Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 13:53
Behavioral task
behavioral1
Sample
NEAS.153594be9a6c68be3db7022731b4d980.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.153594be9a6c68be3db7022731b4d980.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.153594be9a6c68be3db7022731b4d980.exe
-
Size
186KB
-
MD5
153594be9a6c68be3db7022731b4d980
-
SHA1
8f63bf29f59355964cf4eedc09548b4d5618560b
-
SHA256
024da0a726387894a279f81b5028369ceec07ac76ef42eaca126d9f5c0b302be
-
SHA512
2456a6b3125a09d124e330f0ba764533db6896bfed46ced7bf2853f34697dad75c72c6fb74649c2921c5eba00034de501b4a5a840cd6b4dd4ac4304351118342
-
SSDEEP
3072:2/5F/E7tEf0q+F+tYlpJH7iXQNgggHlxDZiYLK5WpklpoutN3:2hF4c7+UWJH7igNgjdFKs+poS5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 9 IoCs
pid Process 4664 xk.exe 2324 IExplorer.exe 3304 WINLOGON.EXE 840 CSRSS.EXE 3120 SERVICES.EXE 5016 LSASS.EXE 4032 SMSS.EXE 4412 Shell.exe 4464 Shell.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe -
resource yara_rule behavioral2/memory/1524-0-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce0-7.dat upx behavioral2/files/0x000a000000022cd1-47.dat upx behavioral2/memory/4664-48-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x000a000000022cd1-49.dat upx behavioral2/files/0x0006000000022ce0-53.dat upx behavioral2/memory/2324-54-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4664-56-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce0-55.dat upx behavioral2/memory/2324-59-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce2-61.dat upx behavioral2/memory/1524-62-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3304-64-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce2-63.dat upx behavioral2/memory/3304-67-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce3-69.dat upx behavioral2/memory/840-70-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce3-71.dat upx behavioral2/memory/840-74-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce4-76.dat upx behavioral2/files/0x0006000000022ce4-78.dat upx behavioral2/memory/3120-77-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3120-81-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce5-83.dat upx behavioral2/files/0x0006000000022ce5-85.dat upx behavioral2/memory/5016-84-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5016-88-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0006000000022ce6-90.dat upx behavioral2/files/0x0006000000022ce6-92.dat upx behavioral2/memory/4032-91-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4032-95-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0008000000022cd9-122.dat upx behavioral2/memory/4412-123-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4412-124-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0008000000022cd9-125.dat upx behavioral2/memory/4464-128-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/1524-129-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\desktop.ini NEAS.153594be9a6c68be3db7022731b4d980.exe File created C:\desktop.ini NEAS.153594be9a6c68be3db7022731b4d980.exe File opened for modification F:\desktop.ini NEAS.153594be9a6c68be3db7022731b4d980.exe File created F:\desktop.ini NEAS.153594be9a6c68be3db7022731b4d980.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\H: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\J: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\Y: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\G: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\N: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\R: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\S: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\U: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\L: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\V: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\X: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\P: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\Q: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\T: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\E: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\I: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\K: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\M: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\O: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\W: NEAS.153594be9a6c68be3db7022731b4d980.exe File opened (read-only) \??\Z: NEAS.153594be9a6c68be3db7022731b4d980.