Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
2cdd90e5b69dbbad23a43b26356696c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2cdd90e5b69dbbad23a43b26356696c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2cdd90e5b69dbbad23a43b26356696c0N.exe
-
Size
325KB
-
MD5
2cdd90e5b69dbbad23a43b26356696c0
-
SHA1
27eaf57a25fd34696e6dbb772d9081cbb377252f
-
SHA256
753133fd1a1fd89dbc8c736105d87dad6ce5a4deb531c054d53f2593b88f3d93
-
SHA512
1a2203c542d764dabb340960eba74111926985152ec042a6b386d6edc3db40911c7893227b12e818ddbc05d1cf8d6e5ddc95b0ee425a6ac8a4abc5c8e9ba7c0e
-
SSDEEP
6144:LY+32WWluqvHpVmXWEjFJRWci+WUW20rUU5EYCTvaBju43:EnWwvHpVmXpjJIUW2cUusvalx3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\\LDJ2T8C.exe\"" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Windows\\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\\LDJ2T8C.exe\"" lsass.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe -
Disables use of System Restore points 1 TTPs
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\debugger = "C:\\Windows\\notepad.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\debugger = "C:\\Windows\\notepad.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\\regedit.cmd" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\\regedit.cmd" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe lsass.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001924b-117.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 2680 service.exe 2912 smss.exe 1896 system.exe 2664 lsass.exe -
Loads dropped DLL 5 IoCs
pid Process 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" lsass.exe -
resource yara_rule behavioral1/files/0x000600000001924b-117.dat upx behavioral1/memory/1896-214-0x0000000010000000-0x0000000010075000-memory.dmp upx behavioral1/memory/1896-222-0x0000000010000000-0x0000000010075000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\sHN3Y5H0 = "C:\\Windows\\system32\\NHG8N4IJOX6S6R.exe" system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\0T8COX = "C:\\Windows\\EGQ3Y5H.exe" system.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\sHN3Y5H0 = "C:\\Windows\\system32\\NHG8N4IJOX6S6R.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\0T8COX = "C:\\Windows\\EGQ3Y5H.exe" lsass.exe -
Drops desktop.ini file(s) 28 IoCs
description ioc Process File created \??\UNC\PDIZKVQX\W$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\Y$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\V$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\K$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\P$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\R$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\S$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\Q$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\B$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\E$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\I$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\N$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\A$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\H$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\F$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\G$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\L$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\M$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\ADMIN$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\C$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\U$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\X$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\Z$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\D$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\J$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\O$\desktop.ini lsass.exe File created \??\UNC\PDIZKVQX\T$\desktop.ini lsass.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: service.exe File opened (read-only) \??\E: service.exe File opened (read-only) \??\H: service.exe File opened (read-only) \??\J: service.exe File opened (read-only) \??\K: service.exe File opened (read-only) \??\L: service.exe File opened (read-only) \??\M: service.exe File opened (read-only) \??\R: service.exe File opened (read-only) \??\T: service.exe File opened (read-only) \??\V: service.exe File opened (read-only) \??\Z: service.exe File opened (read-only) \??\G: service.exe File opened (read-only) \??\O: service.exe File opened (read-only) \??\P: service.exe File opened (read-only) \??\Q: service.exe File opened (read-only) \??\U: service.exe File opened (read-only) \??\X: service.exe File opened (read-only) \??\W: service.exe File opened (read-only) \??\I: service.exe File opened (read-only) \??\N: service.exe File opened (read-only) \??\Y: service.exe -
