Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe
Resource
win10v2004-20240426-en
General
-
Target
106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe
-
Size
45KB
-
MD5
7981f54b51ab1c6d3ce00fe207fc44c4
-
SHA1
40a02f8d7899f24700d1f86300aee0af17fa8aac
-
SHA256
106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f
-
SHA512
b080fd8600b30e1d97ee21f336283dfee84e2a767e626973dc338c39e8454f4a1453945d9d3aaa8dab472adcb7ae00223feb1671a7a3ac539713ae9ca6be36e9
-
SSDEEP
768:2mFQj8rM9whcqet8WfYUtT92S21XFXRnnePxCXNvF7DFK+5nE1A:8AwEmBj3EXHn4x+9am
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Detects executables built or packed with MPress PE compressor 19 IoCs
resource yara_rule behavioral2/memory/1868-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000700000002342a-8.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x000700000002342e-106.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2040-107-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2040-112-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023432-114.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023434-121.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4844-118-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023435-125.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4004-128-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4976-132-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023436-134.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/5072-137-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023438-142.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/5072-140-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2464-147-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023439-149.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/3880-154-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1868-155-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2040 xk.exe 4844 IExplorer.exe 4004 WINLOGON.EXE 4976 CSRSS.EXE 5072 SERVICES.EXE 2464 LSASS.EXE 3880 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File created C:\Windows\SysWOW64\shell.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File created C:\Windows\SysWOW64\Mig2.scr 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File created C:\Windows\SysWOW64\IExplorer.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe File created C:\Windows\xk.exe 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 2040 xk.exe 4844 IExplorer.exe 4004 WINLOGON.EXE 4976 CSRSS.EXE 5072 SERVICES.EXE 2464 LSASS.EXE 3880 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2040 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 83 PID 1868 wrote to memory of 2040 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 83 PID 1868 wrote to memory of 2040 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 83 PID 1868 wrote to memory of 4844 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 84 PID 1868 wrote to memory of 4844 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 84 PID 1868 wrote to memory of 4844 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 84 PID 1868 wrote to memory of 4004 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 85 PID 1868 wrote to memory of 4004 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 85 PID 1868 wrote to memory of 4004 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 85 PID 1868 wrote to memory of 4976 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 86 PID 1868 wrote to memory of 4976 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 86 PID 1868 wrote to memory of 4976 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 86 PID 1868 wrote to memory of 5072 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 87 PID 1868 wrote to memory of 5072 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 87 PID 1868 wrote to memory of 5072 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 87 PID 1868 wrote to memory of 2464 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 88 PID 1868 wrote to memory of 2464 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 88 PID 1868 wrote to memory of 2464 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 88 PID 1868 wrote to memory of 3880 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 89 PID 1868 wrote to memory of 3880 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 89 PID 1868 wrote to memory of 3880 1868 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe 89 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe"C:\Users\Admin\AppData\Local\Temp\106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1868 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5072
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3880
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b8e491b9a9eaf1e35552b1fc2c118295
SHA15b1dbae2cc2d0f4a3ca9fa71a2b407003971fefb
SHA256d0d288f6c6e28b26b022d9852b480facf37ff7a5fc30f14a374ad6f04c82725a
SHA512b5c23bfaacce6d0dc83fcece6492be2dd7879e4c007bd660eeef16c18f3676497bb4056cf527076110e5fc47acc9ed738ac9f0941895c093b896534a5c0160dd
-
Filesize
45KB
MD5a70feddaa072a63357bb468ed29d2490
SHA188d07faeebce036090806859609e472c4a7cca06
SHA256c9b0e35d70fc9d3dba31e14d3346e5d9a9908d789a8f2370847f4bef279a7446
SHA512d651e72bcedae157dc4eae151f29025feececc8316ad1b791b25c6e3aa4c581d5dbf824bd889f496b7ac21c8339582108cf26f1fb8d4de71b94635417f55cb3e
-
Filesize
45KB
MD583b9718aed777302836d93a6da7d5f00
SHA1fe4466153f3dc4a1a091c5fce54ad9dc07f7d404
SHA256621bf43627b164129871bed50149c9f07ef6a07fb9857bf7f916b28ea30bed39
SHA512ad2aa96fa5985f945209b831d30cdc8c2a9207ee5b551fe3523e29d224b71bd6984d7b75b251232d0454fa7ddd62e0767ba27f6e850b26abb3ffaf0ff6da7548
-
Filesize
45KB
MD59f1d5fe30bcde40bcd2412048c80e025
SHA190df5d4596dd5b176003a586bb17d3cff9faf5e3
SHA256da5e065e67103eba3a5d150cc091634df5e2888f60f6fb33f5151b387c19a0a5
SHA512e8adc906d21fa2bfd77fbafc0a15961a02849893f50a23addb375ec841fa8f82622dbf013260394c71e5d329a35eafd80977812bdb719c73b0d9bd0fcb7321a1
-
Filesize
45KB
MD57981f54b51ab1c6d3ce00fe207fc44c4
SHA140a02f8d7899f24700d1f86300aee0af17fa8aac
SHA256106b56f878fb35b101343488f1ffd144d19d2f0cf4280c976c85b777298ea99f
SHA512b080fd8600b30e1d97ee21f336283dfee84e2a767e626973dc338c39e8454f4a1453945d9d3aaa8dab472adcb7ae00223feb1671a7a3ac539713ae9ca6be36e9
-
Filesize
45KB
MD5d861dcd1bf2ff50553b38e2588862265
SHA1adcaee2bae0804496292de3bdeec21570812c1df
SHA2567f3f98fa15740ac057052646ccbfe2b38a00c87d278adf5fee87e4f6d1bf2728
SHA512c10f00187f01971fa7f6d5841d530df668287dbd6df88c45cd5a3e3f15da8617757c137964dc0961df5921d7d05e2bf40370cccaf7aae6994ba38488e69bde90
-
Filesize
45KB
MD54b7441df9108c0a5c52de4958c26baee
SHA164623a672b25f868abb7763e84918b3d28e49c74
SHA2567e319f1c4ce720093573114d6f1d88117c2998ba1801b01aa2d3e51323324093
SHA512ed18fdccd122c88a758eb6cbe2d080562ccb24cd8776aba1b30ba41f73d2dd4d121c02336b01dbb3c065a467ef30f5f40eabd759865d8a8f0825395362420497
-
Filesize
45KB
MD56dbe8485aa82d6f561f4b29644969dfc
SHA1ccdf963f580677e76f9c6b0e7598e80dc0a2fef3
SHA256028f1fb4eee2c09d8431fcf11e9ac0ca96a6b7044a1f6c524cf49d1629555d92
SHA5120279f984e7840fe9d1d7556d2bc26a0ffae08b5cdf6fa5c5497affaf67823de4d36cc286eb4e2d532ffe6071699f5d3392175736e79c20109886b9e9a5b0c539