Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe
Resource
win10v2004-20240508-en
General
-
Target
34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe
-
Size
91KB
-
MD5
f0a63c666cb73fb5d97b2e945b1bfef6
-
SHA1
953008051f8a4b3a4766850a4351d655a045e5bd
-
SHA256
34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211
-
SHA512
eadd974a9b5427b274ed0136b27c4b59f4624d09b6fac2698a189a2450f70d7df9a8fa168e61e3f6fe99329c06d069d54679ad30fa67307d4d536b683eaf37d0
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6GAAwEmBZ04faWmtN4nic+6GU:zGms4Eton0AGms4Eton0U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Detects executables built or packed with MPress PE compressor 21 IoCs
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00090000000134f5-8.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x0008000000013a85-108.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2524-111-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000145c9-114.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2524-116-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000146a7-125.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2756-128-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1732-134-0x0000000001DD0000-0x0000000001DFE000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2340-139-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0006000000014730-138.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1764-151-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000600000001474b-148.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/348-162-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000600000001475f-169.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/348-160-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1732-159-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x00060000000148af-172.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/1116-175-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/840-185-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1732-186-0x0000000000400000-0x000000000042E000-memory.dmp INDICATOR_EXE_Packed_MPress -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2524 xk.exe 2756 IExplorer.exe 2340 WINLOGON.EXE 1764 CSRSS.EXE 348 SERVICES.EXE 1116 LSASS.EXE 840 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File opened for modification C:\Windows\SysWOW64\shell.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File created C:\Windows\SysWOW64\shell.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File created C:\Windows\SysWOW64\Mig2.scr 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File created C:\Windows\SysWOW64\IExplorer.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe File created C:\Windows\xk.exe 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 2524 xk.exe 2756 IExplorer.exe 2340 WINLOGON.EXE 1764 CSRSS.EXE 348 SERVICES.EXE 1116 LSASS.EXE 840 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2524 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 28 PID 1732 wrote to memory of 2524 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 28 PID 1732 wrote to memory of 2524 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 28 PID 1732 wrote to memory of 2524 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 28 PID 1732 wrote to memory of 2756 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 29 PID 1732 wrote to memory of 2756 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 29 PID 1732 wrote to memory of 2756 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 29 PID 1732 wrote to memory of 2756 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 29 PID 1732 wrote to memory of 2340 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 30 PID 1732 wrote to memory of 2340 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 30 PID 1732 wrote to memory of 2340 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 30 PID 1732 wrote to memory of 2340 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 30 PID 1732 wrote to memory of 1764 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 31 PID 1732 wrote to memory of 1764 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 31 PID 1732 wrote to memory of 1764 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 31 PID 1732 wrote to memory of 1764 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 31 PID 1732 wrote to memory of 348 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 32 PID 1732 wrote to memory of 348 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 32 PID 1732 wrote to memory of 348 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 32 PID 1732 wrote to memory of 348 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 32 PID 1732 wrote to memory of 1116 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 33 PID 1732 wrote to memory of 1116 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 33 PID 1732 wrote to memory of 1116 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 33 PID 1732 wrote to memory of 1116 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 33 PID 1732 wrote to memory of 840 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 34 PID 1732 wrote to memory of 840 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 34 PID 1732 wrote to memory of 840 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 34 PID 1732 wrote to memory of 840 1732 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe 34 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe"C:\Users\Admin\AppData\Local\Temp\34e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1732 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:348
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5b941593922bf12ad2615eeea8d358dcc
SHA16823e35cea1a7fc76986c279a0dfff9897e9a078
SHA256f120a2c17ff1e6bcff725c63615f23b283d88a58f9e2597b631c06a02bce0a33
SHA512fb459a97b72d3742708391d5fc180a865550541b3a1ef8b24f0eec5c4008c179540e872ce344bd7be1a2719d4258c084ddf905195d07f1a32d961ee4cb895365
-
Filesize
91KB
MD5f0a63c666cb73fb5d97b2e945b1bfef6
SHA1953008051f8a4b3a4766850a4351d655a045e5bd
SHA25634e8c0ae085fc555f0440edc3c514efa11148f176726e1afc806edf387752211
SHA512eadd974a9b5427b274ed0136b27c4b59f4624d09b6fac2698a189a2450f70d7df9a8fa168e61e3f6fe99329c06d069d54679ad30fa67307d4d536b683eaf37d0
-
Filesize
91KB
MD5880619e01f0a53b2713fc31d5baec4ad
SHA1ee146cac745f32fff74cf5737d33cc17606b3914
SHA256fbb3d4dd94203274aad9b42d4c76f3b82bcc4e1b0dcea5e875ce2af6e66f1186
SHA512d8cc3bf0f95a984be9f8d85f135d986d18893de0685a7083b4b37d443fb525b31b50fef00f2f49f295b192141d8ae6d46342a962c3612613302328a6598783d7
-
Filesize
91KB
MD54b5b170c185bdc4c41759d585cc79fb5
SHA1cfcba7896d0c67a38c63833929ed9a517e8da673
SHA25691bde7499222fc1b64d25e4c381924426f5cdcaa76f9ec70818a63e3008313f3
SHA51292af5434bbcc1d84fd5dab84b4ad992944697b2d47fbd62ebd9180d5d0cca200eabce932fbfbf47513202c09d37622fe89eb9d5e167604b92d59d53a9d3637da
-
Filesize
91KB
MD585de26eebe62c3765e4193b9f4841877
SHA1652421d88f8717a600d003938f2fb389fc410025
SHA2567d7ef06c14db7e9d128ae2c08b4b835f9962b03efe11ca54077f9180a1dbf8c6
SHA512d9a2f414c87be351b35b99917e84918b8e0a84d5a0543d81d97bde43a33a04c461f39ac3dc35f12a9489889740d9339e1ac0e7018c0d7390f6186a78003c5937
-
Filesize
91KB
MD5842261dc83b694ab9a7597775809e75e
SHA173979bf381e809e7f769dbdda81850e508309fd8
SHA256c918f92cf3e79877776dae606f26b99f6804a70170110be585c9d8ed9b6ca16c
SHA5129ae05eb19b6cc97e021c1ecbb931ef94fc253a9431145d64ad5cf2fd586e3eff31e15f7f3e19bdd17b06e4d61af44aa2308e47bf3b228870b0530f925b74a349
-
Filesize
91KB
MD5373f68325df92e70945a4c290e70ffc5
SHA114c86233beec332dda4035af7185f51f7795cb4d
SHA2560bf6eee4c64e8232ea989e3dd3941140c762e3727ff5d30ffc4d5c9afcaec17f
SHA51219843b3dc456b29762a2cf575aef5a66e24d0c0c03374832a3e56217bef1098793b4b4857640a2ecb514dd5022fb8c1c42f054dcf2132365d37c9ceba3f8720e
-
Filesize
91KB
MD5eda68a11083d5ef4138a33709e21a532
SHA1e5c8271861a955cba5dba9631d7dde0f282523f5
SHA256f85ce3b8ab9b4b6d6ae0b16676d73222fb224f20f17a2de3098af99009783d35
SHA512ce7fda5fba89db586f5ae70c0957b548a8bf69ceba6be9f9efcc7bb3cca5d520d751c90b6d82dfc0e14b6b643f910fbe68081f1ab5642e3e24a66588c6377f5f