Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 11:58
Behavioral task
behavioral1
Sample
10ff65f6e1cd534ba15eb6e44d9541b4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10ff65f6e1cd534ba15eb6e44d9541b4.exe
Resource
win10v2004-20231215-en
General
-
Target
10ff65f6e1cd534ba15eb6e44d9541b4.exe
-
Size
66KB
-
MD5
10ff65f6e1cd534ba15eb6e44d9541b4
-
SHA1
d5088e7f947a0b0fd86d46b7f65d595115e39484
-
SHA256
3dced41060e1f11558c6538ea4dfcbd6511000d03f23792a45f5f1f3ea5503a2
-
SHA512
f63e3e9a4e50a6adc61706a639b2d91a7f35862ddc2cece5e168d49a29576fa181bfe021420a1ed3cca117f103b2e3c3621aba1afc8c3d0c39c37a6bb2ebee6a
-
SSDEEP
1536:o7OE59Vyzrc8K3WgFtKhJP+tcrVOXKzaJThZfaKhQiSEKNJh:WV5998K3WQ8fjEXKgZfnhfxuh
Malware Config
Signatures
-
Drops file in Drivers directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\SysWOW64\drivers\system32.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe -
Executes dropped EXE 7 IoCs
pid Process 2360 smss.exe 2136 smss.exe 2824 Gaara.exe 1804 smss.exe 1544 Gaara.exe 1652 csrss.exe 2652 smss.exe -
Loads dropped DLL 19 IoCs
pid Process 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 2360 smss.exe 2360 smss.exe 2136 smss.exe 2360 smss.exe 2360 smss.exe 2824 Gaara.exe 2824 Gaara.exe 2824 Gaara.exe 1804 smss.exe 2824 Gaara.exe 1544 Gaara.exe 2824 Gaara.exe 2824 Gaara.exe 1652 csrss.exe 1652 csrss.exe 1652 csrss.exe 2652 smss.exe -
resource yara_rule behavioral1/memory/1720-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2824-93-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1804-128-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1544-134-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1652-146-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0007000000016cfb-174.dat upx behavioral1/memory/1296-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/552-280-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3024-301-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2100-315-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1616-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1704-327-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1704-326-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1616-323-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2008-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/884-312-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/884-311-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3016-307-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/3024-303-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1756-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/552-277-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1628-269-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2900-265-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1948-263-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1948-262-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1756-246-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2360-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000a000000016d0e-191.dat upx behavioral1/memory/292-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/292-187-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1720-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x0007000000016d05-182.dat upx behavioral1/memory/2652-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/2652-178-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1544-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1804-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/files/0x000600000001744e-112.dat upx behavioral1/files/0x00070000000173dc-108.dat upx behavioral1/files/0x0009000000016d16-104.dat upx behavioral1/memory/2360-85-0x00000000006A0000-0x00000000006CA000-memory.dmp upx behavioral1/memory/2136-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral1/memory/1756-336-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\5-1-2024.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\5-1-2024.exe csrss.exe File opened for modification C:\Windows\SysWOW64\5-1-2024.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\SysWOW64\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\SysWOW64\5-1-2024.exe smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\5-1-2024.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe -
Sets desktop wallpaper using registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 10ff65f6e1cd534ba15eb6e44d9541b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe -
Drops file in Windows directory 49 IoCs
description ioc Process File opened for modification C:\Windows\system\mscoree.dll csrss.exe File created C:\Windows\system\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\WBEM\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe Gaara.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\msvbvm60.dll smss.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe File opened for modification C:\Windows\system\mscoree.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\system\mscoree.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe smss.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe csrss.exe File opened for modification C:\Windows\system\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe csrss.exe File created C:\Windows\Fonts\The Kazekage.jpg 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Gaara.exe File created C:\Windows\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe smss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\system\msvbvm60.dll 10ff65f6e1cd534ba15eb6e44d9541b4.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe csrss.exe File created C:\Windows\WBEM\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe Gaara.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe smss.exe File created C:\Windows\WBEM\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe csrss.exe File created C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe 10ff65f6e1cd534ba15eb6e44d9541b4.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe -
Modifies Control Panel 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop 10ff65f6e1cd534ba15eb6e44d9541b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\WallpaperStyle = "2" 10ff65f6e1cd534ba15eb6e44d9541b4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 10ff65f6e1cd534ba15eb6e44d9541b4.exe -
Runs ping.exe 1 TTPs 32 IoCs
