Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2023 13:13
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe
-
Size
320KB
-
MD5
95fcb8fc834ab0533585cfa629d87d20
-
SHA1
b3a360c6a85e406acfb7a148002851fb92d364c8
-
SHA256
62a8bc447f1a3bf65e81a54a5d4b42fe109d2b57b012c0e4bef9e0734f059ec0
-
SHA512
0f4439ba95ce4b10e7e26c94cd75d0ff87111df7dec81f741df34efd5f6eb2c4c141758b29a7446bda57abcb59854f31277720cbd853e6cc647a076e36a5112a
-
SSDEEP
3072:D7TQlatyYePxiFVJ7TQlatyYePxiFVl7TQlatyYePxiFVL7TQlatyYePxiFVB7TJ:3TQt8JTQt8VTQt8vTQt8RTQt8XTQtY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe -
Executes dropped EXE 30 IoCs
pid Process 1948 smss.exe 180 smss.exe 2220 Gaara.exe 4536 smss.exe 4748 Gaara.exe 3144 csrss.exe 3732 smss.exe 1036 Gaara.exe 4092 csrss.exe 3440 Kazekage.exe 3564 smss.exe 4136 Gaara.exe 4540 csrss.exe 4256 Kazekage.exe 1640 system32.exe 2824 smss.exe 4044 Gaara.exe 3948 csrss.exe 536 Kazekage.exe 4344 system32.exe 2280 system32.exe 4868 Gaara.exe 1384 Kazekage.exe 3276 csrss.exe 2624 system32.exe 3864 Kazekage.exe 1184 csrss.exe 1940 system32.exe 2772 Kazekage.exe 836 system32.exe -
Loads dropped DLL 18 IoCs
pid Process 1948 smss.exe 180 smss.exe 2220 Gaara.exe 4536 smss.exe 4748 Gaara.exe 3144 csrss.exe 3732 smss.exe 1036 Gaara.exe 4092 csrss.exe 3564 smss.exe 4136 Gaara.exe 4540 csrss.exe 2824 smss.exe 4044 Gaara.exe 3948 csrss.exe 4868 Gaara.exe 3276 csrss.exe 1184 csrss.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 22 - 10 - 2023\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "22-10-2023.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 22 - 10 - 2023\\smss.exe" system32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification \??\G:\Desktop.ini system32.exe File opened for modification \??\X:\Desktop.ini system32.exe File opened for modification \??\Y:\Desktop.ini system32.exe File opened for modification \??\A:\Desktop.ini Kazekage.exe File opened for modification \??\S:\Desktop.ini Gaara.exe File opened for modification \??\Y:\Desktop.ini Gaara.exe File opened for modification \??\Z:\Desktop.ini Gaara.exe File opened for modification \??\P:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification D:\Desktop.ini smss.exe File opened for modification \??\M:\Desktop.ini csrss.exe File opened for modification D:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini Kazekage.exe File opened for modification \??\V:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\N:\Desktop.ini smss.exe File opened for modification \??\P:\Desktop.ini smss.exe File opened for modification \??\I:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\G:\Desktop.ini csrss.exe File opened for modification F:\Desktop.ini system32.exe File opened for modification \??\E:\Desktop.ini Kazekage.exe File opened for modification \??\N:\Desktop.ini Kazekage.exe File opened for modification D:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Desktop.ini csrss.exe File opened for modification \??\R:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\H:\Desktop.ini smss.exe File opened for modification \??\Q:\Desktop.ini smss.exe File opened for modification \??\I:\Desktop.ini system32.exe File opened for modification \??\L:\Desktop.ini system32.exe File opened for modification \??\K:\Desktop.ini Kazekage.exe File opened for modification \??\O:\Desktop.ini Gaara.exe File opened for modification \??\E:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\S:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\I:\Desktop.ini csrss.exe File opened for modification \??\J:\Desktop.ini csrss.exe File opened for modification \??\Y:\Desktop.ini csrss.exe File opened for modification \??\N:\Desktop.ini system32.exe File opened for modification \??