Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 01:43
Behavioral task
behavioral1
Sample
ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe
Resource
win10v2004-20240226-en
General
-
Target
ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe
-
Size
45KB
-
MD5
a951ce4454e2dcd05bca6e055153f03a
-
SHA1
11e7f89d287425b3c301d4979a2da0bd7902b41a
-
SHA256
ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace
-
SHA512
532cef1746ba8780ff6453f648b0b46225fcf6f61537f312a0cf6c9bec51611fac2ffb8c86ede1678c70d13f17f057a4ccc4a0ad2f0a0bc16fc5361ce6a2ee06
-
SSDEEP
768:ESxam3Usjr3Rf1aqStAjjydOunvvUCxoZ9xMcnbcuyD7UVOQI5nopS:ERsjdf1aM67v32Z9x5nouy8VTw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
UPX dump on OEP (original entry point) 24 IoCs
resource yara_rule behavioral1/memory/1996-0-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0007000000014817-8.dat UPX behavioral1/files/0x0008000000015c6d-108.dat UPX behavioral1/memory/1688-111-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1688-114-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015c9c-113.dat UPX behavioral1/memory/1996-116-0x0000000001DF0000-0x0000000001E1F000-memory.dmp UPX behavioral1/memory/2632-125-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015cad-126.dat UPX behavioral1/memory/1996-134-0x0000000001DF0000-0x0000000001E1F000-memory.dmp UPX behavioral1/memory/2888-136-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015cb9-137.dat UPX behavioral1/memory/1996-144-0x0000000001DF0000-0x0000000001E1F000-memory.dmp UPX behavioral1/memory/1668-147-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015cc1-148.dat UPX behavioral1/memory/1948-155-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1948-158-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015cca-159.dat UPX behavioral1/memory/2208-166-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/2208-170-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/files/0x0006000000015cdb-172.dat UPX behavioral1/memory/1996-177-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1996-181-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral1/memory/1620-180-0x0000000000400000-0x000000000042F000-memory.dmp UPX -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1688 xk.exe 2632 IExplorer.exe 2888 WINLOGON.EXE 1668 CSRSS.EXE 1948 SERVICES.EXE 2208 LSASS.EXE 1620 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
resource yara_rule behavioral1/memory/1996-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000014817-8.dat upx behavioral1/files/0x0008000000015c6d-108.dat upx behavioral1/memory/1688-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1688-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015c9c-113.dat upx behavioral1/memory/1996-116-0x0000000001DF0000-0x0000000001E1F000-memory.dmp upx behavioral1/memory/2632-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015cad-126.dat upx behavioral1/memory/1996-134-0x0000000001DF0000-0x0000000001E1F000-memory.dmp upx behavioral1/memory/2888-136-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015cb9-137.dat upx behavioral1/memory/1996-144-0x0000000001DF0000-0x0000000001E1F000-memory.dmp upx behavioral1/memory/1668-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015cc1-148.dat upx behavioral1/memory/1948-155-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1948-158-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015cca-159.dat upx behavioral1/memory/2208-166-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2208-170-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0006000000015cdb-172.dat upx behavioral1/memory/1996-177-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1996-181-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1620-180-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File created C:\Windows\SysWOW64\shell.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File created C:\Windows\SysWOW64\Mig2.scr ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File created C:\Windows\SysWOW64\IExplorer.