Analysis
-
max time kernel
137s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe
Resource
win10v2004-20240226-en
General
-
Target
bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe
-
Size
91KB
-
MD5
28471ec318a7e8792c3a81380d6237c3
-
SHA1
3bdf63496de3b6c0ac7a7482907072cc0f643944
-
SHA256
bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772
-
SHA512
3d0834aa2f4842023d77c18b506bc07ab3eac9ca1200f9ae4aa9d5da916725db77e69b042aca1e249c5490e1c69df86bbae3a3acd1cc69b6ea23bffe5a46393c
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3Imu/au23gRYjXbUeHORIQ:uT3OA3+KQsxfS4RvT3OA3+KQsxfS46
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 14 IoCs
pid Process 2688 xk.exe 3356 IExplorer.exe 1876 WINLOGON.EXE 920 CSRSS.EXE 636 xk.exe 1956 IExplorer.exe 5004 WINLOGON.EXE 3728 CSRSS.EXE 4040 SERVICES.EXE 556 LSASS.EXE 1636 SMSS.EXE 2680 SERVICES.EXE 4492 LSASS.EXE 3436 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification F:\desktop.ini bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created F:\desktop.ini bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened for modification C:\desktop.ini bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created C:\desktop.ini bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\Y: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\Z: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\B: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\E: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\K: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\P: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\T: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\V: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\H: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\I: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\N: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\O: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\R: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\S: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\U: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\G: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\J: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\L: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\M: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\Q: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened (read-only) \??\W: bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created C:\Windows\SysWOW64\shell.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created C:\Windows\SysWOW64\Mig2.scr bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created C:\Windows\SysWOW64\IExplorer.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe File created C:\Windows\xk.exe bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\Desktop\ bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 2688 xk.exe 3356 IExplorer.exe 1876 WINLOGON.EXE 920 CSRSS.EXE 636 xk.exe 1956 IExplorer.exe 5004 WINLOGON.EXE 3728 CSRSS.EXE 4040 SERVICES.EXE 556 LSASS.EXE 1636 SMSS.EXE 2680 SERVICES.EXE 4492 LSASS.EXE 3436 SMSS.EXE -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 960 wrote to memory of 2688 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 88 PID 960 wrote to memory of 2688 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 88 PID 960 wrote to memory of 2688 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 88 PID 960 wrote to memory of 3356 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 89 PID 960 wrote to memory of 3356 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 89 PID 960 wrote to memory of 3356 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 89 PID 960 wrote to memory of 1876 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 90 PID 960 wrote to memory of 1876 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 90 PID 960 wrote to memory of 1876 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 90 PID 960 wrote to memory of 920 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 91 PID 960 wrote to memory of 920 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 91 PID 960 wrote to memory of 920 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 91 PID 960 wrote to memory of 636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 92 PID 960 wrote to memory of 636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 92 PID 960 wrote to memory of 636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 92 PID 960 wrote to memory of 1956 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 93 PID 960 wrote to memory of 1956 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 93 PID 960 wrote to memory of 1956 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 93 PID 960 wrote to memory of 5004 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 94 PID 960 wrote to memory of 5004 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 94 PID 960 wrote to memory of 5004 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 94 PID 960 wrote to memory of 3728 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 96 PID 960 wrote to memory of 3728 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 96 PID 960 wrote to memory of 3728 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 96 PID 960 wrote to memory of 4040 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 98 PID 960 wrote to memory of 4040 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 98 PID 960 wrote to memory of 4040 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 