\P:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini smss.exe File opened for modification D:\Desktop.ini csrss.exe File opened for modification \??\A:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini system32.exe File opened for modification \??\U:\Desktop.ini system32.exe File opened for modification \??\U:\Desktop.ini Gaara.exe File opened for modification \??\X:\Desktop.ini Gaara.exe File opened for modification \??\W:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Desktop.ini Kazekage.exe File opened for modification D:\Desktop.ini Gaara.exe File opened for modification \??\P:\Desktop.ini Gaara.exe File opened for modification \??\W:\Desktop.ini Gaara.exe File opened for modification \??\A:\Desktop.ini smss.exe File opened for modification \??\B:\Desktop.ini csrss.exe File opened for modification \??\J:\Desktop.ini Kazekage.exe File opened for modification \??\I:\Desktop.ini Gaara.exe File opened for modification \??\R:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\Y:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\S:\Desktop.ini csrss.exe File opened for modification \??\K:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini Gaara.exe File opened for modification \??\R:\Desktop.ini Gaara.exe File opened for modification \??\U:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\K:\Desktop.ini smss.exe File opened for modification \??\E:\Desktop.ini Gaara.exe File opened for modification \??\V:\Desktop.ini Kazekage.exe File opened for modification \??\K:\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: Gaara.exe File opened (read-only) \??\I: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\R: Kazekage.exe File opened (read-only) \??\J: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\K: smss.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\O: system32.exe File opened (read-only) \??\E: Gaara.exe File opened (read-only) \??\J: Kazekage.exe File opened (read-only) \??\K: Kazekage.exe File opened (read-only) \??\R: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\L: smss.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\B: Gaara.exe File opened (read-only) \??\M: Gaara.exe File opened (read-only) \??\O: Gaara.exe File opened (read-only) \??\T: smss.exe File opened (read-only) \??\L: Kazekage.exe File opened (read-only) \??\P: Gaara.exe File opened (read-only) \??\S: Gaara.exe File opened (read-only) \??\O: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\S: system32.exe File opened (read-only) \??\H: Kazekage.exe File opened (read-only) \??\H: system32.exe File opened (read-only) \??\P: system32.exe File opened (read-only) \??\Y: system32.exe File opened (read-only) \??\G: Gaara.exe File opened (read-only) \??\Y: Kazekage.exe File opened (read-only) \??\B: Kazekage.exe File opened (read-only) \??\O: Kazekage.exe File opened (read-only) \??\N: Gaara.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\T: Gaara.exe File opened (read-only) \??\W: Kazekage.exe File opened (read-only) \??\Z: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\N: smss.exe File opened (read-only) \??\W: smss.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\H: Gaara.exe File opened (read-only) \??\U: Kazekage.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\V: system32.exe File opened (read-only) \??\L: Gaara.exe File opened (read-only) \??\V: smss.exe File opened (read-only) \??\G: system32.exe File opened (read-only) \??\K: Gaara.exe File opened (read-only) \??\U: Gaara.exe File opened (read-only) \??\A: smss.exe File opened (read-only) \??\B: system32.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\Z: system32.exe File opened (read-only) \??\A: Kazekage.exe File opened (read-only) \??\V: Kazekage.exe File opened (read-only) \??