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe File created C:\Windows\xk.exe ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 1688 xk.exe 2632 IExplorer.exe 2888 WINLOGON.EXE 1668 CSRSS.EXE 1948 SERVICES.EXE 2208 LSASS.EXE 1620 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1688 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 28 PID 1996 wrote to memory of 1688 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 28 PID 1996 wrote to memory of 1688 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 28 PID 1996 wrote to memory of 1688 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 28 PID 1996 wrote to memory of 2632 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 29 PID 1996 wrote to memory of 2632 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 29 PID 1996 wrote to memory of 2632 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 29 PID 1996 wrote to memory of 2632 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 29 PID 1996 wrote to memory of 2888 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 30 PID 1996 wrote to memory of 2888 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 30 PID 1996 wrote to memory of 2888 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 30 PID 1996 wrote to memory of 2888 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 30 PID 1996 wrote to memory of 1668 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 31 PID 1996 wrote to memory of 1668 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 31 PID 1996 wrote to memory of 1668 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 31 PID 1996 wrote to memory of 1668 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 31 PID 1996 wrote to memory of 1948 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 32 PID 1996 wrote to memory of 1948 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 32 PID 1996 wrote to memory of 1948 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 32 PID 1996 wrote to memory of 1948 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 32 PID 1996 wrote to memory of 2208 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 33 PID 1996 wrote to memory of 2208 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 33 PID 1996 wrote to memory of 2208 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 33 PID 1996 wrote to memory of 2208 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 33 PID 1996 wrote to memory of 1620 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 34 PID 1996 wrote to memory of 1620 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 34 PID 1996 wrote to memory of 1620 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 34 PID 1996 wrote to memory of 1620 1996 ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe 34 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe"C:\Users\Admin\AppData\Local\Temp\ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1996 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5a951ce4454e2dcd05bca6e055153f03a
SHA111e7f89d287425b3c301d4979a2da0bd7902b41a
SHA256ae9e7531e4fd8f423474a6287803b1fc650bac0e95418df24bd6b439f6dcbace
SHA512532cef1746ba8780ff6453f648b0b46225fcf6f61537f312a0cf6c9bec51611fac2ffb8c86ede1678c70d13f17f057a4ccc4a0ad2f0a0bc16fc5361ce6a2ee06
-
Filesize
45KB
MD535db0f8ed6b6e58a4458210981132f82
SHA115dfd4551f2fe12483f51636f025fa686b50ea39
SHA256cfe3c377a5b2b0209d123952b626ad856bf6dd6a87dcab6f4c74f6bd274e9e31
SHA512af786f79669e67ecba534d05bcbbdb8322851228ace4d7f849dd610780647a36822b7e672b27102774731c497a18ba9f74d1ad302c09ad394f863a1f64aee3e7
-
Filesize
45KB
MD5cd89f46cf5f38c0e1c3062f38773110e
SHA19292b1eb11bf03a94fea76caac02fb4b7ee1f344
SHA2569849750d9a5092e093595d63811115cbb6dd843230d819b8bf04a6a1e7beded0
SHA512f9043122fda84b7106cc1d51d51d621fdfc1a59a8d7e8ade78aeb9403cb91a256618d753444e7b5ffa46eede38973863d3e4819f3d6f032128da1d99cb8c7c80
-
Filesize
45KB
MD5cc1412ec80c46e72940932c5ee623972
SHA149cf60c67623a1d537710f1956e8f2a059a8c2c3
SHA256e38a3ce46075201a306c920243f69314b8cc552fb87466617fb83d67888e9963
SHA512fd9d6e41b02d33dcb4a00f373443ea0d6925bd9272098707874dac110050fe7d06eb09b3c1dfa4fd21a9d5bebf87bde1380eeb58af7e555246e6405b9184359a
-
Filesize
45KB
MD506e170605dd615e10916b93d9938d078
SHA15c1ec0dccc620823de028464522fe96e8689c2a0
SHA25672f313a935f8486467786f4852edc56896029ba599271ae378616daf70d53553
SHA5122eb5b68c3cf73564410b42a5fed9b24bf2183dbdbd2b8fcf0839c8494c27e59c3199186996f9f1d657dfe0e1a143a6324bea8e75159b7f6e499c0c6313b1f684
-
Filesize
45KB
MD56e1359cdb256129bf6e1639711b6d9cc
SHA10b6e237a95b697c5937831e9eee7101c65219e79
SHA25640cc0771823fcdce7191ef1d86d5abd981f899f94de68001d9349cc904a4acc9
SHA51282ab9eda13e32962f6242be8d8899797cebae62c960642432f397a5ed8dca0a1f506aa7efc7b67b44be48f5f9b0bb53be1e0c95eeacc0a560ecd0eaaa9ff7970
-
Filesize
45KB
MD575258b5a1d5fe7232557fec4be3b602f
SHA17763fe2c813b6e1f9f0aa67bb3f66eeff94c8f74
SHA256a7bf2fadae47b905da2da7ac0b161407ca213b12ad16b6f169a8c7bea7d7c2ff
SHA512487cb2792fa0dd2d198735df56c3e3ade2334411a9d317c1dee645d44c1d6ab46061775201a422dba32e173b1cc977508b70743f8aa8ec6e1e6e99d4ddee5912
-
Filesize
45KB
MD538c0e0efb35cb1b5e9c4a960db926888
SHA1095cdc4ed91bdd9a8cbdc06cea3645d4cdcdc0a8
SHA256863e40a33e31f380d2e4f889a489483c3cee3ad002ff0f337a57713ed9c5f1b3
SHA5128715c82664c49a2514a92470abf914e4c42f0de601cce7f71b8d808cdef376ae7e83255ebbae8a32b7dab99725a2a7bf66be4e2d777c43e2feb3fdd89ca8c4c6