Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 23:19
Behavioral task
behavioral1
Sample
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Resource
win10v2004-20240508-en
General
-
Target
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
-
Size
91KB
-
MD5
dc09afef309993489dc3cfa2b0a479e9
-
SHA1
82fcde0622647fcc9288ac271759758a6b12df87
-
SHA256
6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292
-
SHA512
e7f1b2c55d7008ada01131316cfc8947afc7fc52c4c6720f198579739d27e40c19d05aca232c4f06b0cb7f9e69554dd8eaeeaf5a50c02ae383abee539ec7bf8b
-
SSDEEP
1536:ERsjdf1aM67v32Z9x5nouy8VTCRsjdf1aM67v32Z9x5nouy8VTF:EOaHv3YpoutNCOaHv3YpoutNF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/3180-0-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233d3-8.dat UPX behavioral2/files/0x00070000000233d7-106.dat UPX behavioral2/files/0x00070000000233db-111.dat UPX behavioral2/memory/3388-113-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/2496-118-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233dd-119.dat UPX behavioral2/memory/1208-121-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233de-127.dat UPX behavioral2/memory/1208-126-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/2384-133-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233df-134.dat UPX behavioral2/memory/4596-136-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233e0-142.dat UPX behavioral2/memory/4596-141-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/4560-145-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/4560-148-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x00070000000233e1-150.dat UPX behavioral2/memory/4612-155-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/3180-157-0x0000000000400000-0x000000000042F000-memory.dmp UPX -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3388 xk.exe 2496 IExplorer.exe 1208 WINLOGON.EXE 2384 CSRSS.EXE 4596 SERVICES.EXE 4560 LSASS.EXE 4612 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
resource yara_rule behavioral2/memory/3180-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233d3-8.dat upx behavioral2/files/0x00070000000233d7-106.dat upx behavioral2/files/0x00070000000233db-111.dat upx behavioral2/memory/3388-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2496-118-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233dd-119.dat upx behavioral2/memory/1208-121-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233de-127.dat upx behavioral2/memory/1208-126-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2384-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233df-134.dat upx behavioral2/memory/4596-136-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233e0-142.dat upx behavioral2/memory/4596-141-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4560-145-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4560-148-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233e1-150.dat upx behavioral2/memory/4612-155-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3180-157-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\SysWOW64\shell.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\SysWOW64\Mig2.scr 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\SysWOW64\IExplorer.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe File created C:\Windows\xk.exe 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 3388 xk.exe 2496 IExplorer.exe 1208 WINLOGON.EXE 2384 CSRSS.EXE 4596 SERVICES.EXE 4560 LSASS.EXE 4612 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3388 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 82 PID 3180 wrote to memory of 3388 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 82 PID 3180 wrote to memory of 3388 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 82 PID 3180 wrote to memory of 2496 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 83 PID 3180 wrote to memory of 2496 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 83 PID 3180 wrote to memory of 2496 