\N: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened (read-only) \??\Q: NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\W:\Autorun.inf csrss.exe File created \??\Y:\Autorun.inf csrss.exe File opened for modification \??\A:\Autorun.inf system32.exe File opened for modification \??\S:\Autorun.inf system32.exe File created D:\Autorun.inf Gaara.exe File opened for modification \??\I:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf Gaara.exe File opened for modification \??\B:\Autorun.inf csrss.exe File opened for modification \??\T:\Autorun.inf system32.exe File opened for modification \??\U:\Autorun.inf Kazekage.exe File opened for modification \??\X:\Autorun.inf system32.exe File created C:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created \??\J:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\H:\Autorun.inf smss.exe File created \??\X:\Autorun.inf smss.exe File created D:\Autorun.inf Kazekage.exe File opened for modification F:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created \??\N:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\L:\Autorun.inf smss.exe File opened for modification \??\U:\Autorun.inf Gaara.exe File created \??\L:\Autorun.inf csrss.exe File opened for modification \??\V:\Autorun.inf Kazekage.exe File opened for modification \??\J:\Autorun.inf smss.exe File created \??\O:\Autorun.inf csrss.exe File opened for modification \??\S:\Autorun.inf Kazekage.exe File created \??\R:\Autorun.inf csrss.exe File opened for modification \??\X:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\B:\Autorun.inf smss.exe File created \??\V:\Autorun.inf smss.exe File opened for modification \??\K:\Autorun.inf csrss.exe File opened for modification \??\Z:\Autorun.inf Gaara.exe File opened for modification D:\Autorun.inf csrss.exe File opened for modification \??\W:\Autorun.inf csrss.exe File created \??\E:\Autorun.inf system32.exe File created \??\U:\Autorun.inf csrss.exe File created \??\X:\Autorun.inf system32.exe File created \??\R:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\Z:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created \??\R:\Autorun.inf Gaara.exe File opened for modification \??\N:\Autorun.inf csrss.exe File created \??\A:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf csrss.exe File created \??\V:\Autorun.inf system32.exe File created \??\U:\Autorun.inf smss.exe File created \??\I:\Autorun.inf Gaara.exe File opened for modification \??\Q:\Autorun.inf Gaara.exe File opened for modification \??\K:\Autorun.inf system32.exe File opened for modification \??\G:\Autorun.inf Kazekage.exe File opened for modification \??\N:\Autorun.inf Kazekage.exe File created \??\Q:\Autorun.inf Kazekage.exe File opened for modification \??\X:\Autorun.inf Kazekage.exe File opened for modification \??\I:\Autorun.inf smss.exe File created \??\E:\Autorun.inf csrss.exe File created \??\H:\Autorun.inf csrss.exe File opened for modification \??\J:\Autorun.inf csrss.exe File opened for modification \??\H:\Autorun.inf Kazekage.exe File created \??\K:\Autorun.inf Kazekage.exe File opened for modification \??\M:\Autorun.inf Kazekage.exe File opened for modification \??\Z:\Autorun.inf system32.exe File opened for modification \??\P:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\Y:\Autorun.inf NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification \??\X:\Autorun.inf Gaara.exe File opened for modification C:\Autorun.inf Kazekage.exe File opened for modification C:\Autorun.inf smss.exe -