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe NEAS.153594be9a6c68be3db7022731b4d980.exe File created C:\Windows\SysWOW64\shell.exe NEAS.153594be9a6c68be3db7022731b4d980.exe File created C:\Windows\SysWOW64\Mig2.scr NEAS.153594be9a6c68be3db7022731b4d980.exe File created C:\Windows\SysWOW64\IExplorer.exe NEAS.153594be9a6c68be3db7022731b4d980.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe NEAS.153594be9a6c68be3db7022731b4d980.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr NEAS.153594be9a6c68be3db7022731b4d980.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe NEAS.153594be9a6c68be3db7022731b4d980.exe File created C:\Windows\xk.exe NEAS.153594be9a6c68be3db7022731b4d980.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1212 1524 WerFault.exe 85 -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\Desktop\ NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" NEAS.153594be9a6c68be3db7022731b4d980.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile NEAS.153594be9a6c68be3db7022731b4d980.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 4664 xk.exe 2324 IExplorer.exe 3304 WINLOGON.EXE 840 CSRSS.EXE 3120 SERVICES.EXE 5016 LSASS.EXE 4032 SMSS.EXE 4464 Shell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4664 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 90 PID 1524 wrote to memory of 4664 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 90 PID 1524 wrote to memory of 4664 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 90 PID 1524 wrote to memory of 2324 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 91 PID 1524 wrote to memory of 2324 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 91 PID 1524 wrote to memory of 2324 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 91 PID 1524 wrote to memory of 3304 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 92 PID 1524 wrote to memory of 3304 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 92 PID 1524 wrote to memory of 3304 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 92 PID 1524 wrote to memory of 840 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 93 PID 1524 wrote to memory of 840 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 93 PID 1524 wrote to memory of 840 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 93 PID 1524 wrote to memory of 3120 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 94 PID 1524 wrote to memory of 3120 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 94 PID 1524 wrote to memory of 3120 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 94 PID 1524 wrote to memory of 5016 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 95 PID 1524 wrote to memory of 5016 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 95 PID 1524 wrote to memory of 5016 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 95 PID 1524 wrote to memory of 4032 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 96 PID 1524 wrote to memory of 4032 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 96 PID 1524 wrote to memory of 4032 1524 NEAS.153594be9a6c68be3db7022731b4d980.exe 96 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.153594be9a6c68be3db7022731b4d980.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NEAS.153594be9a6c68be3db7022731b4d980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.153594be9a6c68be3db7022731b4d980.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.153594be9a6c68be3db7022731b4d980.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.153594be9a6c68be3db7022731b4d980.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1524 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4664
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3304
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5016
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 9602⤵
- Program crash
PID:1212 -
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"3⤵
- Executes dropped EXE
PID:4412
-
-
C:\Windows\SysWOW64\Shell.exe"C:\Windows\system32\Shell.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1524 -ip 15241⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186KB
MD5e8ef8eb7e4486dcfcf8abf230f8a6e1a
SHA1ea556427b3407eeec86284f053a14c872ac306ec
SHA2562e9be3830d301479982386d9e4c5d503e79c9ffb18cbb03410da9395ab75b667
SHA512afdeb2f75fee40a5ea53b343ffd72926c573f463d40d353e6c518408f0108e94922be5bea2c3cc1d6d5fc91e43eb32e5214a765e5e02e0bd5dfdd10542de3bec
-
Filesize
186KB
MD50c614dcd93853df2061f2abe77273d40
SHA132d2cb270d8d996059dfc12e0b373822675c5187
SHA25629a997996e856518dd4aa42ad640db765dada6611feb3625a8764f8ee2baf87c
SHA51275f0372f163a151cadb1b8de53a8d420efa586893861369ef40faa89b0a9200429dce556eedb67dd46ba876bd6b61882e5c01fdc8f05c1316acbf966f764b350
