Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 17:09
Behavioral task
behavioral1
Sample
e48de6bb66ca9a8972415fb6639ca9e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e48de6bb66ca9a8972415fb6639ca9e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e48de6bb66ca9a8972415fb6639ca9e0N.exe
-
Size
272KB
-
MD5
e48de6bb66ca9a8972415fb6639ca9e0
-
SHA1
db7c7241cda82bc1ec5b522e435c8dcc3ff75ef5
-
SHA256
d0388706906fcbb9f08af3359df77ef82f8a420a408e70fc4f9efdbb19bba291
-
SHA512
4e3f005d7111493604eca954ea98146034fd1238966f33129f77fbf6122479f8c16bd93f69da8666f979e8bf2885bd75490ec9edf090827b12c122b954b6ee53
-
SSDEEP
3072:7MBGBT753QvRgWgMlIx1ZiXjb6aEF6D0NM9voeLNZ2j8Cx2:Yw75KRgWg4aAXjb6aEFfooeLNZxC
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Disables use of System Restore points 1 TTPs
-
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe -
resource yara_rule behavioral1/memory/2128-0-0x0000000000400000-0x0000000000444000-memory.dmp upx behavioral1/files/0x000700000001667f-7.dat upx behavioral1/memory/2128-1172-0x0000000000400000-0x0000000000444000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\tiwi = "C:\\Windows\\tiwi" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\winlogon.exe" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\imoet.exe" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\cute.exe" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies WinLogon 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Ketika sang Putri tertidur, kunyalakan lampion tuk menghangatkan sang putri, dan ku tunggu sang putri terbangun. Entah sampai kapan dia bisa melihat ketulusan hatiku....(kaya di fs nya siafa yach??) :P " e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\winlogon\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Cemlekum" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1124 2128 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies Control Panel 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\tiwi.SCR" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\International\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\International\s1159 = "Tiwi" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\International\s2359 = "Tiwi" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Mouse\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Mouse\SwapMouseButtons = "1" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Windows Title = "Princess Tiwi is Here.." e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\Default = "C:\\WINDOWS\\win\\system\\host32.exe /ShowErrorINF" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile e48de6bb66ca9a8972415fb6639ca9e0N.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2852 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe Token: SeShutdownPrivilege 2852 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe 2852 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1124 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 31 PID 2128 wrote to memory of 1124 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 31 PID 2128 wrote to memory of 1124 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 31 PID 2128 wrote to memory of 1124 2128 e48de6bb66ca9a8972415fb6639ca9e0N.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System e48de6bb66ca9a8972415fb6639ca9e0N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "1" e48de6bb66ca9a8972415fb6639ca9e0N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e48de6bb66ca9a8972415fb6639ca9e0N.exe"C:\Users\Admin\AppData\Local\Temp\e48de6bb66ca9a8972415fb6639ca9e0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 14122⤵
- Program crash
PID:1124
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2040
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
10Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5e48de6bb66ca9a8972415fb6639ca9e0
SHA1db7c7241cda82bc1ec5b522e435c8dcc3ff75ef5
SHA256d0388706906fcbb9f08af3359df77ef82f8a420a408e70fc4f9efdbb19bba291
SHA5124e3f005d7111493604eca954ea98146034fd1238966f33129f77fbf6122479f8c16bd93f69da8666f979e8bf2885bd75490ec9edf090827b12c122b954b6ee53