Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 19:05
Behavioral task
behavioral1
Sample
17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe
Resource
win10v2004-20240508-en
General
-
Target
17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe
-
Size
352KB
-
MD5
cd3ed6798499172d616423023bc3f596
-
SHA1
051788c9c8e3a4d5e42b9ca78a9e4a3e8d8d514a
-
SHA256
17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b
-
SHA512
28cc689e3fd3f35d5a977999b2cbe33cfe8a0a9d76f6a8c9cf591ce951cb119c63779f289779869fc12d8a5bc5e9c61da642f14fc8f86099554f3be5613e4f7f
-
SSDEEP
6144:vIGEnprZkRs38t54c6rzNdfzIGEnprZkRs38t54c6rzNdfI:vxEnAR934nxEnAR934c
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Shell.exe" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Shell.exe\"" Shell.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WlNLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Shell.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Shell.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WlNLOGON.EXE -
UPX dump on OEP (original entry point) 18 IoCs
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/files/0x0008000000015677-12.dat UPX behavioral1/files/0x0008000000015677-91.dat UPX behavioral1/memory/2508-94-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/files/0x0006000000015d87-97.dat UPX behavioral1/files/0x0006000000015ecc-106.dat UPX behavioral1/memory/1272-113-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/files/0x0006000000015f65-116.dat UPX behavioral1/memory/2740-124-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2096-123-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/files/0x0006000000015fe5-127.dat UPX behavioral1/memory/2508-133-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2208-135-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/1272-574-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2860-159-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2740-639-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2208-658-0x0000000000400000-0x00000000004AA000-memory.dmp UPX behavioral1/memory/2096-659-0x0000000000400000-0x00000000004AA000-memory.dmp UPX -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe -
Executes dropped EXE 5 IoCs
pid Process 2508 WlNLOGON.EXE 2860 Shell.exe 1272 CSRSS.EXE 2740 SERVICES.EXE 2208 SMSS.EXE -
Loads dropped DLL 8 IoCs
pid Process 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe -
Modifies system executable filetype association 2 TTPs 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Shell.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0008000000015677-12.dat upx behavioral1/files/0x0008000000015677-91.dat upx behavioral1/memory/2508-94-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0006000000015d87-97.dat upx behavioral1/files/0x0006000000015ecc-106.dat upx behavioral1/memory/1272-113-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0006000000015f65-116.dat upx behavioral1/memory/2740-124-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2096-123-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/files/0x0006000000015fe5-127.dat upx behavioral1/memory/2508-133-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2208-135-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/1272-574-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2860-159-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2740-639-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2208-658-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral1/memory/2096-659-0x0000000000400000-0x00000000004AA000-memory.dmp upx -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Depkominfo = "C:\\Windows\\WlNLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SMSS.EXE" SMSS.EXE -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\Desktop.ini 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\Desktop.ini 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\SysWOW64\OEMLOGO.BMP 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\SysWOW64\Telematika.scr 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\SysWOW64\Telematika.scr 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\SysWOW64\OEMINFO.ini 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll WlNLOGON.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll CSRSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll SMSS.EXE File opened for modification C:\Windows\SysWOW64\OEMINFO.ini SMSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Shell.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll SERVICES.EXE File opened for modification C:\Windows\SysWOW64\OEMLOGO.BMP SMSS.EXE -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\WlNLOGON.EXE 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\120.0.0.1.htm 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\ 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\msvbvm60.dll SERVICES.EXE File created C:\Windows\msvbvm60.dll 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\Desktop.ini 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File opened for modification C:\Windows\msvbvm60.dll Shell.exe File opened for modification C:\Windows\msvbvm60.dll 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\Desktop.ini 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\msvbvm60.dll Shell.exe File created C:\Windows\msvbvm60.dll CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll SERVICES.EXE File opened for modification C:\Windows\msvbvm60.dll SMSS.EXE File created C:\Windows\WlNLOGON.EXE 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe File created C:\Windows\msvbvm60.dll WlNLOGON.EXE File opened for modification C:\Windows\msvbvm60.dll WlNLOGON.EXE File opened for modification C:\Windows\msvbvm60.dll CSRSS.EXE File created C:\Windows\msvbvm60.dll SMSS.EXE File opened for modification C:\Windows\120.0.0.1.htm 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 42 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s1159 = "Awan" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Shell.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" Shell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\s2359 = "Bengi" WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\TELEMA~1.SCR" SERVICES.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main WlNLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main Shell.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main CSRSS.EXE -
