Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 22:28
Behavioral task
behavioral1
Sample
6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe
Resource
win10v2004-20240802-en
General
-
Target
6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe
-
Size
91KB
-
MD5
6f6dd0f5946e5941ce684aa25d0d55a0
-
SHA1
b9864560bda81cd4e8d5b3b3b69a466801b59c24
-
SHA256
6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6
-
SHA512
878c44a30eaf541b01825a0c78966ae2b788dd8751ecbfb50e35fb05eab93353ce6a9c2797ce7bedb5936347b8d4effbe4cad5211dfe8a4584267135559668ea
-
SSDEEP
1536:QRsjdIZfaif4YrxCjjKnouy8VzVRsjdIZfaif4YrxCjjKnouy8VzK:QOyZy9wCjOouttVOyZy9wCjOouttK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1648 xk.exe 1444 IExplorer.exe 2896 WINLOGON.EXE 1388 CSRSS.EXE 836 SERVICES.EXE 1244 LSASS.EXE 2004 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
resource yara_rule behavioral1/memory/2888-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0007000000018b68-8.dat upx behavioral1/files/0x0008000000019240-111.dat upx behavioral1/memory/1648-112-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1648-116-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x000500000001961e-117.dat upx behavioral1/memory/2888-119-0x00000000004B0000-0x00000000004DF000-memory.dmp upx behavioral1/memory/1444-128-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x00050000000196a1-129.dat upx behavioral1/files/0x0005000000019926-140.dat upx behavioral1/memory/2896-143-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1388-150-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2888-149-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/1388-153-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019c34-154.dat upx behavioral1/memory/836-163-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019c3c-165.dat upx behavioral1/memory/1244-176-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/files/0x0005000000019c3e-177.dat upx behavioral1/memory/2004-184-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2888-190-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/2004-189-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File created C:\Windows\SysWOW64\shell.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File created C:\Windows\SysWOW64\Mig2.scr 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File created C:\Windows\SysWOW64\IExplorer.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe File created C:\Windows\xk.exe 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\Desktop\ 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 1648 xk.exe 1444 IExplorer.exe 2896 WINLOGON.EXE 1388 CSRSS.EXE 836 SERVICES.EXE 1244 LSASS.EXE 2004 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2888 wrote to memory of 1648 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 30 PID 2888 wrote to memory of 1648 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 30 PID 2888 wrote to memory of 1648 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 30 PID 2888 wrote to memory of 1648 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 30 PID 2888 wrote to memory of 1444 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 31 PID 2888 wrote to memory of 1444 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 31 PID 2888 wrote to memory of 1444 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 31 PID 2888 wrote to memory of 1444 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 31 PID 2888 wrote to memory of 2896 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 32 PID 2888 wrote to memory of 2896 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 32 PID 2888 wrote to memory of 2896 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 32 PID 2888 wrote to memory of 2896 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 32 PID 2888 wrote to memory of 1388 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 33 PID 2888 wrote to memory of 1388 