Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:10
Behavioral task
behavioral1
Sample
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe
Resource
win10v2004-20240508-en
General
-
Target
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe
-
Size
63KB
-
MD5
1b055bba5fa31bf8373cebc3bbe6d4e0
-
SHA1
3914e6747c29152fc85461b35b4ff4e11a1eeb5e
-
SHA256
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996
-
SHA512
3fd87cd7cafbe4699462899885f56ea5db07d54322857444b5611f36aef995065e011b7728679c3f09fe07aa48193cfa507ee5a4205a9dfb76b85ef658e95025
-
SSDEEP
1536:jRsjdEIUFC2p79OCnouy8VDmpAG4RsfU:jOm9CshoutdG4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Disables RegEdit via registry modification 2 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
Processes:
xk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 2732 xk.exe 2752 IExplorer.exe 760 WINLOGON.EXE 1712 CSRSS.EXE 1588 SERVICES.EXE 2560 LSASS.EXE 888 SMSS.EXE -
Loads dropped DLL 12 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exepid process 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Processes:
resource yara_rule behavioral1/memory/112-0-0x0000000000400000-0x000000000042F000-memory.dmp upx C:\Users\Admin\AppData\Local\winlogon.exe upx C:\Windows\xk.exe upx behavioral1/memory/2732-112-0x0000000000400000-0x000000000042F000-memory.dmp upx \Windows\SysWOW64\IExplorer.exe upx behavioral1/memory/2732-117-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2752-126-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE upx behavioral1/memory/760-137-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE upx behavioral1/memory/112-151-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1712-150-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE upx behavioral1/memory/1588-158-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1588-161-0x0000000000400000-0x000000000042F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE upx behavioral1/memory/112-168-0x0000000001F20000-0x0000000001F4F000-memory.dmp upx \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE upx behavioral1/memory/2560-173-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/888-184-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/112-186-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Drops file in System32 directory 6 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process File created C:\Windows\SysWOW64\IExplorer.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File opened for modification C:\Windows\SysWOW64\shell.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File created C:\Windows\SysWOW64\shell.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File created C:\Windows\SysWOW64\Mig2.scr 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Drops file in Windows directory 2 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process File opened for modification C:\Windows\xk.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe File created C:\Windows\xk.exe 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Modifies registry class 15 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exepid process 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exexk.exeIExplorer.exeWINLOGON.EXECSRSS.EXESERVICES.EXELSASS.EXESMSS.EXEpid process 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe 2732 xk.exe 2752 IExplorer.exe 760 WINLOGON.EXE 1712 CSRSS.EXE 1588 SERVICES.EXE 2560 LSASS.EXE 888 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription pid process target process PID 112 wrote to memory of 2732 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe xk.exe PID 112 wrote to memory of 2732 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe xk.exe PID 112 wrote to memory of 2732 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe xk.exe PID 112 wrote to memory of 2732 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe xk.exe PID 112 wrote to memory of 2752 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe IExplorer.exe PID 112 wrote to memory of 2752 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe IExplorer.exe PID 112 wrote to memory of 2752 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe IExplorer.exe PID 112 wrote to memory of 2752 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe IExplorer.exe PID 112 wrote to memory of 760 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe WINLOGON.EXE PID 112 wrote to memory of 760 