Drops file in System32 directory 39 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\22-10-2023.exe csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File created C:\Windows\SysWOW64\22-10-2023.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\22-10-2023.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\SysWOW64\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\22-10-2023.exe system32.exe File created C:\Windows\SysWOW64\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\22-10-2023.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\22-10-2023.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\ NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\22-10-2023.exe smss.exe File created C:\Windows\SysWOW64\mscomctl.ocx NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\The Kazekage.jpg Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File created C:\Windows\WBEM\msvbvm60.dll system32.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe smss.exe File created C:\Windows\WBEM\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\system\msvbvm60.dll system32.exe File opened for modification C:\Windows\ NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\WBEM\msvbvm60.dll smss.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe csrss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe File opened for modification C:\Windows\ Gaara.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\system\mscoree.dll system32.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe system32.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\msvbvm60.dll system32.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe smss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe smss.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\mscomctl.ocx csrss.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe system32.exe File opened for modification C:\Windows\mscomctl.ocx NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\ Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe system32.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe smss.exe File created C:\Windows\Fonts\The Kazekage.jpg NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe csrss.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe system32.exe File opened for modification C:\Windows\system\mscoree.dll Gaara.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File opened for modification C:\Windows\system\mscoree.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\Fonts\Admin 22 - 10 - 2023\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Gaara.exe File opened for modification C:\Windows\ smss.exe File opened for modification C:\Windows\ csrss.exe File opened for modification C:\Windows\Fonts\Admin 22 - 10 - 2023\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File created C:\Windows\system\msvbvm60.dll NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg system32.exe -
Modifies Control Panel 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop csrss.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" csrss.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Size = "72" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Speed = "4" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" system32.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Kazekage.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\Software\Microsoft\Internet Explorer\Main system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-356073083-3299209671-3108880702-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe -
Runs ping.exe 1 TTPs 34 IoCs