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 33 PID 2888 wrote to memory of 1388 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 33 PID 2888 wrote to memory of 1388 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 33 PID 2888 wrote to memory of 836 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 34 PID 2888 wrote to memory of 836 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 34 PID 2888 wrote to memory of 836 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 34 PID 2888 wrote to memory of 836 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 34 PID 2888 wrote to memory of 1244 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 35 PID 2888 wrote to memory of 1244 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 35 PID 2888 wrote to memory of 1244 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 35 PID 2888 wrote to memory of 1244 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 35 PID 2888 wrote to memory of 2004 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 36 PID 2888 wrote to memory of 2004 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 36 PID 2888 wrote to memory of 2004 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 36 PID 2888 wrote to memory of 2004 2888 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe 36 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe"C:\Users\Admin\AppData\Local\Temp\6ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2888 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:836
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD56f6dd0f5946e5941ce684aa25d0d55a0
SHA1b9864560bda81cd4e8d5b3b3b69a466801b59c24
SHA2566ddaaa257c1c760cc3ef8863cf34edfaee8bc690d7c02449a0d590d38b43e6b6
SHA512878c44a30eaf541b01825a0c78966ae2b788dd8751ecbfb50e35fb05eab93353ce6a9c2797ce7bedb5936347b8d4effbe4cad5211dfe8a4584267135559668ea
-
Filesize
91KB
MD565e573d3027a6dafbf453d6229cc475b
SHA108d466ae31e363744a759dd3b6a37c32d524750e
SHA256051a54aa6b8ef06ebb69d8c3f73eb71a7064ca81667364bdbdf7286660c7b1eb
SHA512fa9c73bc1fb8d0f3b85620efb14537953b2812f3d2e1693f0a995aca1f06eb70397940ce0ddba395a57306f572972b655bb5a462c1da715c818ef989a340186a
-
Filesize
91KB
MD55ffefae4938f06d0df3080dd8c048192
SHA1f7f0a21436683ea7b78af2f2f418257b6680930b
SHA256808dc02eb28ad2ee310b90fa0a5a6db58bb92aafe3c98a1769761d624708e715
SHA512fea81e2cb9cad7cfd9abf2c096b3c4601d59ff97ed3265aac7199e7c078a930102303d96335c03435af654bc4031ad87fda7219c1347537fa52e40809ca43b27
-
Filesize
91KB
MD5f3dfedf418b001168d1642827ef46f72
SHA10985c0413f360ca8429d2084165120a883bbf5c4
SHA256daeea8519da291a6aebbff4a7c98ecbadaa7e2b178627411f1ee5643693713f4
SHA51287aeef6db0e98a945d97445530d38a94584c1f0782edcd59b5b4dbec09e5549c5f0fdcc2943941989016e97f1f1546258fe7350a0ef3ec3ffdb43fee65eca8dd
-
Filesize
91KB
MD59dbeeae082342c9ea7cf496bbf9969ac
SHA10a69b3583e6c264bf66b3b549d621df5c53a6d90
SHA256658dff65fdf9d68c400f5e7e3ab24c4a3a519173cf1487d69ffd9d6e9e570c33
SHA51264b177b9c13afe83218cecc6a1f6be8f23f7d2a03662d8a4bc90a4f0cea8e5461a69733c677c9f2b43693009ae7cdfffe34c9029e0d2accd10d400691f62f231
-
Filesize
91KB
MD5c3638dedd1fe857224013af0a414592d
SHA1c5362fd0826794db41b155baa206bc4bec2da509
SHA25696faa4728f12b0e4f77a2bd29e1675bc2b722bb471d593fe71a410f69f64a72f
SHA512dd53bb7855a7659618fd92faf9b457a9c6b9b4066d19f0cf7cb1faa381c858cb74c3b8af8eaf9b34114e5078589c0841a5b1a71acca1c81b50ee09dce16fba5c
-
Filesize
91KB
MD5c35aad72b94e10670e3cc9eb4b6b311b
SHA197d9276c1a74d0e4d99b217da9aca1e0a0f8e2a6
SHA256bf8e19172a8f7e9aa28b0b70c48b968ce2e09b45c4ff6d3ac6288c1bbf83790c
SHA51216283ec3693b1aaf05a8ff15ec5e2b63c59433306cb5696f0fa49fd74c3015d5bb87e231908e5bbde2a5113579796fd99502a12b1ac197a7e400b71232e1c9d8
-
Filesize
91KB
MD575951f8e7ccc283dbdda76fa9ccf4a0a
SHA11b5b505ef43519e736350fcf927d3b31be7314c1
SHA25621c5daee5da116430259fc1011ede3b43139392f3c60d53271c57883bdc34cd2
SHA512ee18c38a5c72bfb0244812bdb117a20eff1e7424e556faa7f92758ca0db17b4a0d75e4c726bdaf904ee3c024af8dc7d371e9fbd83750f1da3c5f8a515f2a5cca