Drops file in System32 directory 35 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FUV3Y4L system.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L\NHG8N4I.cmd smss.exe File opened for modification C:\Windows\SysWOW64\regedit.exe system.exe File opened for modification C:\Windows\SysWOW64\NHG8N4IJOX6S6R.exe system.exe File opened for modification C:\Windows\SysWOW64\TSV3E2O.exe system.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L\NHG8N4I.cmd service.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll service.exe File opened for modification C:\Windows\SysWOW64\regedit.exe smss.exe File opened for modification C:\Windows\SysWOW64\systear.dll smss.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L\NHG8N4I.cmd lsass.exe File opened for modification C:\Windows\SysWOW64\regedit.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L\NHG8N4I.cmd 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\regedit.exe lsass.exe File opened for modification C:\Windows\SysWOW64\NHG8N4IJOX6S6R.exe lsass.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L\NHG8N4I.cmd system.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L lsass.exe File opened for modification C:\Windows\SysWOW64\NHG8N4IJOX6S6R.exe smss.exe File opened for modification C:\Windows\SysWOW64\systear.dll lsass.exe File opened for modification C:\Windows\SysWOW64\TSV3E2O.exe service.exe File opened for modification C:\Windows\SysWOW64\systear.dll service.exe File opened for modification C:\Windows\SysWOW64\regedit.exe service.exe File opened for modification C:\Windows\SysWOW64\NHG8N4IJOX6S6R.exe service.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system.exe File opened for modification C:\Windows\SysWOW64\systear.dll 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L service.exe File opened for modification C:\Windows\SysWOW64\FUV3Y4L 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\TSV3E2O.exe smss.exe File opened for modification C:\Windows\SysWOW64\systear.dll system.exe File opened for modification C:\Windows\SysWOW64\TSV3E2O.exe lsass.exe File opened for modification C:\Windows\SysWOW64\NHG8N4IJOX6S6R.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\SysWOW64\TSV3E2O.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\smss.exe service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\YEY3E1V.com service.exe File opened for modification C:\Windows\lsass.exe service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\regedit.cmd 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\JOX6S6R.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\regedit.cmd service.exe File opened for modification C:\Windows\lsass.exe smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\regedit.cmd smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\LDJ2T8C.exe smss.exe File opened for modification C:\Windows\EGQ3Y5H.exe system.exe File opened for modification C:\Windows\lsass.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\JOX6S6R.exe lsass.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\smss.exe smss.exe File opened for modification C:\Windows\onceinabluemoon.mid system.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\winlogon.exe smss.exe File opened for modification C:\Windows\EGQ3Y5H.exe smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\YEY3E1V.com smss.exe File opened for modification C:\Windows\cypreg.dll system.exe File created C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\zia01560 system.exe File opened for modification C:\Windows\moonlight.dll service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E} 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\regedit.cmd lsass.exe File opened for modification C:\Windows\EGQ3Y5H.exe lsass.exe File created C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\MYpIC.zip system.