pid Process 4584 ping.exe 2300 ping.exe 5056 ping.exe 1820 ping.exe 4368 ping.exe 4560 ping.exe 4492 ping.exe 2628 ping.exe 4228 ping.exe 1820 ping.exe 3548 ping.exe 1524 ping.exe 2128 ping.exe 3688 ping.exe 1256 ping.exe 3516 ping.exe 1588 ping.exe 3196 ping.exe 1292 ping.exe 1904 ping.exe 4516 ping.exe 8 ping.exe 3632 ping.exe 1888 ping.exe 2240 ping.exe 2024 ping.exe 3724 ping.exe 1132 ping.exe 2888 ping.exe 3548 ping.exe 3528 ping.exe 4636 ping.exe 64 ping.exe 2132 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 3144 csrss.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 1640 system32.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 3440 Kazekage.exe 2220 Gaara.exe 3440 Kazekage.exe 2220 Gaara.exe 3440 Kazekage.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4472 NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe 1948 smss.exe 180 smss.exe 2220 Gaara.exe 4536 smss.exe 4748 Gaara.exe 3144 csrss.exe 3732 smss.exe 1036 Gaara.exe 4092 csrss.exe 3440 Kazekage.exe 3564 smss.exe 4136 Gaara.exe 4540 csrss.exe 4256 Kazekage.exe 1640 system32.exe 2824 smss.exe 4044 Gaara.exe 3948 csrss.exe 536 Kazekage.exe 4344 system32.exe 2280 system32.exe 4868 Gaara.exe 1384 Kazekage.exe 3276 csrss.exe 2624 system32.exe 3864 Kazekage.exe 1184 csrss.exe 1940 system32.exe 2772 Kazekage.exe 836 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 1948 4472 NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe 84 PID 4472 wrote to memory of 1948 4472 NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe 84 PID 4472 wrote to memory of 1948 4472 NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe 84 PID 1948 wrote to memory of 180 1948 smss.exe 85 PID 1948 wrote to memory of 180 1948 smss.exe 85 PID 1948 wrote to memory of 180 1948 smss.exe 85 PID 1948 wrote to memory of 2220 1948 smss.exe 88 PID 1948 wrote to memory of 2220 1948 smss.exe 88 PID 1948 wrote to memory of 2220 1948 smss.exe 88 PID 2220 wrote to memory of 4536 2220 Gaara.exe 89 PID 2220 wrote to memory of 4536 2220 Gaara.exe 89 PID 2220 wrote to memory of 4536 2220 Gaara.exe 89 PID 2220 wrote to memory of 4748 2220 Gaara.exe 90 PID 2220 wrote to memory of 4748 2220 Gaara.exe 90 PID 2220 wrote to memory of 4748 2220 Gaara.exe 90 PID 2220 wrote to memory of 3144 2220 Gaara.exe 91 PID 2220 wrote to memory of 3144 2220 Gaara.exe 91 PID 2220 wrote to memory of 3144 2220 Gaara.exe 91 PID 3144 wrote to memory of 3732 3144 csrss.exe 92 PID 3144 wrote to memory of 3732 3144 csrss.exe 92 PID 3144 wrote to memory of 3732 3144 csrss.exe 92 PID 3144 wrote to memory of 1036 3144 csrss.exe 93 PID 3144 wrote to memory of 1036 3144 csrss.exe 93 PID 3144 wrote to memory of 1036 3144 csrss.exe 93 PID 3144 wrote to memory of 4092 3144 csrss.exe 94 PID 3144 wrote to memory of 4092 3144 csrss.exe 94 PID 3144 wrote to memory of 4092 3144 csrss.exe 94 PID 3144 wrote to memory of 3440 3144 csrss.exe 95 PID 3144 wrote to memory of 3440 3144 csrss.exe 95 PID 3144 wrote to memory of 3440 3144 csrss.exe 95 PID 3440 wrote to memory of 3564 3440 Kazekage.exe 96 PID 3440 wrote to memory of 3564 3440 Kazekage.exe 96 PID 3440 wrote to memory of 3564 3440 Kazekage.exe 96 PID 3440 wrote to memory of 4136 3440 Kazekage.exe 97 PID 3440 wrote to memory of 4136 3440 Kazekage.exe 97 PID 3440 wrote to memory of 4136 3440 Kazekage.exe 97 PID 3440 wrote to memory of 4540 3440 Kazekage.exe 98 PID 3440 wrote to memory of 4540 3440 Kazekage.exe 98 PID 3440 wrote to memory of 4540 3440 Kazekage.exe 98 PID 3440 wrote to memory of 4256 3440 Kazekage.exe 99 PID 3440 wrote to memory of 4256 3440 Kazekage.exe 99 PID 3440 wrote to memory of 4256 3440 Kazekage.exe 99 PID 3440 wrote to memory of 1640 3440 Kazekage.exe 100 PID 3440 wrote to memory of 1640 3440 Kazekage.exe 100 PID 3440 wrote to memory of 1640 3440 Kazekage.exe 100 PID 1640 wrote to memory of 2824 1640 system32.exe 101 PID 1640 wrote to memory of 2824 1640 system32.exe 101 PID 1640 wrote to memory of 2824 1640 system32.exe 101 PID 1640 wrote to memory of 4044 1640 system32.exe 102 PID 1640 wrote to memory of 4044 1640 system32.exe 102 PID 1640 wrote to memory of 4044 1640 system32.exe 102 PID 1640 wrote to