Analysis
-
max time kernel
139s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 00:44
Behavioral task
behavioral1
Sample
86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe
Resource
win10v2004-20240508-en
General
-
Target
86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe
-
Size
91KB
-
MD5
352087d465f180e096eb49568346e072
-
SHA1
b74f05f94bf291ba6a9735798e0d6bffa766979a
-
SHA256
86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c
-
SHA512
600eafacf6651e6aa9713284ac092e74037e88b0249ea7925e27a9e2a51b2d3ed8d74d8ee4ad276230fac5b6c9902bf7a0433b7191e2844a0a150af55de8bb07
-
SSDEEP
1536:ERsjdf1aM67v32Z9x5nouy8VTyRsjdf1aM67v32Z9x5nouy8VTQ:EOaHv3YpoutNyOaHv3YpoutNQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/624-0-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x0007000000023425-8.dat UPX behavioral2/files/0x0007000000023429-106.dat UPX behavioral2/memory/2396-112-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x000700000002342d-113.dat UPX behavioral2/memory/4088-115-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/4088-120-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x000700000002342f-121.dat UPX behavioral2/files/0x0007000000023430-127.dat UPX behavioral2/memory/3320-125-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/764-131-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x0007000000023431-133.dat UPX behavioral2/files/0x0007000000023432-138.dat UPX behavioral2/memory/3564-142-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/1740-140-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/3564-147-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/files/0x0007000000023433-148.dat UPX behavioral2/memory/3212-150-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/3212-154-0x0000000000400000-0x000000000042F000-memory.dmp UPX behavioral2/memory/624-156-0x0000000000400000-0x000000000042F000-memory.dmp UPX -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2396 xk.exe 4088 IExplorer.exe 3320 WINLOGON.EXE 764 CSRSS.EXE 1740 SERVICES.EXE 3564 LSASS.EXE 3212 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
resource yara_rule behavioral2/memory/624-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023425-8.dat upx behavioral2/files/0x0007000000023429-106.dat upx behavioral2/memory/2396-112-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002342d-113.dat upx behavioral2/memory/4088-115-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4088-120-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x000700000002342f-121.dat upx behavioral2/files/0x0007000000023430-127.dat upx behavioral2/memory/3320-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/764-131-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023431-133.dat upx behavioral2/files/0x0007000000023432-138.dat upx behavioral2/memory/3564-142-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1740-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3564-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023433-148.dat upx behavioral2/memory/3212-150-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3212-154-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/624-156-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File created C:\Windows\SysWOW64\shell.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File created C:\Windows\SysWOW64\Mig2.scr 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File created C:\Windows\SysWOW64\IExplorer.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe File created C:\Windows\xk.exe 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 2396 xk.exe 4088 IExplorer.exe 3320 WINLOGON.EXE 764 CSRSS.EXE 1740 SERVICES.EXE 3564 LSASS.EXE 3212 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 624 wrote to memory of 2396 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 83 PID 624 wrote to memory of 2396 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 83 PID 624 wrote to memory of 2396 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 83 PID 624 wrote to memory of 4088 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 84 PID 624 wrote to memory of 4088 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 