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 83 PID 3180 wrote to memory of 1208 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 84 PID 3180 wrote to memory of 1208 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 84 PID 3180 wrote to memory of 1208 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 84 PID 3180 wrote to memory of 2384 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 85 PID 3180 wrote to memory of 2384 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 85 PID 3180 wrote to memory of 2384 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 85 PID 3180 wrote to memory of 4596 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 87 PID 3180 wrote to memory of 4596 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 87 PID 3180 wrote to memory of 4596 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 87 PID 3180 wrote to memory of 4560 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 88 PID 3180 wrote to memory of 4560 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 88 PID 3180 wrote to memory of 4560 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 88 PID 3180 wrote to memory of 4612 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 90 PID 3180 wrote to memory of 4612 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 90 PID 3180 wrote to memory of 4612 3180 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe 90 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe"C:\Users\Admin\AppData\Local\Temp\6ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3180 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5078ee9939270cbf1a0a76b98c12168b9
SHA1973c6ca30fd8e7cf9e217af33b3c9783f5234fc6
SHA256646f96d5875b2b0e839ca08803eb6cc74024335f80db3ea25d75f9d736cd3a63
SHA51295a83fc7705021d6576f82133a1701359ea72f2a7b582160d3f5e1916c2c1cd03b4672603c84d80c74e0ce653adb1239fe380b287e430e1820d7c159cd922b75
-
Filesize
91KB
MD53197c18402b3121a091383523530901f
SHA13e2998cbb82b68fc1d4e914f9ebdf09862161b34
SHA25699781242b85569c351c9a8da2ffa27848f8c1fa74a37442f58f68b66cdb0ea3f
SHA512893143285b99451f698a040a12f2d91537afb65fb43a46bddafdb1a3cdb8be7fe956de2d135d91aed599b2ad1e78e783f974eb6143b5ac044827ab523db8064c
-
Filesize
91KB
MD591613bae76c1107392e6eb6b31e44678
SHA167c50b5467c75b54cd05628f89066bfe467891d6
SHA2560b1a5eea3dd2dd0e8915ae9b19702936cf8367cca7a1b957bfbc00a7eff046e4
SHA512e28fd771f29dfd815b405b6580589bc85d9252ed4e79b1c6987469c89a610ed14cfa28a4affb7fd2711bf4866ac634c59d34f03640f59a4c4e3d0ccbafa8c944
-
Filesize
91KB
MD5bc741698748e700892957a4e857bfd10
SHA1c9ec7377c1c60cdeb93d0765ac04a2df500c727c
SHA2568543fb386d22ed7c211caaa96f18509ca1bd63a40a7625e0047f70f946677315
SHA512750b3543cb57ef51c2d7373acb995953540a092f88cf9050813544e1571e462c08c6621947e1894e5b8ddf031b678bf5be1ac4c30a12dedbef752fc7e054188c
-
Filesize
91KB
MD5b7a119b486522d54ea20c89b52d6a30a
SHA1608eda06850158565d3d67e726446118a52fa543
SHA256d77c7e7f2b341a21dde10b524a4d642096849b3d5ffe221229a726cb40536fe3
SHA512bef9e1d42e34f27983fc7a5a49cd4d03f0bb619f20672d9013e14ab56e0fe468a59c7beb663c17a64f56348630fd04d26abaf1a61f1fb4ec509144cd94d9dc25
-
Filesize
91KB
MD5dc09afef309993489dc3cfa2b0a479e9
SHA182fcde0622647fcc9288ac271759758a6b12df87
SHA2566ef07017f90f3c13a00d3f00ba78f46a937182fdc601a4633a6458c93de8c292
SHA512e7f1b2c55d7008ada01131316cfc8947afc7fc52c4c6720f198579739d27e40c19d05aca232c4f06b0cb7f9e69554dd8eaeeaf5a50c02ae383abee539ec7bf8b
-
Filesize
91KB
MD57b699ab1bc64b158eff2d9e3848d8a28
SHA1a5cf441829fcdf18adc11d5f231be35b7410438c
SHA2567cca3273de30b5fff4b3c609e8711b1bfb6142783be4dd3b34906eb45c4313fc
SHA512edb599811444b8f03a67aba06525bd1b57c11ff293ccd318e922a93bd55879b029caba23310c236f0f4dadaa5072c232386aa63e450ffb7b838d2d36977ee8ab
-
Filesize
91KB
MD55116e4032f94653c6fdb0e73e1cc0a6e
SHA17cf788356115d19adfa05cbc1d90f6a48bb8ffa2
SHA2565076a430a5dc267d206891aabddc41a847e9182f5aead2eaf9cc0bb0d7be97f4
SHA512f3c1882ce93b4f7f47cecdc1bd5252681eeba6cb42004fbc8d9a78ce6ef43f8b01e8b8be4f48219c2f7f5a417efed0164c16eba9056ca1ea728be3a3bb931211