memory of 3948 1640 system32.exe 103 PID 1640 wrote to memory of 3948 1640 system32.exe 103 PID 1640 wrote to memory of 3948 1640 system32.exe 103 PID 1640 wrote to memory of 536 1640 system32.exe 104 PID 1640 wrote to memory of 536 1640 system32.exe 104 PID 1640 wrote to memory of 536 1640 system32.exe 104 PID 1640 wrote to memory of 4344 1640 system32.exe 105 PID 1640 wrote to memory of 4344 1640 system32.exe 105 PID 1640 wrote to memory of 4344 1640 system32.exe 105 PID 3144 wrote to memory of 2280 3144 csrss.exe 106 PID 3144 wrote to memory of 2280 3144 csrss.exe 106 PID 3144 wrote to memory of 2280 3144 csrss.exe 106 PID 4472 wrote to memory of 4868 4472 NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe 107 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.95fcb8fc834ab0533585cfa629d87d20_JC.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4472 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:180
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2220 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4536
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3144 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3732
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4092
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3440 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4136
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4540
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4256
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1640 -
C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\smss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4044
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4344
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:4368
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:1588
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:3632
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:8
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:5056
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:4228
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2128
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2024
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:4560
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2300
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:4636
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:3196
-
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:3516
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:2132
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:1132
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:3548
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:3528
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:2240
-
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:1820
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:1904
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:2888
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:3548
-
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1256
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:64
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:4516
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1820
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1888
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:3688
-
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4868
-
-
C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 22 - 10 - 2023\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3276
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3864
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1292
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1524
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4584