-
Filesize
186KB
MD5ef7b6838ba6124170c78479f2b4f5ca8
SHA1e4b18bc75c4dfd7d243954ba2387a58fb0b945ba
SHA25638073a9f2c94bb48eae4e88457d8b5fcdfccf610d134309b134d3e1bc85853ac
SHA512e8656e5d48c27fb73d61bbadea2572b57038fc63d75f481d60b7fdffc7ad49fe3c20ee942b8ed59b64e06c4d794c9fca1fe6a92b1959ebd03072be3e8c2110e7
-
Filesize
186KB
MD58d68bd4beff8327842212baef0664100
SHA1be8d1a40865d27f8a124ec711c598997f4734e59
SHA2566c884567fa5c27d9bdce0e08ea171cbf5c6cd1190189860cffceca4a477c906d
SHA51248faba86d091d020d2fd653cf56c6e7869e9f5e31c116bf9b11a7f08ccdb2f3b3a1e7b043a5f0a57c1daaf00a714e8720a1fd88cdf28d8ba046d472047793e77
-
Filesize
186KB
MD5cca13104e639caefc364bad2a8a394f6
SHA1b66c85b1b74a906964415b856b29f56133ae5209
SHA25656f7cbc605c5f432921b80c1fee0537c449838448dc4a6ae093c546fdc21f6db
SHA5128a2c626ceff2f8a212a45c6d37f4c871b900855c73cf48532a8f8adcc25c2ff9312821b8d2ddd93502ff4934f99f483057037b578975bba8230d7094cc7001e6
-
Filesize
186KB
MD5e8ef8eb7e4486dcfcf8abf230f8a6e1a
SHA1ea556427b3407eeec86284f053a14c872ac306ec
SHA2562e9be3830d301479982386d9e4c5d503e79c9ffb18cbb03410da9395ab75b667
SHA512afdeb2f75fee40a5ea53b343ffd72926c573f463d40d353e6c518408f0108e94922be5bea2c3cc1d6d5fc91e43eb32e5214a765e5e02e0bd5dfdd10542de3bec
-
Filesize
186KB
MD50c614dcd93853df2061f2abe77273d40
SHA132d2cb270d8d996059dfc12e0b373822675c5187
SHA25629a997996e856518dd4aa42ad640db765dada6611feb3625a8764f8ee2baf87c
SHA51275f0372f163a151cadb1b8de53a8d420efa586893861369ef40faa89b0a9200429dce556eedb67dd46ba876bd6b61882e5c01fdc8f05c1316acbf966f764b350
-
Filesize
186KB
MD5ef7b6838ba6124170c78479f2b4f5ca8
SHA1e4b18bc75c4dfd7d243954ba2387a58fb0b945ba
SHA25638073a9f2c94bb48eae4e88457d8b5fcdfccf610d134309b134d3e1bc85853ac
SHA512e8656e5d48c27fb73d61bbadea2572b57038fc63d75f481d60b7fdffc7ad49fe3c20ee942b8ed59b64e06c4d794c9fca1fe6a92b1959ebd03072be3e8c2110e7
-
Filesize
186KB
MD58d68bd4beff8327842212baef0664100
SHA1be8d1a40865d27f8a124ec711c598997f4734e59
SHA2566c884567fa5c27d9bdce0e08ea171cbf5c6cd1190189860cffceca4a477c906d
SHA51248faba86d091d020d2fd653cf56c6e7869e9f5e31c116bf9b11a7f08ccdb2f3b3a1e7b043a5f0a57c1daaf00a714e8720a1fd88cdf28d8ba046d472047793e77
-
Filesize
186KB
MD5cca13104e639caefc364bad2a8a394f6
SHA1b66c85b1b74a906964415b856b29f56133ae5209
SHA25656f7cbc605c5f432921b80c1fee0537c449838448dc4a6ae093c546fdc21f6db
SHA5128a2c626ceff2f8a212a45c6d37f4c871b900855c73cf48532a8f8adcc25c2ff9312821b8d2ddd93502ff4934f99f483057037b578975bba8230d7094cc7001e6
-
Filesize
186KB
MD56e4b9cca570ac6a73a97e1793d6a56f7
SHA11000e1c10ae1a8209023af82a876ecfeb9e236cf
SHA25642fee03da724edffbca61af635c799e27ca44d9db80afc08d0a0faea023f46ae
SHA51224fc0e50c671443f30e415285de0f704f5449527e0f63dba249def68f95107c698a42f1a17d133dbed9d2df02409e076e7a6abe49e753c93f1c395f1c97fe02f
-
Filesize
186KB
MD56e4b9cca570ac6a73a97e1793d6a56f7
SHA11000e1c10ae1a8209023af82a876ecfeb9e236cf
SHA25642fee03da724edffbca61af635c799e27ca44d9db80afc08d0a0faea023f46ae
SHA51224fc0e50c671443f30e415285de0f704f5449527e0f63dba249def68f95107c698a42f1a17d133dbed9d2df02409e076e7a6abe49e753c93f1c395f1c97fe02f
-
Filesize
186KB
MD5153594be9a6c68be3db7022731b4d980
SHA18f63bf29f59355964cf4eedc09548b4d5618560b
SHA256024da0a726387894a279f81b5028369ceec07ac76ef42eaca126d9f5c0b302be
SHA5122456a6b3125a09d124e330f0ba764533db6896bfed46ced7bf2853f34697dad75c72c6fb74649c2921c5eba00034de501b4a5a840cd6b4dd4ac4304351118342
-
Filesize
186KB
MD5c86f8cb5f33e41bfe29c1415e936dc1b
SHA14d3112bcb79ac5f9f8b0f818b9c3ff6ee9545518
SHA256d63757c77ff83a02dec11f487b80ebedc3d669892a734718782e9c429df6fc78
SHA512de7d147410070af9ecaebf1a608a4778587b8ca0043acb4e18c0d71ef8f4351ab137fdb408217aad8de88b933831bf24ee1fe91b4d6376e4a1f45335fe15c2a2
-
Filesize
186KB
MD5c86f8cb5f33e41bfe29c1415e936dc1b
SHA14d3112bcb79ac5f9f8b0f818b9c3ff6ee9545518
SHA256d63757c77ff83a02dec11f487b80ebedc3d669892a734718782e9c429df6fc78
SHA512de7d147410070af9ecaebf1a608a4778587b8ca0043acb4e18c0d71ef8f4351ab137fdb408217aad8de88b933831bf24ee1fe91b4d6376e4a1f45335fe15c2a2
-
Filesize
186KB
MD5d50a8f7904337ca9740e49ea6813ee15
SHA1392062c741b1916e8c7c6fd38891e1cead7e1fbc
SHA256783a0fb5edb0c700f63c92bceb33ec5b8f31e2874d1584e9b112b3281daae158
SHA512ceafa0cb35f978b10bbde5b2a3cb508897fd1ef6c89714272b430bd8627a24f480f38d3c6addc2ae73e8bbaad2b1fad3c1e5b806088d851d0c9cbd9044bea999
-
Filesize
186KB
MD5d50a8f7904337ca9740e49ea6813ee15
SHA1392062c741b1916e8c7c6fd38891e1cead7e1fbc
SHA256783a0fb5edb0c700f63c92bceb33ec5b8f31e2874d1584e9b112b3281daae158
SHA512ceafa0cb35f978b10bbde5b2a3cb508897fd1ef6c89714272b430bd8627a24f480f38d3c6addc2ae73e8bbaad2b1fad3c1e5b806088d851d0c9cbd9044bea999