Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Resource
win10v2004-20240412-en
General
-
Target
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
-
Size
45KB
-
MD5
f4dc5ff155bea6cac06d9bd22afcd892
-
SHA1
65de87ea390aff2005c44c664dd6ad401af0b798
-
SHA256
b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70
-
SHA512
49a948dab7767a7df7f825bf16c965fcc9739d71fe70f04f97484511e9e59e9d83f7d1af3075ca8de7ff94ce8e80f478c7375e52e9c4c18f0aa473c1c7be88eb
-
SSDEEP
768:xmFQj8rM9whcqet8Wfxd9Mmnfa+TAOBJgZiPGyilSniJO14ktp7DFK+5nEn1:zAwEmBZ04faWmtN4nic+6G1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Detects executables built or packed with MPress PE compressor 18 IoCs
resource yara_rule behavioral2/memory/3016-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233ee-8.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233f2-107.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/5088-110-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233f6-112.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4696-116-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233f8-118.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3980-120-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3980-123-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233f9-125.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3548-129-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233fa-131.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3036-135-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233fb-137.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2300-143-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x00070000000233fc-144.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3704-147-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3016-148-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 5088 xk.exe 4696 IExplorer.exe 3980 WINLOGON.EXE 3548 CSRSS.EXE 3036 SERVICES.EXE 2300 LSASS.EXE 3704 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mig2.scr b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\Windows\SysWOW64\shell.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\SysWOW64\shell.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\SysWOW64\Mig2.scr b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\SysWOW64\IExplorer.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe File created C:\Windows\xk.exe b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\Desktop\ b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 5088 xk.exe 4696 IExplorer.exe 3980 WINLOGON.EXE 3548 CSRSS.EXE 3036 SERVICES.EXE 2300 LSASS.EXE 3704 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3016 wrote to memory of 5088 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 84 PID 3016 wrote to memory of 5088 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 84 PID 3016 wrote to memory of 5088 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 84 PID 3016 wrote to memory of 4696 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 85 PID 3016 wrote to memory of 4696 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 85 PID 3016 wrote to memory of 4696 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 85 PID 3016 wrote to memory of 3980 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 86 PID 3016 wrote to memory of 3980 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 86 PID 3016 wrote to memory of 3980 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 86 PID 3016 wrote to memory of 3548 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 87 PID 3016 wrote to memory of 3548 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 87 PID 3016 wrote to memory of 3548 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 87 PID 3016 wrote to memory of 3036 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 88 PID 3016 wrote to memory of 3036 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 88 PID 3016 wrote to memory of 3036 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 88 PID 3016 wrote to memory of 2300 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 90 PID 3016 wrote to memory of 2300 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 90 PID 3016 wrote to memory of 2300 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 90 PID 3016 wrote to memory of 3704 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 91 PID 3016 wrote to memory of 3704 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 91 PID 3016 wrote to memory of 3704 3016 b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe 91 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe"C:\Users\Admin\AppData\Local\Temp\b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3016 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3548
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3704
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52276cf79391b64a479b32df415708903
SHA17d164eff317428059849efb7b96722f761065f8c
SHA256a1a1ecf164cf07c48d0caada8ac945a64fd4f477ddd93749110c87b691659eb2
SHA51259653bf9adaa4a45fbd41bfa9ad91a1198be460c05d2cc3b24328bd8d128dc4d2bc6310f3d8f8caee199d76db392c71964573c1ad6824558f1c2e4dd339ccba8
-
Filesize
45KB
MD50a57fd798aefa28307473c2e69cf3af7
SHA1185fb3f56e499d882a204737c237e39b16113d53
SHA256252e370b58ddb6c708dabe39fe3421c4cedc5fd3be0d341503f6c8a2e1128676
SHA512be81c2faec6acfca151a453f0d8796868aac1ed48136e60844749ee2b7c7e9d0d2939561dce6ee0bb7b88dfec498cb7421c8cf76e3279a411abf4f14e6f0e538
-
Filesize
45KB
MD503ca636befce04afab8ce2ad10379769
SHA17d3695f49c6a99e9b51dbd8e268a4c871e40f9ca
SHA2569e32fd51858e2185917c8ea7df3a8c18be4f09cbd8fb422a7d5e807d007bb4a0
SHA512b49112f3020fd8bdc8dfb70d97211d849802c1fad2a06c515fdcfb25adbac3cd849d2d642d970ed8b816370c1d1c62eba2375f12bc8f7a503ff75eef8bed1589
-
Filesize
45KB
MD507234c50caf5114528ecdb532964b94a
SHA13cf1d840bdf7413a847a4c034a184bcf8fa8062f
SHA256d15faa22f0f32a45b166b664c1847ae202997efdebb437c8e6edd2bb114377b0
SHA512633a9db707fbeff32d26c4c7a498d978842b847016522b12cc0fcae070d6e693eaaa4f9d7e4ebdf268b5ec99503ec1f3a2d73f810e2f1d89cded7e5b5abc13eb
-
Filesize
45KB
MD5f4dc5ff155bea6cac06d9bd22afcd892
SHA165de87ea390aff2005c44c664dd6ad401af0b798
SHA256b27016a1e75e9fa704b08ccb15a6c021bd8e456583c9967bb584d887b315eb70
SHA51249a948dab7767a7df7f825bf16c965fcc9739d71fe70f04f97484511e9e59e9d83f7d1af3075ca8de7ff94ce8e80f478c7375e52e9c4c18f0aa473c1c7be88eb
-
Filesize
45KB
MD58993bf2ae7b4465522966748fea68291
SHA107d6f2d1755488acbba383fb0ae552327b3a034f
SHA256d3ecb9b9cb6385519d045eb488b9418a4a7a0e17c2b4501101b6fbe56e5cbd6c
SHA5127b628c34b1fe1d60e5c86c3c0b64d5074fc78e66c11ee08b7a55c36e24264b8608ecc25e749fa925532fd4e74e00a95a97415f08921078f3fcc78ed42bb5fadc
-
Filesize
45KB
MD5968179a50aa513cffc580793d3b4c93d
SHA18a20d703eab5b81dedbff70601c3dc7c8b4b76d5
SHA2566f9ba0a79bd08467600c4b22df103e6c4a5b784845dd643030cb931ec8f82cc5
SHA51296f691ddcfc4f17eaf8c40a40f543b98b524f9571fcb11fa0016552bea81a7aa4d0b224b54e54c99f040b134e9036a47e373fac1105e4ee1b93b97edb390b375
-
Filesize
45KB
MD5aed35e0930464549215b196fa8b7b5f4
SHA193f8380124316be7db5a9d27b12f8b52ccfd342f
SHA2564c1943e91018beeeaa834036bec958861463365546e853e7a8a00a15291a1978
SHA5124ad863d1aebe200d342b3f57fd3db3d658cea847910ac4f9d1a90d165b7dac0e8144f22bf73ddc04f49fae72e023a96f562f30de186016c71b30b5b3c328ea2f