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3724
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:4492
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD50805397064e4d01d211b37410a1740b0
SHA10df297ad7cf3f824e1894ddb5004c1fe4ba1eef7
SHA256166f66b0733ce272ede4cd975a73f79d21583c8c46b2d58883dd2095c3a3a80d
SHA5124abdb263d39ed195d792ba7d2cd61a14310e6cdd5f631ab4bb0dd7a1d30f708f546cb3b5be35c9b35e4ed8b53d427c967d5df1c95a7227320549c2bbb157fd0a
-
Filesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
Filesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
Filesize
320KB
MD595fcb8fc834ab0533585cfa629d87d20
SHA1b3a360c6a85e406acfb7a148002851fb92d364c8
SHA25662a8bc447f1a3bf65e81a54a5d4b42fe109d2b57b012c0e4bef9e0734f059ec0
SHA5120f4439ba95ce4b10e7e26c94cd75d0ff87111df7dec81f741df34efd5f6eb2c4c141758b29a7446bda57abcb59854f31277720cbd853e6cc647a076e36a5112a
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD529ebecdfb1cef306e2bfa4ed982c8d2b
SHA1210dbb3ec9aeb3a24910559acd9be389689ead4e
SHA256e9d1c37994daf36436b7ed93392e80cf36e0aadeb8755fb525bc20755b4e51ee
SHA5125917d477292b1e850d3a80d0f6177702d836d0a10f3ac4acb5db2b7c1fbdfd5d41a7375d5b4432edf484b89342a165705af99f7f23cfc5e9a708aac3c858232d
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
320KB
MD53f4c9d90fa08cd6b8b5b0582ec00c3cf
SHA13edccd160cf265c0bb0bbdc7ecefc2dc9fc1007d
SHA256ca29ffc719838c9a294b096e973d6e28cb8f334ef65da6b34742cfb058bfb511
SHA512209866765464a13c97b6da629f9d88e970acc7377e5f6cd751f15920d28a93fd8655b6348756d21081596fefaa77347685833ab48beac94da2ed6c4b8491d8ab
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5b8ec16d259895b67142c5bc8bda94013
SHA15aac5228a47e41e0d0404d30f51f3c5307d15e1a
SHA25693a0974a2e2e2a6622b2ab2dd2ec372ff59ffd59d5ab8797a30ebdf21d10e2e8
SHA51269f7d3755ca0980af790abf99ff9c5c67258313f0a687438382e632777c283057f2ac8f97604fe59adfe99fee77b3552ef76c1058b692e68a59237fa287811de
-
Filesize
320KB
MD54411dce5bbc06a56b2cb296a00337b92
SHA18f0ffd33aa8178514a3a13b4fb126ca5a8d4d1d8
SHA256bc7cbcb6e1edbb0cd4ae02d22583c65c13cacf94306069e90746e2738a672665
SHA5127575aae0a0978c9ca5f2448b4c7e0f223f1bc4e0ac0ddb1faa4ae298d45418d7f15bb004c0945ccd3a7ebcc73be9f2dcfef6be7f46aecfdfb2c18fdd7cc59fa7
-
Filesize
320KB
MD566c4eddb3af391b1e3ac569f5e2db757
SHA1cd84ca494b8a27fc4d9ec66a9e45c578d8fb1c0c
SHA256082cdb7ad0c118c539b25fce1d831a4f095bb9c1738fe9ded4b35bfb06b0d54d
SHA5128236d3290e0946bc5ea6921032bc1532c16868a7615329dba9d62c54c86aa0df39a4f7f63dc0053037a8fbd64a7f8d0ae07c31b9685f4bd9d1faf6cd3c8e395a
-
Filesize
320KB
MD5099beda0e522a22fb5039723a1487383
SHA1ef7e6e6d5866590321170fb4efd4c20e0ed80c92
SHA256add86ce8fdbbfdeadd8910f5a3739cfe21cedfa14d97b63e6c94c2b3032c23af
SHA51217965fba78db299f4439574672e79a61dbaade0f1a20ac315abff55a4558c4d57384b6c9064d07f6b4e1baab46b53e1469e7330406a609cd07786bd2ce2a644a
-
Filesize
320KB
MD59e7aedca1d240d5472108e6d09984cf9
SHA1f3db0462758729e80c18cb019a843db94340cbb0
SHA2562767997b6e2d9abe5635d502b4d7bf42d064b94c350947c7eb7ea1a9ac805b9e
SHA51282d1a28c249cf86111f7c1fa928989c5b5355cfe3ea41a123cd9cf40d00aceb90a601be6e00498f736dd46158e7941c4dc22e4a78db02a74abb15805e7886868
-
Filesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
Filesize
320KB
MD5b8ec16d259895b67142c5bc8bda94013
SHA15aac5228a47e41e0d0404d30f51f3c5307d15e1a
SHA25693a0974a2e2e2a6622b2ab2dd2ec372ff59ffd59d5ab8797a30ebdf21d10e2e8
SHA51269f7d3755ca0980af790abf99ff9c5c67258313f0a687438382e632777c283057f2ac8f97604fe59adfe99fee77b3552ef76c1058b692e68a59237fa287811de
-
Filesize
320KB
MD5b8ec16d259895b67142c5bc8bda94013
SHA15aac5228a47e41e0d0404d30f51f3c5307d15e1a
SHA25693a0974a2e2e2a6622b2ab2dd2ec372ff59ffd59d5ab8797a30ebdf21d10e2e8
SHA51269f7d3755ca0980af790abf99ff9c5c67258313f0a687438382e632777c283057f2ac8f97604fe59adfe99fee77b3552ef76c1058b692e68a59237fa287811de
