Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Resource
win10v2004-20240426-en
General
-
Target
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
-
Size
91KB
-
MD5
7cc3ebfb126590fe4dfd67558a765ee3
-
SHA1
47d89c5aac13ef061c9225611e026a9322c64806
-
SHA256
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca
-
SHA512
fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6Gw3AwEmBZ04faWmtN4nic+6GoV:zGms4Eton0w3Gms4Eton0oV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Detects executables built or packed with MPress PE compressor 23 IoCs
Processes:
resource yara_rule behavioral1/memory/2156-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\winlogon.exe INDICATOR_EXE_Packed_MPress C:\Windows\xk.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2156-109-0x0000000000430000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1552-112-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\IExplorer.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1552-116-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2436-126-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE INDICATOR_EXE_Packed_MPress behavioral1/memory/2932-146-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE INDICATOR_EXE_Packed_MPress behavioral1/memory/2748-156-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2604-158-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2604-162-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE INDICATOR_EXE_Packed_MPress behavioral1/memory/2156-165-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2452-173-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2452-175-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE INDICATOR_EXE_Packed_MPress behavioral1/memory/2156-183-0x0000000000430000-0x000000000045E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2156-189-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2724-188-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 1552 xk.exe 2436 IExplorer.exe 2932 WINLOGON.EXE 2748 CSRSS.EXE 2604 SERVICES.EXE 2452 LSASS.EXE 2724 SMSS.EXE -
Loads dropped DLL 12 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exepid process 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Drops file in System32 directory 6 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Mig2.scr 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File opened for modification C:\Windows\SysWOW64\shell.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\shell.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\Mig2.scr 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\IExplorer.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Drops file in Windows directory 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process File opened for modification C:\Windows\xk.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\xk.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies registry class 15 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exepid process 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 1552 xk.exe 2436 IExplorer.exe 2932 WINLOGON.EXE 2748 CSRSS.EXE 2604 SERVICES.EXE 2452 LSASS.EXE 2724 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription pid process target process PID 2156 wrote to memory of 1552 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2156 wrote to memory of 1552 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2156 wrote to memory of 1552 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2156 wrote to memory of 1552 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2156 wrote to memory of 2436 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2156 wrote to memory of 2436 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2156 wrote to memory of 2436 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2156 wrote to memory of 2436 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2156 wrote to memory of 2932 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2156 wrote to memory of 2932 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2156 wrote to memory of 2932 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2156 wrote to memory of 2932 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2156 wrote to memory of 2748 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2156 wrote to memory of 2748 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2156 wrote to memory of 2748 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2156 wrote to memory of 2748 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2156 wrote to memory of 2604 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2156 wrote to memory of 2604 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2156 wrote to memory of 2604 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2156 wrote to memory of 2604 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2156 wrote to memory of 2452 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2156 wrote to memory of 2452 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2156 wrote to memory of 2452 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2156 wrote to memory of 2452 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2156 wrote to memory of 2724 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE PID 2156 wrote to memory of 2724 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE PID 2156 wrote to memory of 2724 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE PID 2156 wrote to memory of 2724 2156 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe"C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2156 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5f30e5f294108ac9fc818df009dec115d
SHA1acd4b7515b5ffdd25a8816c25fcabdae2c205790
SHA25612fe43d79a8955accf668dabfd7abf83f7d3a458f8ee487669b48367afacdbda
SHA512415e22c248da413c8c2275fefbee7036e59147f82ab6f3ac59f98a8b014271f199ccb0941da1b7c61efadbbe0965a02d5fad595769f8287671607af83dfc736b
-
Filesize
91KB
MD57cc3ebfb126590fe4dfd67558a765ee3
SHA147d89c5aac13ef061c9225611e026a9322c64806
SHA256819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca
SHA512fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08
-
Filesize
91KB
MD56caeb6ea6304fa2cd5350813a54fa3d5
SHA1970ffdecd216b1945aa1162e9f1a2e0248cc5bf7
SHA256a3e645f5154e3e4f4658e3983816f4a70df63352e7efb58643dd60cdbcfbb8f7
SHA512c256a6ba42ad37626995e8cd7f0f03a31b1bdbd518692154778dcb768e02317f0c7e63dae477c98e286970837e4c4eac5d68b0789649a97fe4a249e8c8c12730
-
Filesize
91KB
MD539907f1b88bb025b8da228ee3bf26f15
SHA1246507faf91300c55208793148b1c3bd19faa19e
SHA25622df2614e068cf1a9ca58a107a5927421f46a2771aca0feed26b7c48f5cec86e
SHA5128b4f4f435bd9eb740f87b4050034edc80ea45c421ac67b06ae6412a26419085a9b13babf8d03ef83e6acc340b688ba00bfc7faaf1fbe1cde49cf94ee1303c7c4
-
Filesize
91KB
MD5246de65678d4c804f6da13175fc6c023
SHA1110acb5364b115429cf0a9fe3119a9858c5a0b14
SHA256916ffa8aa8f7c0dfec64c370d83a928e1112d08b462eb6993da0133511bf2c5b
SHA5128e0e5d227ce3ff4f279e56c3f8915dac8a8c6a81fb10534b885248769111ad5c0712fefb30dcbc642b6d2ddbba4b6a9875337a719d4509de8c690ba07f270580
-
Filesize
91KB
MD5e6c1e52ae22160844aa0f353d6eb4293
SHA1830b06a72744ce86ad6216560118b2bc5aceb1fb
SHA2568dc9dfd7e8831f5b765762dee2810480fce5d6905f69691a8d1600ed321b058b
SHA5122693189dba6572cae7ca3c4d8952a89050711b6f0c97541786d93de4c863a3a160358e36f86b0ebdfabdf8a7bb20cb84e8197d2199cf132fe33d7666791796f8
-
Filesize
91KB
MD5d1feaabac87ea5dfb03970c6812f7068
SHA190cdeb48544c50a46714abc3acd944bddab4fa6b
SHA256fa09b673ac56ecaabb6e74ce5e53437a86aee77cffe08c05cb1a923a3ff7ab77
SHA5125775f7df848938ce64c9a44dc6b478f8bedb0846d83d1881138a3d3086fe74e38e953527218a5b41b74a6aff470f5b71179fa3a762fd4789a84bce3ab5084007
-
Filesize
91KB
MD54673f261e14eb0ae34032cf104fe708a
SHA1db1f55168cd2cb0b9085d3c73d4906eefbf82e94
SHA2563cac5037c1038da3232d7195024099e58f173b4449d10c08aefc0a4a2a9748f5
SHA5129b4aec23a45897b1bcf3d69f1dbca25bc74ed0ffcb2c9e8d1f91eef238cb9b5aef2e103566a3953ff42364a681e0e36a392afb7f7ed6f2bf6f7c17823ac5bbbf