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\MYpIC.zip system.exe File opened for modification C:\Windows\onceinabluemoon.mid 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\onceinabluemoon.mid smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E} system.exe File opened for modification C:\Windows\lsass.exe lsass.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\winlogon.exe lsass.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\LDJ2T8C.exe service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E} service.exe File opened for modification C:\Windows\cypreg.dll service.exe File opened for modification C:\Windows\JOX6S6R.exe service.exe File opened for modification C:\Windows\onceinabluemoon.mid service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\service.exe smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\winlogon.exe system.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\LDJ2T8C.exe system.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E} lsass.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E} smss.exe File opened for modification C:\Windows\EGQ3Y5H.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\EGQ3Y5H.exe service.exe File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\smss.exe lsass.exe File opened for modification C:\Windows\moonlight.dll 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\moonlight.dll smss.exe File opened for modification C:\Windows\moonlight.dll system.exe File opened for modification C:\Windows\JOX6S6R.exe smss.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\winlogon.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\system\msvbvm60.dll service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\winlogon.exe service.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe system.exe File opened for modification C:\Windows\cypreg.dll smss.exe File opened for modification C:\Windows\system\msvbvm60.dll system.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\YEY3E1V.com lsass.exe File opened for modification C:\Windows\system\msvbvm60.dll 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\LDJ2T8C.exe 2cdd90e5b69dbbad23a43b26356696c0N.exe File opened for modification C:\Windows\moonlight.dll lsass.exe File opened for modification C:\Windows\onceinabluemoon.mid lsass.exe File opened for modification C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\LDJ2T8C.exe lsass.exe File opened for modification C:\Windows\64enc.en system.exe File opened for modification C:\Windows\cypreg.dll 2cdd90e5b69dbbad23a43b26356696c0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2cdd90e5b69dbbad23a43b26356696c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile system.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" system.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1896 system.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 2680 service.exe 2912 smss.exe 1896 system.exe 2664 lsass.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2680 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 31 PID 2312 wrote to memory of 2680 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 31 PID 2312 wrote to memory of 2680 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 31 PID 2312 wrote to memory of 2680 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 31 PID 2312 wrote to memory of 2912 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 32 PID 2312 wrote to memory of 2912 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 32 PID 2312 wrote to memory of 2912 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 32 PID 2312 wrote to memory of 2912 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 32 PID 2312 wrote to memory of 1896 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 33 PID 2312 wrote to memory of 1896 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 33 PID 2312 wrote to memory of 1896 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 33 PID 2312 wrote to memory of 1896 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 33 PID 2312 wrote to memory of 2664 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 34 PID 2312 wrote to memory of 2664 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 34 PID 2312 wrote to memory of 2664 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 34 PID 2312 wrote to memory of 2664 2312 2cdd90e5b69dbbad23a43b26356696c0N.