-
Filesize
320KB
MD5b8ec16d259895b67142c5bc8bda94013
SHA15aac5228a47e41e0d0404d30f51f3c5307d15e1a
SHA25693a0974a2e2e2a6622b2ab2dd2ec372ff59ffd59d5ab8797a30ebdf21d10e2e8
SHA51269f7d3755ca0980af790abf99ff9c5c67258313f0a687438382e632777c283057f2ac8f97604fe59adfe99fee77b3552ef76c1058b692e68a59237fa287811de
-
Filesize
320KB
MD5b8ec16d259895b67142c5bc8bda94013
SHA15aac5228a47e41e0d0404d30f51f3c5307d15e1a
SHA25693a0974a2e2e2a6622b2ab2dd2ec372ff59ffd59d5ab8797a30ebdf21d10e2e8
SHA51269f7d3755ca0980af790abf99ff9c5c67258313f0a687438382e632777c283057f2ac8f97604fe59adfe99fee77b3552ef76c1058b692e68a59237fa287811de
-
Filesize
320KB
MD510b5b278f89200e0e389b8813f2c2fb3
SHA119ffacbede7a707c7beb928c36520dab1ad2b355
SHA25690a581c1ca7b6a67c48fd5044e96d8a41865eaab94d2ca0eeb66df43a798f189
SHA512ab7606209b4f4fbdc1e13a311a11f64aaa44aa138ceacc9f1a3a6a5bdb772cf533be5046031aabe64cec936bb41f040fcd37f1e52ac2e73e2d71c1965dac392b
-
Filesize
320KB
MD5ae3124e6da5e220a2d381f1b869f99ba
SHA131f41cdf3b2082c25bec687ef2ad9e9fa7c45fc9
SHA2562baed61c51237fb07d2c27608b80f3261c2e8c07ec44e0887348c8aee12407fb
SHA5121f2f43370bfb9580470da3ef262bfc6ba03099360d9c23069d92d6d8cab45e90b2d729562d2c5349cbf3a2e7f8e364d3ef749ad29c5c9fd49dabbad53c162d50
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5a55007c43d85eeff1b60450b824a288a
SHA19042158ad21378d33760dc23d04fee29a8d87058
SHA25603309cfb6b7aa8f6f47341a73094549902e8c01c8d52aacdb1c8438be0cac73c
SHA512c0038d64f8cdd706b1585fa7b0f26f788742e2b1a81fbdc7c8966772e6bca197f3bf040fa2e6585150031745b0fe9208b35f8f80b17463b27f3a41909dad6f9f
-
Filesize
320KB
MD5e4556f74c6e1dbda4177f355d78468a1
SHA1468b44c5dfd1b2d0988d2292245df405f3e14a1f
SHA256f144c776eb7a3a2c99222ca914bf209abe27b9840e4f102d4e07900db4ec032e
SHA512a4db1df68cf42a2b1bf67af9dae10cd639deda01216f88c1f3317acbcf1ea80c8d882730b1e9416cce2fc611a0d1e97d5689247a7b0b8065740c1c96438cd2ce
-
Filesize
320KB
MD5e4556f74c6e1dbda4177f355d78468a1
SHA1468b44c5dfd1b2d0988d2292245df405f3e14a1f
SHA256f144c776eb7a3a2c99222ca914bf209abe27b9840e4f102d4e07900db4ec032e
SHA512a4db1df68cf42a2b1bf67af9dae10cd639deda01216f88c1f3317acbcf1ea80c8d882730b1e9416cce2fc611a0d1e97d5689247a7b0b8065740c1c96438cd2ce
-
Filesize
320KB
MD5e4556f74c6e1dbda4177f355d78468a1
SHA1468b44c5dfd1b2d0988d2292245df405f3e14a1f
SHA256f144c776eb7a3a2c99222ca914bf209abe27b9840e4f102d4e07900db4ec032e
SHA512a4db1df68cf42a2b1bf67af9dae10cd639deda01216f88c1f3317acbcf1ea80c8d882730b1e9416cce2fc611a0d1e97d5689247a7b0b8065740c1c96438cd2ce
-
Filesize
320KB
MD51a1180599c674edef6d1a8ebd71be547
SHA1fbbfb95adfca94e3623b5e0873c914ec86e494a3
SHA256f09d8c6f2527929118a9681f34cfc4d9b63719f325d66ab4d62c5f5b680fe1d3
SHA512b9eb76a0470d34eb1752844f54d31790cc09f5640c73893cce630549b26d41eef69d889b5e3050b4c913ab1640b2159b8a21288ad85409eb781c93cb4651f5de
-
Filesize
320KB
MD5025ad3740de974f34f5170a6af7eab0a
SHA1f8279b75d219fe1d00531a8b1ba22ecd8bd09172
SHA2568bc98bf5faf9d7bd204d9ce1c1c11a6163b9966b27db1b23a77a3aeea6b6267a
SHA512ccce806e1fee19afb08e343182a4e61745bd655780f16e69a109dc28428826f3f09644ac945c5bfc943b9676648438347013be76c3916f8267895c47d930a33f
-
Filesize
320KB
MD5ea74a2c4efa3667d0a9bc84c93c91c22
SHA1e480d8d5a437509b48325fb952fecbd4bd50b6c3
SHA256df27482f51cbb27c6b440283f1db98adffa31cbb73a626dc6447f1bb30744cc4
SHA512ef35024a092c271c8f32b095e3194a375dd2075cb6a2ae321ec786d72ac78f583f7d79fde727c008bf825c2a5111c0b28c45963b64091ec8f2716c4574936444
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
320KB
MD562e0d30f088d42eda9dfc15d12116db3
SHA14908163915100ac6545a7e8c99f6b5f5dd498495
SHA256699f94d9001d01a73b933e7db554f8a35cf214fc467c55ed5488c352799761d4
SHA5120cea9c31904f308a5fb48f94bd7310f2c6686b9444ea614ac4541a43a2af82b72e9f57373494bcf59bd37d5ca8427539701ba001bcabc515ac59fa6643d8fb16