98 PID 960 wrote to memory of 556 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 99 PID 960 wrote to memory of 556 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 99 PID 960 wrote to memory of 556 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 99 PID 960 wrote to memory of 1636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 100 PID 960 wrote to memory of 1636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 100 PID 960 wrote to memory of 1636 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 100 PID 960 wrote to memory of 2680 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 112 PID 960 wrote to memory of 2680 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 112 PID 960 wrote to memory of 2680 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 112 PID 960 wrote to memory of 4492 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 113 PID 960 wrote to memory of 4492 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 113 PID 960 wrote to memory of 4492 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 113 PID 960 wrote to memory of 3436 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 114 PID 960 wrote to memory of 3436 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 114 PID 960 wrote to memory of 3436 960 bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe 114 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe"C:\Users\Admin\AppData\Local\Temp\bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:960 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920
-
-
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:636
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3728
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4040
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4492
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3436
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5fd94d5ccab1d27e8e0e300b692e351bd
SHA124792fc5f7b842afd55b6a1702fa7c6ab60c34c3
SHA256ba365287bf6a4500beca8fe4eb627f10b08590129678d9679ff53a95d92622b5
SHA512b3dbf83e84b4bfdaef32474fc6c256b2e93dc27ea0238549a7448b9e3c6ae32d4f6c2af98278b56774220e9f742bffa22dad7db52f69235d394df35d16234813
-
Filesize
91KB
MD5d1ffa74ecdf3f591fffa2956fa242314
SHA13d98ab399e0a0eed7ca4659fc923a809ba15434e
SHA2560a777599795324d1aeece551872662baff6893f436b1eb53e822d28e195e642e
SHA512113734b2aef755556622a12b00b65041040b242d669604ac8c8c74f0c52b4fa6ffb058068094a85ae49454351ff9a8d13ac34a616f82fbefdddececcdf25f428
-
Filesize
91KB
MD505468b55552bff4225b49e4a3174bc9d
SHA1b060f4b09b6b2bfec2949c8a2a7ab5ac16b1e687
SHA2561922ebb22845c8020d8d9e78552730cd592160e44aaef39a21d66c8bb68aff81
SHA5121fc16589fbe0f3d2502883eb8a19e7034e25c040ee3869c94009cd5ce16e8687a52a8e2e661feb8cdc32eaa391f41284b146f1546fec8604e0fab944c42a349f
-
Filesize
91KB
MD5116954520348f4d8e7592a63f6bd89d1
SHA1b7c01b79f56c4606ffa9f21cabc67068f99c0e4b
SHA256967bb41a8a307839a69ff6d56e9f7bcae8a0a50289a2cf2a79cb430445bbbe87
SHA51234d974863e56fb145b94dd46182a3e80123c476d00953b6275301ef7eb4189a11483a6640ecb3b6def7028fb135af98951d3a938f33bc2828490318f3d118528
-
Filesize
91KB
MD5384c9c1d087d121bccd4fb60bcc7a07b
SHA1b77d3d2b4da36646427071f0b7c69fc823c3c09a
SHA2560129d5968060c37e290a60b0bf3c5271a90c65f395b27f4bf3956fa14a3f78eb
SHA512eec642e3e71175fffcd12d36260057cad9b2ede9b46a69724f32621624273bff62cc5f1e20238ff78b6e81e8b1ccb898f5e212cb07dc1b08c80c6832fb91f552
-
Filesize
91KB
MD528471ec318a7e8792c3a81380d6237c3
SHA13bdf63496de3b6c0ac7a7482907072cc0f643944
SHA256bde6b874d59e3f582a28cad6c4b0aa47e7bfcddd1609df1d3e55f365db9ff772
SHA5123d0834aa2f4842023d77c18b506bc07ab3eac9ca1200f9ae4aa9d5da916725db77e69b042aca1e249c5490e1c69df86bbae3a3acd1cc69b6ea23bffe5a46393c
-
Filesize
91KB
MD57a113a8d703e415cacebe43444fc211b
SHA16b49cfba3ba9e464bfb1a5ed52e3fffd512c23a5
SHA25682de07d4233dd8520c0e601cd8659ea90c93ad583b165a2c6d0254872b16193a
SHA5122311596693b36dfb9ac5a6933c8e0241934e31ab68208172f40d81c4809e54d47a7b1271b57d3fc13da62c02a816adf3bbbc18370d5fccefa091a3fd3134e39d
-
Filesize
91KB
MD58a08b46ec403db032d383606a51f2598
SHA17a6876f5ea02fd7232d821c38b226e5d95ef83c1
SHA256e5c6523b1527824b844e394bcaa26eec367b88758b06fd6e7cb6d509916aece5
SHA5129b65f08454bf5b6c12e51ff1d2b839c03bc6597df6e7447aaaadd322300458d7c5b8e82507b491ef47d648ccf1a81c6c302edabbb6f2c1c12e41d23a79f1bc8c
-
Filesize
91KB
MD5f99ae1d98999fedeec2c55e6eb6306d7
SHA15562ef3cefb7508d81321a04fb3e5071235a8241
SHA256faa2b62e77657968bfd884ee3a1e087c557156d3f073057b74f73b085fd169dd
SHA512e61d8762293f3bb588246e2b64815b5b6c1a3dea18e012de52c87d0803252e615fa49418fcb1e38ea68fb19bcfb5eeee9036185ff7a4d45f555a0a23bd701f9e
-
Filesize
91KB
MD5e834d3fc46b6844dafbb1812f02da147
SHA12df9384789df944b5715247e84368c84d38985d0
SHA25653ee2bfddd0de29a14bb9bc9466b36378d2812388111e2560a4254e6432cfbd8
SHA5126bb74a077476499ff0e99bf7122a488f490dc259626a06aa5a49ab7c7f7ffbba148a28523b6258133f6bf0cb4c4ef52c656a0dfd7d571d2b5bdcce810ee34877
-
Filesize
91KB
MD5449593036ef8364907bb8ae487961d70
SHA1094c493e8e953d695091f2b17dd77c9806189c3b
SHA2560d38527e34f41e01e2d4b66ad64533712c63bcafb1de601c5cb4a705a6fae320
SHA51209b0bbf67497205fd73331031f7757715d6783e012e49f2fd8ad38c57808fbf40a54922e3773352ed6b2a22ab3f286f05b951a84dd525d33c3029b38b524c50d
-
Filesize
91KB
MD5e47c5db351dc37b114ca80f21f012a99
SHA1b1fa8fd5aa338bfcd57a28193f83546a02740646
SHA25675c7d26c8b4e7f74e7cbd0c35372f19fafa3c50871018cfe86db2b67c187f1b1
SHA5128839432347ec1377ccff4ca39a1002283be85208c948081dfa299f59b1d322b8398560ff9a7086aeaed781a294825d8d3324091e809bc3f609be9a7665ed5641