Modifies Internet Explorer start page 1 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" WlNLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\start page = "C:\\Windows\\\\120.0.0.1.htm" Shell.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} WlNLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WlNLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Shell.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Shell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE 2208 SMSS.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 2508 WlNLOGON.EXE 2860 Shell.exe 1272 CSRSS.EXE 2740 SERVICES.EXE 2208 SMSS.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2508 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 28 PID 2096 wrote to memory of 2508 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 28 PID 2096 wrote to memory of 2508 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 28 PID 2096 wrote to memory of 2508 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 28 PID 2096 wrote to memory of 2860 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 29 PID 2096 wrote to memory of 2860 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 29 PID 2096 wrote to memory of 2860 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 29 PID 2096 wrote to memory of 2860 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 29 PID 2096 wrote to memory of 1272 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 30 PID 2096 wrote to memory of 1272 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 30 PID 2096 wrote to memory of 1272 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 30 PID 2096 wrote to memory of 1272 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 30 PID 2096 wrote to memory of 2740 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 31 PID 2096 wrote to memory of 2740 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 31 PID 2096 wrote to memory of 2740 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 31 PID 2096 wrote to memory of 2740 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 31 PID 2096 wrote to memory of 2208 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 32 PID 2096 wrote to memory of 2208 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 32 PID 2096 wrote to memory of 2208 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 32 PID 2096 wrote to memory of 2208 2096 17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe"C:\Users\Admin\AppData\Local\Temp\17deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\WlNLOGON.EXEC:\Windows\WlNLOGON.EXE2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
C:\Windows\SysWOW64\Shell.exeC:\Windows\system32\Shell.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65B
MD5990a0bd866566534e37192439277e040
SHA190abfe04350a375df3beddd411256143e606461b
SHA256ee3aaf1bcc2539bdddb6f25f4d0902cd023d83d902196d1bf2fcd37a73469038
SHA512e598c68ae8f1a62cbc870fb7cf2c634ba24d1f1bfa62428a23aac7c914b3a775fa06564b6e084eaf9215086da433a80e49f2cbe81ca990414df3e57716dea4b7
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
462B
MD545d327d7d806625d696945dea064d7a2
SHA181a36b2a66c8dcce870a82409c6f772cc06addf0
SHA256e022ef7261dfe3e79b78e4bff605ae3f0480cd54d80b7c3358bd9091a0f0f04a
SHA5128b78bb4fa2c05d509cf171525b0ba7bf735a8890854f0ef16b29c9456ff547ccd86423068f61c21b8f35a0797ee44f9a8697861c34f133c6c26dfcf99e8f849c
-
Filesize
40KB
MD54de286f5923036648db750d58ba496e8
SHA10252d5d6c7a3b7dfa71fca4b30a53522fd7c6f67
SHA256eb79555170611879e79b4cdba59bdf679e63df9d7927d01354e5cf859274c58c
SHA512069daaa01a04add11a9e5fc0988b5d42e6ad50011fa148df41ffb3a905ffc170ab65ba66f4ad921306503d8792dd192c173c532232fc7ef146c09aa76ddf548f
-
Filesize
352KB
MD5cd3ed6798499172d616423023bc3f596
SHA1051788c9c8e3a4d5e42b9ca78a9e4a3e8d8d514a
SHA25617deb89d28d78f89b9146e679bbb8e69720eb8b70291cc140f2d5b64a3fe861b
SHA51228cc689e3fd3f35d5a977999b2cbe33cfe8a0a9d76f6a8c9cf591ce951cb119c63779f289779869fc12d8a5bc5e9c61da642f14fc8f86099554f3be5613e4f7f
-
Filesize
352KB
MD57935b4336261cd826ea7870d6616e67d
SHA168599f3fb05bca49f861d24dba935ec879d0ea34
SHA2560ecae055d0bdf0d271757313c8400de91efb17f0bbfeacaa7a36a2f0f177d1a3
SHA512aec1e69e235bdb6d39e3b6eae86d1a17107beb5c75b75782392dd752c15ee0828f52bcc04e4a04904d26c8216a2c9e1fc9d38690b8da24fa8542d86f56271c61
-
Filesize
352KB
MD52084ecf3b29d69df36029e6601f33ebf
SHA1526ad1baa2987bf10bf49ddb6d4a170d3029cd20
SHA2560afbad943b0b508523fad801ef7c617ef5b76118ae7eb5d1cf36d046b77c26a0
SHA5127a4a9c28a9a4eeb53cb4a22616cb49a2fdfc10135d66f3c348817b9327492221604f35558c849ef06eb650ea251673c87221cd1e3e0ced53efcedfee946c0d58
-
Filesize
352KB
MD5263e9738c827101de2d4eb6cda3b0b7a
SHA18bc3092c878292e3cbd70595756b037dbb995d98
SHA2562e323fc18cde4bb7c06df3724aa13cac6f1238db0f6e50c277050eb51c59b2f4
SHA512456fdc4745c7f5bc0bf0eda4d1cb5f64604980a64d42196c01b8724e3c0b69893b4dda28b926b2af81cdd057b8d99a19bcaf64778b8d4073b4c7bfeb4c86689d
-
Filesize
352KB
MD5f095573ebd6e22e779954f28c58d1121
SHA10e71b3031ef88b6b9aa46feeed1aea239adb307f
SHA256b524e716243f12b159c08d8b1476ee00067863ef3b36b36c2f5f0475fba5fa8a
SHA512fd00985fd25696cd5814575b8dc9a2fddd7b13b3bc3d75fb4fda0203429887ef1f95addee1ac58bdf05ee0962f08c9e631c01d9c07563f222a61b018d423d49c
-
Filesize
352KB
MD5b0181330587c75061ac9f17b722e6833
SHA11c13edb758ac4c1dd6b436ac22ab61db48533126
SHA256e6d773a8a0d7be3fb760793ce66991769917305a780095c735982f537af932dd
SHA51236852a4be3ccc02d459ce0d03edd6d32aed6f3b78996817b5beb29516670b147f86271e98ece56054c047d7dfc1f101ca5a479acdaeb75f28e0033d1a910402d