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cdd90e5b69dbbad23a43b26356696c0N.exe"C:\Users\Admin\AppData\Local\Temp\2cdd90e5b69dbbad23a43b26356696c0N.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\service.exe"C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\service.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\smss.exe"C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\smss.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"C:\Windows\CHN8O2C.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Windows\lsass.exe"C:\Windows\lsass.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
325KB
MD5d995c4fc5fab9e9791642a385a321954
SHA14994c9d07df55975d5cfd73411e6a59a1c46eaf3
SHA256b3b4fc94277964a64e9c8092cefb45da40a9c31599956c64d4382bdc0b701335
SHA51282423ca43ff29394797742c92255a60c084fdea3406577f6552a19abc5420b9787aaa31d9f6397b141fc1b06693061da93cbd7ea34c2674d024b50687b73ac75
-
Filesize
325KB
MD5e5ca751d07edae2064dcdb415ddb3c99
SHA14764c0770d8024dae6ed427d4233e44db299e09e
SHA25623666e595533e510b74d5a8c1a9b03e1ce7277cd0a048d150af67d4cb2ab16ce
SHA512781361ea72d62883b66f3866136fe197f25a1ed6cc40ecd1b850edfc57bbacf6a8df3c28a10b60166b687cf6f65a627cfeac07aa855b83fa0ea694d8421b76a5
-
Filesize
325KB
MD5c9785b0ba6da5f04837afad01859532e
SHA1bc1362b3baa1b6c2eb85b96da3104ebb5bde7107
SHA25611876c40a1873a48ef6de1edfca854867f1dd36b337490741df17b51bb63d0ff
SHA5123b16c6786a12b241e643b3a1a6526c248ea4dfe06c8368cb341da6e9896095003c8e4693819301912b1a89946b03d4118a2e58a0806390830ae4dba0a26e9ab5
-
Filesize
325KB
MD5d832564f2a2612ae657f29515127881b
SHA1a360ce918efca507aed29f63867418def85c2b86
SHA256c38b1355c4abb56a3abe9beebae813872fad4d82dbe23664c4e7bc13e85c9c54
SHA512ba7ee1e5bc993e21005af9078ca818d740ff0a3fb22a07ce63c856d633150916dfe6fbec505ba9f1e07292c6f3ecee6bde9b3981e39d4acc4222451e652d5a16
-
Filesize
325KB
MD556c6f6fb138c1e9a83c6299eff70ebb4
SHA14b1a2bad3f14a4a8ecda10820e6cbe3f9ffdbc29
SHA25693a2002e46addf856fe804d760a10f1f4e08a3ad259a1b6b7127375e0f2827c4
SHA512263e7488a4ebe7a7c007b08d0a888108f1c74529b6c063569aa28f5f98a977ffd7b517237a588acc94b8de29d6d67ecc803af3264477ac9d9457d6ef5685f57c
-
Filesize
325KB
MD5fa4d1fad7875fec6b2a535cf2796d72e
SHA1b890817151ad28caedd931277b77384e33dfcd72
SHA256eae73675a3ffa3909517aa19e0f2f3ba52527ca74b8a3959f83f9b48e4c0b04b
SHA512548fe9c0123c7f8ecc562aeaafa875095c46c48f089c7943b78949569befe4c8a259a0d5da0f5ac5a13efc2f91a47b10ca715e325acd767bf6c996f863fdec85
-
Filesize
325KB
MD5c1162554364b293ec3830fa7a829781f
SHA1ed953aa8de6296b9d4262a6a7efc1f91bd773862
SHA256b344ddc027c2bd80f08245c724f9c415992095ac19e82361eb6528ee35351a2f
SHA512afef10e7c558ffb1749cd7799f707e26859f2572846392f1339f911485a9a279c937cae3ba4bb2a230700bb51721903c4df4d1fa5ae9d9e5a7a597517262fb65
-
Filesize
325KB
MD50d948f09a03f8443f5e7e05ba5c1a7a9
SHA1d89e2089c176b404d5e625aa855261bfe946be7e
SHA256e6abf8db6c55dc18deee71181b5f5f0a71ad9990145f20319f5c78ca17782146
SHA51266a934411085d197283c1824d416af497baf6507fbb7e671423e839a15cd0c34e773974e4d654cd3874c51ad4521d7d5e6418a2fd29fd5f3bfc66ee6830b877a
-
Filesize
325KB
MD564935faa9b17dfc65e7c2dda274bd457
SHA1c1b134f614c19da1d08392970d508800a8b627a9
SHA256beea2622aebc0fdd2f741a82d760b320ee665d344e3df3cfd6fbd552ecf2dd99
SHA512c1c1c3807126c02808a0325f857a36c9669c56e631bf8c7780296b70eeaad8e3d5948350033313424dc24cb16f0498bda7c79a46e8845c283adac4547f8d1f50
-
Filesize
325KB
MD5f53c00a0cdde3a6b7b70b9ea3f7bab45
SHA10e073f955f7424f3a94b335d45fcd77f7e75b940
SHA2569676bbafa7bcfc79239b171681a57c3978b90a8b0c71cb0cc8000362396da785
SHA51221ee823f7868191ff73dc429d7cf737242ddf07206c0f8251b5995ba407a09fe997b0e48618c014b181e42525573e167af1b48213092535e99f6ea0546eac190
-
Filesize
325KB
MD5ce76f740f66b15be3a5a1b926d869115
