Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Resource
win10v2004-20240426-en
General
-
Target
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
-
Size
91KB
-
MD5
7cc3ebfb126590fe4dfd67558a765ee3
-
SHA1
47d89c5aac13ef061c9225611e026a9322c64806
-
SHA256
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca
-
SHA512
fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6Gw3AwEmBZ04faWmtN4nic+6GoV:zGms4Eton0w3Gms4Eton0oV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Detects executables built or packed with MPress PE compressor 18 IoCs
Processes:
resource yara_rule behavioral2/memory/2700-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\winlogon.exe INDICATOR_EXE_Packed_MPress C:\Windows\xk.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/1796-112-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\IExplorer.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/3716-117-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE INDICATOR_EXE_Packed_MPress behavioral2/memory/1396-127-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE INDICATOR_EXE_Packed_MPress behavioral2/memory/4036-131-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE INDICATOR_EXE_Packed_MPress behavioral2/memory/2232-136-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2232-138-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE INDICATOR_EXE_Packed_MPress behavioral2/memory/2564-145-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE INDICATOR_EXE_Packed_MPress behavioral2/memory/5096-152-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2700-154-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 1796 xk.exe 3716 IExplorer.exe 1396 WINLOGON.EXE 4036 CSRSS.EXE 2232 SERVICES.EXE 2564 LSASS.EXE 5096 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Drops file in System32 directory 6 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process File opened for modification C:\Windows\SysWOW64\IExplorer.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File opened for modification C:\Windows\SysWOW64\shell.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\shell.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\Mig2.scr 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\SysWOW64\IExplorer.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Drops file in Windows directory 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process File opened for modification C:\Windows\xk.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe File created C:\Windows\xk.exe 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies Control Panel 4 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\ 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Modifies registry class 15 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exepid process 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe 1796 xk.exe 3716 IExplorer.exe 1396 WINLOGON.EXE 4036 CSRSS.EXE 2232 SERVICES.EXE 2564 LSASS.EXE 5096 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription pid process target process PID 2700 wrote to memory of 1796 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2700 wrote to memory of 1796 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2700 wrote to memory of 1796 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe xk.exe PID 2700 wrote to memory of 3716 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2700 wrote to memory of 3716 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2700 wrote to memory of 3716 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe IExplorer.exe PID 2700 wrote to memory of 1396 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2700 wrote to memory of 1396 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2700 wrote to memory of 1396 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe WINLOGON.EXE PID 2700 wrote to memory of 4036 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2700 wrote to memory of 4036 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2700 wrote to memory of 4036 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe CSRSS.EXE PID 2700 wrote to memory of 2232 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2700 wrote to memory of 2232 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2700 wrote to memory of 2232 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SERVICES.EXE PID 2700 wrote to memory of 2564 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2700 wrote to memory of 2564 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2700 wrote to memory of 2564 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe LSASS.EXE PID 2700 wrote to memory of 5096 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE PID 2700 wrote to memory of 5096 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE PID 2700 wrote to memory of 5096 2700 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe"C:\Users\Admin\AppData\Local\Temp\819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2700 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3716 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4036 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5660eee8dd828887317a7b2e8230a6aa6
SHA1760f5d1f895d9f30f1578f9e3c141a4f973d29a9
SHA256f63428ac01159fa037e4b5854afb64d238302d88200f16810c7e75611e092ad1
SHA512849c062eb2ec6ef69e334114d6f533624b331cd2b577a041c9fda38b2c1e02c22c3818c6da9e70c45f6c7243b06dab7a5ec501d72990a15dac8b16a8d28a9c43
-
Filesize
91KB
MD5b4fec8b59f8092ac6fb7b8c5dc662583
SHA1266ed42bf62408bc541097f23b3073c75950ab87
SHA256b29d8b237dd0c6342e60aca4e8decf73b2461a389ef4873e1c774ae8446e4f68
SHA5125e4509897526117967ebfcc65bd90d0212eb42074d1cc9dc8492f4a567e36154a5651fd3142e3a196527b53304782efc0edb4d33d7377ae5c8e61f0f91291a5d
-
Filesize
91KB
MD584425aebcc794b44fb6d530d90492b49
SHA12b862c6b43c46527cdcfe55358501bf473093e2e
SHA2566f2333679ad5cb7c9b2673aab8b82c61627268d93486929b0f0ae5368eab41c4
SHA512b55312592b9c826bf83461363643ddb4bdabae6ec3c07f640310dd48c2de5d1afad259ded55639467796ebef429fd291d35f3969e3e861f5eed296dcb8e55cf3
-
Filesize
91KB
MD53a29ef181562270475c4c9b6dd0b148e
SHA1c553139834d59c66807d1b38ce2a8711ec757f04
SHA256aa88a423423963b2daf6452ef79136d72e408a2b096d7c2fa50771befd6b64d8
SHA51259e8e50ddd207b0b8bbde1bbf21d6a3609c4bf03a538116bd3f49ffaeda689ef326a022588de994db0a18f3ce47e8de8eaeafe9cf8ac07a2ed02d81a360b5d1e
-
Filesize
91KB
MD57cc3ebfb126590fe4dfd67558a765ee3
SHA147d89c5aac13ef061c9225611e026a9322c64806
SHA256819f6d9abf3f55e2d5026e0eac2cdaa2fd8d91ac80d359cdb969bbc515bb54ca
SHA512fdc939ccfd37e5d72a468b6c5d307f51909816efb5843f4cde442e4c12e5cc6df0ab14fa324ad7775d7b18b1b2322b896c6b2e2ade0ad9d8234f261fd7b6aa08
-
Filesize
91KB
MD585962fd7990c2c401c682a96dc418986
SHA1e16c9176cb098ce6a813971c5ef181fee50bd822
SHA2566ee18d739b3ba205b21b89f63b796eb8eb678283424ac78a7451ad3dccf52494
SHA512b054729fd8b5edd0298fd3183c18f5505befe8b284a3bec367b4583816fd625093ca52477b73dfa31d0537ac81a0018404f0072112aa349f9becc0598659890d
-
Filesize
91KB
MD5978221178b572a1a7dd2b6c84404e7f6
SHA1af3c16d7e7b38d3c5db07c063a957424f9bd1154
SHA256889ac990db99d28a082a3ea1748ab7e6a02256befb3d3e9e92c20c9ecee76a0b
SHA512d1f2845c21e9e6249763ae304f0f725904c562ec17a19c09b745c2713fd19b5590c69df0547761cefadd60f38e9550bb07922452d21a7654f4aae8a3ee426188
-
Filesize
91KB
MD570cbd4788b64514629b3e0e2734633b5
SHA1c44309b7e99a61cbc92fea28303ddaa837f3868a
SHA256edfdc9ba63dc774d77e0ed6dd84e23fbc39ccf5ea89a2cbdc0112bf2ff3cf280
SHA5124e63592bd223231721503a7fcdee710e7908b0554df719a9bfb682dad4b2184628b48f51893fda15fb26d98eb6f8e7929a264639b220f35e27079accec478c2e