Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:50

General

  • Target

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe

  • Size

    91KB

  • MD5

    a1251190bcef0dbe6e7dc45b5ee7feb3

  • SHA1

    63b17ad4571ffc28b33f537c3e36f8cdeea7555e

  • SHA256

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda

  • SHA512

    693b25fba9a299fc93af7ffb8e489170beba9f53a23f2b463fac4f326155cc47117584164efffdecc40d707b899fcbfe5954bfff44a5bc24be0e4540c7e0c51e

  • SSDEEP

    1536:yOcjUpkWb2TTgKwuPOcjUpkWb2TTgKwuu:yOcjWJu7tPOcjWJu7tu

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Disables RegEdit via registry modification 16 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 56 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 58 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 40 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 50 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 7 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe
    "C:\Users\Admin\AppData\Local\Temp\d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2528
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2728
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2492
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1284
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1808
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2912
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1736
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1680
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2132
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2776
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2008
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:924
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2820
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2600
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1316
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2528
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2484
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1084
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2692
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2180
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1308
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1532
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2204
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:828
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2284
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2424
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2716
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2648
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2536
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2208
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2212
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1952
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1708
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2016
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2816
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2040
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1040
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1852
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:632
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1524
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1188
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1472
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:904
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2468
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2268
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2084
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2740
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2628
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1660
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2720
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:872
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1572
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2844
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2956
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Puisi.txt

    Filesize

    442B

    MD5

    001424d7974b9a3995af292f6fcfe171

    SHA1

    f8201d49d594d712c8450679c856c2e8307d2337

    SHA256

    660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

    SHA512

    66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    a1251190bcef0dbe6e7dc45b5ee7feb3

    SHA1

    63b17ad4571ffc28b33f537c3e36f8cdeea7555e

    SHA256

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda

    SHA512

    693b25fba9a299fc93af7ffb8e489170beba9f53a23f2b463fac4f326155cc47117584164efffdecc40d707b899fcbfe5954bfff44a5bc24be0e4540c7e0c51e

  • C:\Windows\4k51k4.exe

    Filesize

    91KB

    MD5

    20b553f5da2ce9c5515f43250666440b

    SHA1

    c064ff2af4dd75fdfd21d83b64674618b70dfffc

    SHA256

    11d1ebafad7f72adf9cb11c35c44937cdde428b3f21440619a4332ba4aa35ec0

    SHA512

    ab3cd61fc708b9a07265a96259a29c86662ad14e8d9c55aa5180735e8e2aa52cc99160d1e7d1b04162580f5b8c66a1701fafd66f3a359a222df581adaadfa677

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.3MB

    MD5

    5343a19c618bc515ceb1695586c6c137

    SHA1

    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

    SHA256

    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

    SHA512

    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    a73b24d10386a8312d12e393c39d2783

    SHA1

    dbe5ef597866ddd9521bd1ff1405cdf34d38d297

    SHA256

    57696460c35bb992e39784171908ce436cd2b63605bcf0dcb974addd922f86ae

    SHA512

    0c869055372c7811cc8f5273dcf2b9a5ebc8794767c2a36a14a2af7c54205ca47e52e5395b5382faf4935061031833002e7c95ee3e35efb243a987f25b3431ef

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    84e13ee7a891b130f64b0a73654cb675

    SHA1

    d7f73afec54f22fb9d46d94a56f8e02b351e72d1

    SHA256

    650b86dd7d8f93f667fabc36851dd1a746613ec024c66c0e75b11be47ce67073

    SHA512

    7b7cea426f1c4f817036e0fa2ce3b7743e9d7e3df04d334367aad33a7ed72b97a32e395b2384507f6fe6a2b9344818a6eae0450283f24d7060a9f8b08f7b2f4c

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    bf22e0ba0c0490bafffa1ca8a75d5634

    SHA1

    28caecbc8db15955a1e36780e18d07b42175bc3c

    SHA256

    84fdca8d2825a31f180b58d66141f5dfaa84c1f7224d39c5ce5dd1b0bbb9b761

    SHA512

    99c75a9c6ea45a1611cadb2811aa9a5d559463eb6ed5bcb6bd150f46f2bc01dd623351cb7dfa152b608b1aba2fe6232641a699eb4501fc2480bb67b8c5988ffe