pid Process 3024 ping.exe 2744 ping.exe 1032 ping.exe 1724 ping.exe 1916 ping.exe 2980 ping.exe 988 ping.exe 2728 ping.exe 1328 ping.exe 896 ping.exe 2028 ping.exe 572 ping.exe 1932 ping.exe 1860 ping.exe 2124 ping.exe 836 ping.exe 804 ping.exe 2264 ping.exe 2416 ping.exe 932 ping.exe 2240 ping.exe 1516 ping.exe 2580 ping.exe 628 ping.exe 2892 ping.exe 1000 ping.exe 1660 ping.exe 2812 ping.exe 3032 ping.exe 2636 ping.exe 1040 ping.exe 308 ping.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 2360 smss.exe 2136 smss.exe 2824 Gaara.exe 1804 smss.exe 1544 Gaara.exe 1652 csrss.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2360 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 44 PID 1720 wrote to memory of 2360 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 44 PID 1720 wrote to memory of 2360 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 44 PID 1720 wrote to memory of 2360 1720 10ff65f6e1cd534ba15eb6e44d9541b4.exe 44 PID 2360 wrote to memory of 2136 2360 smss.exe 43 PID 2360 wrote to memory of 2136 2360 smss.exe 43 PID 2360 wrote to memory of 2136 2360 smss.exe 43 PID 2360 wrote to memory of 2136 2360 smss.exe 43 PID 2360 wrote to memory of 2824 2360 smss.exe 15 PID 2360 wrote to memory of 2824 2360 smss.exe 15 PID 2360 wrote to memory of 2824 2360 smss.exe 15 PID 2360 wrote to memory of 2824 2360 smss.exe 15 PID 2824 wrote to memory of 1804 2824 Gaara.exe 42 PID 2824 wrote to memory of 1804 2824 Gaara.exe 42 PID 2824 wrote to memory of 1804 2824 Gaara.exe 42 PID 2824 wrote to memory of 1804 2824 Gaara.exe 42 PID 2824 wrote to memory of 1544 2824 Gaara.exe 41 PID 2824 wrote to memory of 1544 2824 Gaara.exe 41 PID 2824 wrote to memory of 1544 2824 Gaara.exe 41 PID 2824 wrote to memory of 1544 2824 Gaara.exe 41 PID 2824 wrote to memory of 1652 2824 Gaara.exe 40 PID 2824 wrote to memory of 1652 2824 Gaara.exe 40 PID 2824 wrote to memory of 1652 2824 Gaara.exe 40 PID 2824 wrote to memory of 1652 2824 Gaara.exe 40 PID 1652 wrote to memory of 2652 1652 csrss.exe 39 PID 1652 wrote to memory of 2652 1652 csrss.exe 39 PID 1652 wrote to memory of 2652 1652 csrss.exe 39 PID 1652 wrote to memory of 2652 1652 csrss.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ff65f6e1cd534ba15eb6e44d9541b4.exe"C:\Users\Admin\AppData\Local\Temp\10ff65f6e1cd534ba15eb6e44d9541b4.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵PID:1704
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵PID:1616
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"2⤵PID:2008
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"2⤵PID:2100
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:804
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1660
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1516
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:308
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1724
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2892
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2744
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1032
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2580
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:988
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2636
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1328
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵PID:1744
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵PID:3028
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:896
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:3024
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2812
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:2728
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1040
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:2264
-
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1916
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2028
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2240
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3032
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:836
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2416
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"1⤵PID:488
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:884
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:3016
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"1⤵PID:3024
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:1792
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:1632
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:552
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"1⤵PID:1296
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"1⤵PID:1628
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"1⤵PID:1948
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe1⤵PID:1756
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1932
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:628
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1860
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2124
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1000
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:932
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:1104
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"1⤵PID:692
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"1⤵PID:668
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe1⤵PID:2900
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2980
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:572
-
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\csrss.exe"1⤵PID:2892
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\Gaara.exe"1⤵PID:292
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652
-
C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"C:\Windows\Fonts\Admin 5 - 1 - 2024\smss.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD56da2d0d24c7760546de2ab2a3cf6b80e
SHA1a96e6df09086c152d44c3ca687e3e8abcf622bb4
SHA25607de90906f1791f3d56b5809c9cab0d6ee3f5f2bb4c88ee407c48cd27305e0ea
SHA512ee54375e7e3d43bd252cf7df293e0f2b6ac3e2d09fe7478f8b218b68440264bd1deb89402fe853960f5b4819799f59861476b69484a623fd680b3dd800d87e9b
-
Filesize
66KB
MD5a07d3e585b426055936688d471bd4110
SHA14b6d6b42093759e02e66068972a8c46822b0f109
SHA256605880c651a8d1155aec85a5dd3e9812d4898e9501e19b4b0f0e697434166795
SHA51269985a732d487500fb1c938f6b24e42e72e21c991681c5b8c67b7eafc17c02030f83a4f91115d93345d18dae825bacc2ecc9feca46150a835510e370b736b901
-
Filesize
66KB
MD5fb6afc6959dab6fa1f51f7f9ee23d761
SHA1d14eb789c83f32aa0403574c18af59be58558a5d
SHA256f3a5fb91bcf08f1a3fbaafd3081b5a70d5f27188f3d8544993b12b2bdd89db0c
SHA512bf921213b5dc4df2c55a389c3684e954aa582c74a9c0489fab68f2dc6e88932c4688acfc02f64c6c656f44ffe612eabc60713da9a130562961ae496cfb609a98
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
66KB
MD5f6b711cf9b2fe4674e5b3d53c60c4c8b
SHA17928b2763d831d941e3734aa5f00e9c387354d82
SHA25662bd9e8209b1278c9c109cf712364d4c31519bcd1c4f19e04d587d1459083cbd
SHA51296fd8f0617e2fc1fef1d154e7020952910d83af8dafefb8db9323ef79b7fb04114a089b95fa78a29b48e75bd45495791312af3fa05d0904ad53d848f04cd7167
-
Filesize
66KB
MD558b6492ef096481a9aad1b97088570f6
SHA1f56801d52dd9cba90ad2a5c0cf0252df5bc96bab
SHA256ac6330fe36746e7d471451cb29deacd942b28cad58a68af325bb564455292007
SHA512bc565dabdc762342261d846f554f60a93c21d38be925a8dbfc08e13790f21c2533f83acf946718b825cd06640d7e13d07e39112c719d4865bb774d599e9cde7b
-
Filesize
66KB
MD5770a7c9de1585a2c986a6ab391d597a8
SHA1f9eb1d9cd9dd33adae9306f604548e73040ebdd6
SHA2569653066635347c3a7c22396332eea610de5a08691b37d507fe3409670f50d071
SHA512e3333c5b5ef827085b80f146d95040d01e50516adb76528c861bcced072085f1dc7c9689daedb6a60c7bb00a443af6aa721c444cc44cd16a196ca41b90cc57da
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606