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe WINLOGON.EXE PID 112 wrote to memory of 760 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe WINLOGON.EXE PID 112 wrote to memory of 760 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe WINLOGON.EXE PID 112 wrote to memory of 1712 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe CSRSS.EXE PID 112 wrote to memory of 1712 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe CSRSS.EXE PID 112 wrote to memory of 1712 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe CSRSS.EXE PID 112 wrote to memory of 1712 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe CSRSS.EXE PID 112 wrote to memory of 1588 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SERVICES.EXE PID 112 wrote to memory of 1588 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SERVICES.EXE PID 112 wrote to memory of 1588 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SERVICES.EXE PID 112 wrote to memory of 1588 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SERVICES.EXE PID 112 wrote to memory of 2560 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe LSASS.EXE PID 112 wrote to memory of 2560 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe LSASS.EXE PID 112 wrote to memory of 2560 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe LSASS.EXE PID 112 wrote to memory of 2560 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe LSASS.EXE PID 112 wrote to memory of 888 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SMSS.EXE PID 112 wrote to memory of 888 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SMSS.EXE PID 112 wrote to memory of 888 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SMSS.EXE PID 112 wrote to memory of 888 112 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe SMSS.EXE -
System policy modification 1 TTPs 4 IoCs
Processes:
5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe"C:\Users\Admin\AppData\Local\Temp\5f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:112 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD51b055bba5fa31bf8373cebc3bbe6d4e0
SHA13914e6747c29152fc85461b35b4ff4e11a1eeb5e
SHA2565f2765c65029f2b9afaceea119f6b0eaf40be3b7143eb94ec7723f7519368996
SHA5123fd87cd7cafbe4699462899885f56ea5db07d54322857444b5611f36aef995065e011b7728679c3f09fe07aa48193cfa507ee5a4205a9dfb76b85ef658e95025
-
Filesize
63KB
MD540ae999dee05bfc38a5aa6cceb077769
SHA1401056c4a0aecd8646b9fa1fc96c1fe3fc8facd8
SHA256d7a38d8d98e99600981a0d27cbec074316c1637365921891e18491c9257c7713
SHA51226e32ff2cc22ac6c7c2e973d826708f9c0c297cba5bdd6546e6fa294c911a2348276e06a4b3da2845fe03ed5aadb18a6bffe0d073d14505abe67c3a3b345fa3b
-
Filesize
63KB
MD5b8a4bdbe1ab78ac020c0af455d48c0f9
SHA12d437955bd484a696d9d50d7d8a3930bf12bbe36
SHA25648573cf0399b61cd79bb9c465734e10682daf21c214e012eca1c0529414128d3
SHA512b57b5f2c85b401b777b2556342f98de52efb9236c2c0ba8265db6ae45c2f05bd9e59dc203b22e7ce904903a789e05b50a381edb5463af405660c56219dd96c1b
-
Filesize
63KB
MD57a0a1b74959e7dbb5ef1196384b0096f
SHA1782b68b76168f3019f291533839a067ed5de9373
SHA256d4fd1965bac11c253de556e31768e5f15d72e3e2eed179ad82903e2b93a42801
SHA512af83d1e3283b58eaa1bf60443cfde8d21a9f9da4c2103ba41ac465be360492a1dcd0563d2eda95f29a90e914068bbbf8f4572020c3050f8108f9fff32e8a6e1d
-
Filesize
63KB
MD50801be3c26631fdaa0757b7473bd4cf4
SHA18d69c1e7ac9f61d75a4c99e143bb2e5c2cf6ba5b
SHA2568d3b81719366259c42676d9ed7e9b8640c151022655a12e53429dd83b13dc1c4
SHA512e469fc490049655ef056a1c4488a2dc7d2123634b1324dfb22f158836daac32b1bc0b63dfa7f743d5e13bfa0d322e4efb2647a9057b590c0d73ac0130e058c7a
-
Filesize
63KB
MD5de5ba44cf73a6da4b2da1bcd8269b987
SHA197dfc75cfd0f845bec8151d2a9f7264478d7d29d
SHA2567b095b1b6efcd8830f02ac2b456f15c99da7a8340f1df1916efd2b178d5d4e59
SHA512ceb1ae750d1be899bfe0c7707badc9eaa971645a22915e0582f7ae9118a72edbccc8aadb28ea27f3a3cfb7728b27091131e45b0813959964fb5e620cd51b572c
-
Filesize
63KB
MD5c08b8c7a804f304421feda0971daf573
SHA1bbff0c290766af35f61f8b637fbdda3d33f100eb
SHA256bf78ab17a3b6438f8d7b9d9314673b0a3d40fe31a1d0df52f92348fcaca52e81
SHA512d7e5923579cbd96aec198551af0517ba788fcba113eb7b06cec93a35e52fe031f800e332b2f2d91200897c6791247917c7eb7181a6a796747292900d460d13c0
-
Filesize
63KB
MD5a25b2e2abc92c15c4f0eeee22e602a9f
SHA1e9e5698772f35ec5d86348d88ee9896ff435df2f
SHA256adaaf934d6065a2baeb6769719181b3c629eca31c644caad45e843c72fd61acf
SHA51264b2ec23792522abe2a90bc0c8893bacc8aa34b81f991eda125fb1a7364a35076fe0c80dc0c0e7897e478bb47fa2a97bf8bc0ccd908f4b420931b89fd05889da