84 PID 624 wrote to memory of 4088 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 84 PID 624 wrote to memory of 3320 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 85 PID 624 wrote to memory of 3320 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 85 PID 624 wrote to memory of 3320 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 85 PID 624 wrote to memory of 764 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 86 PID 624 wrote to memory of 764 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 86 PID 624 wrote to memory of 764 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 86 PID 624 wrote to memory of 1740 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 87 PID 624 wrote to memory of 1740 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 87 PID 624 wrote to memory of 1740 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 87 PID 624 wrote to memory of 3564 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 88 PID 624 wrote to memory of 3564 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 88 PID 624 wrote to memory of 3564 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 88 PID 624 wrote to memory of 3212 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 89 PID 624 wrote to memory of 3212 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 89 PID 624 wrote to memory of 3212 624 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe 89 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe"C:\Users\Admin\AppData\Local\Temp\86d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:624 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4088
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3212
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5e72f70d5c758c766c5d2b7076ee22551
SHA16952241418985a6ad412d99738249b01744d6525
SHA256e7cb943aa2140cf49057a07799d8345d967e126f0fb6261a3b4537f6819f20cf
SHA512bc31beccd1199845c26c5797ada75a95e59089d60b3c9e7dcb30cfb84a8762e5df3a757e99b62d24c32634fca0bf5f5df8e90bf6df903a6a3d380d06d999c1f4
-
Filesize
91KB
MD5a8d389ec6f06a58db0c3e08969f8ceca
SHA197161d565bbe200196e65dcaa4aea066f0ccf088
SHA2564dfc93b6ceb9d5c4427183806c27db080f1c8f5aab2eddea77533aa33339b1c5
SHA51279a83beac796f4a8aacaf0eca40443be46855193c9bbca9105498ebca02933189ff3ff1c29cd6d16b68ec95e5e6c082f83d89e90824c21b17d12d5becac366c3
-
Filesize
91KB
MD52cbe890ff8fba4ff4348354583d24a11
SHA16332af95885252bfb3271645a40d59a4ec427f96
SHA256907f75a97678db48b2975fd918d7893c188b2066221faa467f57e3f00ce377f9
SHA5126889e9befebde065e2fd590a15bf2523731aaba0898e7b9ae2715502db83fbd9bae627fb6a00ed2467eaf1f10731bd900e591d1da32a0633da61ba0e790089e0
-
Filesize
91KB
MD531becea6462433903f8dece36cf69263
SHA1e8b0bce9426ae70b7387608145095675871786e5
SHA2569b80a23212e2f4c5307ca11d6cda2c0c0dc5fab4f7486a1c1c2ba4f040af9fb1
SHA5127ed668195698e8d956f9a5b8bde0b522884573c92142acf96616a652cc2158761f97b2bb87b9f45fcd389c7925a95ea210798c715b3908e1e43bfd2ba9d1b234
-
Filesize
91KB
MD51eaed4930705ac303e18c53f2adc56b9
SHA14a8dc23428e4dd57b072bc62d7dfd263f755ba1b
SHA2560727fed9a901e9dfe4586c6c9726abc94dbb34a25b80bd29f586a7b3f2ddf205
SHA512091216937ec05597442ba037539ad30cade29082a0760c0c7370dbf7673310e50cda665d6231d0eedcd3efb186f42f6ac095233070ceff26b3d14f74894972c2
-
Filesize
91KB
MD5352087d465f180e096eb49568346e072
SHA1b74f05f94bf291ba6a9735798e0d6bffa766979a
SHA25686d8456a7832bfb4909c9972d2a5622b1c341df3a405d9ff15f79ffe9e34563c
SHA512600eafacf6651e6aa9713284ac092e74037e88b0249ea7925e27a9e2a51b2d3ed8d74d8ee4ad276230fac5b6c9902bf7a0433b7191e2844a0a150af55de8bb07
-
Filesize
91KB
MD5c443241f42a88816d688668f352f15b9
SHA19ff97d8ec4ac14cbcdbe9422a0292aeac91f278a
SHA256bb0701202a8a049a5a61cabea226d5455db7f98ad70cd0855a517f9d117ff00a
SHA5125f83a4a5d0a73055ca184524e7737cc2f8ffae1fc44af73a30cafda45940efe68e9fa06074948b340e6eb8fa3af834d4a6b4949d7aba885852beddae615d2dad
-
Filesize
91KB
MD5f9c3296b0463758436b13ad78b664525
SHA104b38c5491e3c5d235cc9b0be8678cff5d802f1a
SHA2562446fdb7131a4a5dd46271588e1927aa87091d84256b3120178ea44cd8ee2878
SHA512d72a64e4796ac056b53ed107e3c3215b0b61da455c1ac4df417ef2c788467e3c60b81011bd3d38aef7e4fc0e3ee5aece7dbbb0e66164f770136a4c360958dfa2