Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe
Resource
win10v2004-20240508-en
General
-
Target
0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe
-
Size
91KB
-
MD5
1ad06c84941d002251f4909077d551b2
-
SHA1
bd6619b20b250923df604387847a47192550d123
-
SHA256
0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d
-
SHA512
76df341dd0a83c36c3453b33db54cc88f14ae7a58876c7a63caccfa14df2182ac65522cf8d9d8687cb69dbfa8911edeb7c4a7aac06c98e0f702e4c933ce3c33e
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6GEAwEmBZ04faWmtN4nic+6Gf:zGms4Eton0EGms4Eton0f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Detects executables built or packed with MPress PE compressor 20 IoCs
resource yara_rule behavioral2/memory/3964-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023415-8.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023419-106.dat INDICATOR_EXE_Packed_MPress behavioral2/files/0x000700000002341d-111.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1440-113-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4828-115-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x000700000002341f-120.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4828-121-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4832-126-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023420-128.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/1448-130-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/1448-134-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023421-136.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/2704-138-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/2704-142-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023422-144.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/4152-148-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/files/0x0007000000023423-150.dat INDICATOR_EXE_Packed_MPress behavioral2/memory/432-154-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3964-156-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1440 xk.exe 4828 IExplorer.exe 4832 WINLOGON.EXE 1448 CSRSS.EXE 2704 SERVICES.EXE 4152 LSASS.EXE 432 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File created C:\Windows\SysWOW64\shell.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File created C:\Windows\SysWOW64\Mig2.scr 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File created C:\Windows\SysWOW64\IExplorer.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe File created C:\Windows\xk.exe 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 1440 xk.exe 4828 IExplorer.exe 4832 WINLOGON.EXE 1448 CSRSS.EXE 2704 SERVICES.EXE 4152 LSASS.EXE 432 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1440 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 82 PID 3964 wrote to memory of 1440 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 82 PID 3964 wrote to memory of 1440 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 82 PID 3964 wrote to memory of 4828 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 83 PID 3964 wrote to memory of 4828 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 83 PID 3964 wrote to memory of 4828 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 83 PID 3964 wrote to memory of 4832 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 84 PID 3964 wrote to memory of 4832 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 84 PID 3964 wrote to memory of 4832 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 84 PID 3964 wrote to memory of 1448 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 85 PID 3964 wrote to memory of 1448 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 85 PID 3964 wrote to memory of 1448 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 85 PID 3964 wrote to memory of 2704 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 86 PID 3964 wrote to memory of 2704 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 86 PID 3964 wrote to memory of 2704 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 86 PID 3964 wrote to memory of 4152 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 87 PID 3964 wrote to memory of 4152 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 87 PID 3964 wrote to memory of 4152 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 87 PID 3964 wrote to memory of 432 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 88 PID 3964 wrote to memory of 432 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 88 PID 3964 wrote to memory of 432 3964 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe"C:\Users\Admin\AppData\Local\Temp\0ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3964 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD56798ab28ba2035849f6649885461260d
SHA12ca61c2187ace14fc85bc20d6e3d89f78f5606a7
SHA256b0f3bb887c7b39b50ed7e4548b0aba60509efc685c6caefd1ca23c8ae59cf9a2
SHA512e2cc2e93cb0e8068f07fd90e0842900774b052108aaaf7ff71352b8bd2c211bb98bb3916053f38d9aa37ade34ba8d2bb6b9e30bff344b58aa2a21573228081ce
-
Filesize
91KB
MD581ffc85326614092e09728a1905625b8
SHA157cab3d46d0590f0c1f8cf669636a939109c6843
SHA2566b9ed752798bc080a86eb7701f7da2d206ab3d0cccbc84704d376a6d7c43ce87
SHA512e6026b531de49d989fd64a68154831b2b2e0f34ebdc7dde6215d235898864b15a19d32c2641e5c7f945b391d4d7aa1a3098320afea07e41c338ce5178ce8fd64
-
Filesize
91KB
MD5c3df5a7a335a9998fdbf405532f56316
SHA11fbe80a3514fced0d1f7c0c24556e897b3eaa0a5
SHA256f1eb28af3f6c54ab0954f5c8bff2e0f5cbc3eff6fa0b5d78adc9ea2f1304f585
SHA512aebf8f8f4cbdaebb4f5a3686236c964dfaef503610061e4b4a52d1c3a77ddbb0b9be76defb5ec254d7bbd9e8b7019d9527c28e9cc741642f828bab3e46594234
-
Filesize
91KB
MD50bf6c4224eaa03b49e59dbbb7dff8874
SHA17804993abeb09a925b3af7f43a58c3e430715174
SHA256f3b9db1cfa892329a1de1be471f8f718795f19d7cd75358a18739c99139bf156
SHA512be1005c690aa1c303ae0387f1580f8952d1c84172130fd6d1b305a10e98017e5ec62b8b92e4a6c2b6df45b4d784e327137ed2c0622d08bc26389dee3392634d4
-
Filesize
91KB
MD5455cd2411511b79730b7ece78fac2fcb
SHA183ec2dc1704d86ddb4abe4de4df1b03863ddae4f
SHA256056079197b183257ad0dfccb65e2f3a613bc26dfc7d74a98a899eb58c7df2d31
SHA5125a7b96253536fe456fbe3c5a0cf0c55431de3b643edc963bee36f32aa2d2ecdd1f88ab3d73b44087c3b42534865cc97a6d133102c931f5cd33668152dd8c41c1
-
Filesize
91KB
MD51ad06c84941d002251f4909077d551b2
SHA1bd6619b20b250923df604387847a47192550d123
SHA2560ca47f3cc10adb0e2b58ac4dbc53bf3eafd91a57fde941d20b0255b80cb6498d
SHA51276df341dd0a83c36c3453b33db54cc88f14ae7a58876c7a63caccfa14df2182ac65522cf8d9d8687cb69dbfa8911edeb7c4a7aac06c98e0f702e4c933ce3c33e
-
Filesize
91KB
MD5ef44df06c8966bd4d0ce87e788d1047c
SHA12d961a6e39ee2a01a4749ea9ee327bec441bca5b
SHA25638f90eb0cf6129cca54423faa50f72ccb64005a8055f076cadfd4b12a4636816
SHA51220589f81747c390a2308ee1227d01d750102b331a254ad936ed27f120a0ec3f3c722de1c3105fad46e8a45ea09514e8fafb6f7a8cc7dcba14eca93e953f948df
-
Filesize
91KB
MD519aecd2525137caf2148450e7c978bff
SHA10cbaac3116b35ab383f59819f48ed48028d6e3bc
SHA2569a49818af5b2e749a87defe7e59ab41de13eb0fe16651396c48128b11e828acb
SHA512ee20c7eb8a5bb4d88206608afc528112febda2f16b07c9a2592b7916e608e70beb127cd60440655d40dbcb98ff578785599463b9cc5e8ecdd327896c95e8da56