHA5123094a1d2033da76efbb2bdac5d2ece26ae751fb220ba37c04f71bac20bf0e0e47a132e0523e552cf8b67aab20008779232241fae2c7ded0c253e8270f5e239f4
-
Filesize
222KB
MD545c8fd93008d50294cf9c453de7a872a
SHA11e6919fad0e65bd9c3765d60bbffc277f5377ae7
SHA25699ee4be46b03d2e58370c17929db9939b62202d13cc940de45aa32944f5aeb75
SHA512223687c216ce4427985705b5b3fd928c12215c2aa938d15a5732f588fd88b34f886af6cbe5a8d8d4a33cc776fe1ba3c3a4fb51d896bedc3a603d8f24be905cdb
-
Filesize
222KB
MD5d1ca769fff262a25395e203c21ce3d1d
SHA1e16282897a55e9e0322dc3c63ef50680826e8d4b
SHA25698bd8c47f90c2e000343013cc9b8199d6d864e1dfc4a0daf0a3fb088b41b755f
SHA5121a64c59fc39862717850d5debbec86dc558eec67f9fbfc7213248e01d230a99eee277dc8f6501e31c1eeaa89cdf3c8e3f1525fff756089ec045c0be0922b3670
-
Filesize
222KB
MD5d1ca769fff262a25395e203c21ce3d1d
SHA1e16282897a55e9e0322dc3c63ef50680826e8d4b
SHA25698bd8c47f90c2e000343013cc9b8199d6d864e1dfc4a0daf0a3fb088b41b755f
SHA5121a64c59fc39862717850d5debbec86dc558eec67f9fbfc7213248e01d230a99eee277dc8f6501e31c1eeaa89cdf3c8e3f1525fff756089ec045c0be0922b3670
-
Filesize
222KB
MD54917b707b24682d1f1000c623ff26827
SHA185077eb4d1cf5f4cbb69cc3f83290e1cac10697c
SHA25639ec21179e9e433948a89eb98322adb6af76387e6723126a723b028b035b6d16
SHA5122faf4d301e7e149ee9e39e89802213685a716efa83d61ede8da58332e872d447c5bd32056e89d7dd8217e787cc505776cd2a7933e35b76aaee62b5996ced15c2
-
Filesize
222KB
MD5aba359f8ff3141424771163a8353b4ee
SHA168d82966a0da38015e4f5f4369aec3e9387e82c0
SHA256399b2a47babe4704bc06b96f2e852dfdaae0e96425b1d3cdedd8b805e2291e14
SHA51212e82a6522e47809751a0c1a96e23193471d933413862f53647bb7d025c8b249cc29e281fb8b1c61e9ba2683ebcc41d642a1886bce5610fbc0020b0fb477393f
-
Filesize
222KB
MD5aba359f8ff3141424771163a8353b4ee
SHA168d82966a0da38015e4f5f4369aec3e9387e82c0
SHA256399b2a47babe4704bc06b96f2e852dfdaae0e96425b1d3cdedd8b805e2291e14
SHA51212e82a6522e47809751a0c1a96e23193471d933413862f53647bb7d025c8b249cc29e281fb8b1c61e9ba2683ebcc41d642a1886bce5610fbc0020b0fb477393f
-
Filesize
222KB
MD5cd89b3b8bd796731b1f2e84e3f7aa7b0
SHA14847daae462de5053e673b09e18bcda6879557d2
SHA25628910f8637e0062a027a70e884c5cc35ae0d56364f90c64cfd3cc166a2c6e74e
SHA5129f6034f0d4c92500b33e954cc9af4576b4a6b963e6580ac47039776d9b6bf6a70d7ea7e88874f323ddf2c635713fd35043d06bf1770b40cdc144a7f9bb488857
-
Filesize
640B
MD55d142e7978321fde49abd9a068b64d97
SHA170020fcf7f3d6dafb6c8cd7a55395196a487bef4
SHA256fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061
SHA5122351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9
-
Filesize
217B
MD5c00d8433fe598abff197e690231531e0
SHA14f6b87a4327ff5343e9e87275d505b9f145a7e42
SHA25652fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e
SHA512a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1