SHA160297c893c56a657679e2052038429b1f6c07d04
SHA2566ea3dd5728f5283f46ee210ab218f862ef6d017480306922e1b8655066a6b5c6
SHA51287c999152d185b7c5dccb39fdded0ddca04c45d2bfe43e5b72fe092857378ffd578bb47124cc68e71bee1444ae9352694de1deea56dcf952d062397115271f4a
-
Filesize
325KB
MD522021b92a425593e5324f7d701b6c774
SHA10a067595736213cbcf5aaa8f70b51b581fa41ef6
SHA256de64ed01c4d85390a81ab9fd510dcb3c7e10f25aad36f1a65a270fa11cd703fb
SHA512e359c6edf219aecdee1b81af8c2eca6876a1a2cf3c691a3dcde99dce69a9937c77a4c061e44fb57d97cfd4300729be5c77d3fe8b305a402ec2aa7986497e4805
-
Filesize
325KB
MD527ca1e419d7e11d9d2d97a1c6888b956
SHA111e6a9f9f38944ace3d9b64c0fd3f59c5caf3a23
SHA256771dc9415f2852fad796253095e0da1aa169716462bba5840a24d833a39e0bb3
SHA512a5e44e85c01c859b572ea6e3f429f55dedd05a43d2e17551b4d11f373ef8cbae7606bb94ef4d968c94a96c6d98391e78961a628b1b49717852feb2aebe94ffdc
-
Filesize
325KB
MD5afbd8717b8d2fb96986003a490675099
SHA166896a433a1b961c69ecb3eba9c955505c005a66
SHA256475e074e2323164ec1cac1280ecfb90edb9d22d5c1491d44d595cc419b7d7dbb
SHA512412de9c3aaac2315b4e7277d48a8f3567841cb52da7ed587c6c4262baff481bd2fb97f504d818c6d83208cc25f182dead519f549fa5199cc70c0cfcffbbcfded
-
Filesize
141B
MD598fa86c186994eb8d774e6f0f6c27a00
SHA14529e272ccfd2ecaf111c471794ed7246fc1f3c6
SHA2566a661f9afadef7ddab412f18cb09cb5dc8dc344d57ce8ae7cea65d805803361e
SHA51211868ebb34a3d96e40e16eb4d6f5b267a39a2a69f98bb53912a10647d8b64cd053c34a7e6ae2d0fdf303508b031fb2780f1a051e954a6d285d77c6b54f631849
-
Filesize
127B
MD5964d78451d49da935833eb64afd865d0
SHA146a1ea77809c5fd58fcec14e066d95d93001855a
SHA2563ed6d700315c4087191db147753d0a40133ae49f85bdcd267cde44e2d941e044
SHA512819f0afaada79ed300afda86a3378215a1ded4ee22a967f71584e244f32d2a2265f0f6fb5a4523fee714a1d621fa39dabd1766dca312b77dd0e55af12c916f46
-
Filesize
417KB
MD5e9451860cfa19590dcf5765445c4fe6a
SHA164833587ca65612a92dc069b2a5944e9d75b12c2
SHA25688cd19c8dc10e27a72bc776bf00907ac8670f80d2dda89c155678e581578301a
SHA512bb8da8ae3a7a5cbd392c3d350554b9ad9ec2d53a27fad5d85f181e9ffc8e4c255c2e502046ac757b75b418d36a4faeeb4148361b748284b82ae00e4e8ca918fc
-
Filesize
325KB
MD5d1f09577d97c402324133124a720abc5
SHA1ec529922b99e5613849667ced842ece3dd1a99bc
SHA256b67f011e51f45995d3aa119b1678f2b03a53980d9d4861d602a09b25e7ebc256
SHA512d2690feab1a6c4f1f78192ece8b8e3b447ef67e27d4204ee074668449e30eaf0a3175284b94e692642295c4080c1fd990d0dad7127568b81b74a6e71788bec47
-
Filesize
325KB
MD5b1f0027eefb445c5030fda1d35f0f2e3
SHA1d06e1a23755f80c5c13b7e2e63857cede8ab77cc
SHA256166adb13d91c8196a65371742e8c9b33dc4229534fbbf436a39a26970a0e0fbc
SHA51204e5b6e38ee31cc5e8c387e6c7aafe66612ecd01bd990615950a1323b0f2858d10244d1884bf40aff0aff8db8806811fd5a06126243cc8c75ac8bba286c5e2f3
-
Filesize
65KB
MD5c55534452c57efa04f4109310f71ccca
SHA1b97a3d9e2c1ad9314562b7d0d77b2a4b34e77d61
SHA2564cbbe69bcd0a2debae6a584e1fa49f8d4a27f90d9cd364255bbbd930ca0a38bc
SHA512ad324f1f1bfde9c9b6057d5526ae62155b3b897d27225ed74fdb867a2c6d5f21cebfb63e3dc68bd807993b0f4c72fb3ce880696b9c3358b3b982204d60c7161a
-
Filesize
8KB
MD50e528d000aad58b255c1cf8fd0bb1089
SHA12445d2cc0921aea9ae53b8920d048d6537940ec6
SHA256c8aa5c023bf32f1c1e27b8136cf4d622101e58a80417d97271d3c0ba44528cae
SHA51289ff6a1f1bf364925704a83ab4d222e2335e6486e0b90641f0133236b5f6b0fede1e9f17b577d6d069537e737b761f745d1fde4a9d0b43cb59143edf2d9c2116
-
Filesize
1.3MB
MD5731e4e6eb3ca5e3f9fbd9c2d15f88acd
SHA1a8f3ac38530aaad6ecd5a507dfec22d26f7318f8
SHA2569557659ccd3b1611ef457ec2bb61cd11f26c1b7b904d1e86f063996b681ba34c
SHA512c0cd06fb068dec4eff0de4c8d17e9103c768c7c43807997be34654ca62139a5ade1cfadcf053716dff7d05f2cbc2f650359f5e2b1114e25420f1f65829540530
-
Filesize
325KB
MD599922297a23d0299f1ced6fdb70531da
SHA1d2259c7600a6ba671921fc07d6dc70ccd9958d43
SHA256c86c1f0d803dc62167ba123943d87e005025141c1a3d13351a4f791de921245c
SHA512af63e023dd6210017b5e594f62d74549e232bdff2c6061736c02cfa5540382962baf8abbc280eafd26844eebd7f48739aa33a4db792802afa93d2fb4dd943f25
-
Filesize
325KB
MD56ca23acde046c08b790a34623e75fca8
SHA1f99e343bbfd0a6b322e9ff0a389b242085c544b4
SHA25682b114f894354bf4251584b9ad04799555d7d36420d442d5cd46dff136ca4b9a
SHA512b664b4e8e317802be6e8957ac0fac3cd63d522846177ecc8e880fa852d6d8f93b7ef6a669d6369b3c2fba2d2cd3862db52ad14ff9f0ba513ec184cb0c9c309e0