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    99d0cb1787b484d45e1992addba46fba

    SHA1

    a791911de84b8d5b838f9b538e6f48f54960c810

    SHA256

    56eaee05a45a3a5cfa7e11ea1c5cdb2f5fa064f74581e81b65b930b36e728ea4

    SHA512

    7cf8744ac2eba21a1f7d53eb534de44f4ba7f2090bdfedabe25099741018d6f31867b5568680e5c4086573986647a28a934d0475ead817d20110e684be864825

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    79320b044d7fcd94ac05eacaf40f3907

    SHA1

    b853274c7e9341f2cc54bbe8e1e87f29645ff9fc

    SHA256

    d77234211c00c67d817dfdb5d71337b0094a0232fff4582a04c303caeae5d083

    SHA512

    44112c75591b0d70a50cb08f4d0dcc1f4867a3003f55d6d51172bd88d96a6c9890e3c303d9ee2001b151d25578ba8d72d9f2381a15c356074197ccc6c527a03f

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    6fe020f61cbeeac5abcd9ea3f66f911e

    SHA1

    925633189ff9ad1ce3dfe745deca121fc33d33fd

    SHA256

    848a80816de11fb72f2b7112a1f1bbdc81e2d49f049c4c387bb41b63f5a83bf5

    SHA512

    512e5a9619256897c0780fbf0e9c6a0d4878f8343729f42c1dce5cfd372f320aa74d839155287a42fc1b4d9853b2dc702221d5b9b52b72dd121acd4886bbbf2c

  • memory/632-499-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/924-339-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1040-460-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1040-454-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1040-455-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1084-430-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1084-340-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1084-441-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1084-368-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1084-442-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1084-179-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1084-439-0x0000000001D50000-0x0000000001D73000-memory.dmp

    Filesize

    140KB

  • memory/1188-514-0x0000000001E90000-0x0000000001EB3000-memory.dmp

    Filesize

    140KB

  • memory/1188-257-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1284-259-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1284-235-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1308-443-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1316-449-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1388-445-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1388-436-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1472-522-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/1532-457-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1532-453-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1532-452-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/1660-264-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1660-388-0x0000000001D70000-0x0000000001D93000-memory.dmp

    Filesize

    140KB

  • memory/1660-413-0x0000000001D70000-0x0000000001D93000-memory.dmp

    Filesize

    140KB

  • memory/1680-345-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1708-447-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-353-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-468-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-446-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-463-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-440-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-469-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-236-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1708-355-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-423-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-333-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1708-334-0x0000000002480000-0x00000000024A3000-memory.dmp

    Filesize

    140KB

  • memory/1736-342-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1808-278-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1852-466-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1852-464-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2008-268-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2008-269-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2016-360-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2016-357-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2016-359-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2040-425-0x0000000000230000-0x0000000000240000-memory.dmp

    Filesize

    64KB

  • memory/2040-433-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2132-399-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2180-415-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2204-509-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2268-583-0x0000000077A10000-0x0000000077B2F000-memory.dmp

    Filesize

    1.1MB

  • memory/2268-584-0x0000000077B30000-0x0000000077C2A000-memory.dmp

    Filesize

    1000KB

  • memory/2424-458-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-354-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-431-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-218-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2424-148-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2424-518-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-429-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-428-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2424-396-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/2492-233-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2492-232-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2528-181-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-187-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2528-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2528-170-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-124-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-159-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-182-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-169-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-113-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-136-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2528-142-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2528-477-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2528-123-0x00000000005C0000-0x00000000005E3000-memory.dmp

    Filesize

    140KB

  • memory/2536-470-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2536-475-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2536-471-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2600-419-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2648-427-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2692-490-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2692-491-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2716-390-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2716-389-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2716-356-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2716-395-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2716-394-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2720-530-0x0000000072940000-0x0000000072A93000-memory.dmp

    Filesize

    1.3MB

  • memory/2728-282-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-319-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-262-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-315-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-273-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-347-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-348-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2728-153-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2728-217-0x0000000002510000-0x0000000002533000-memory.dmp

    Filesize

    140KB

  • memory/2776-160-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2776-467-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-424-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-274-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-335-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-255-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-451-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2776-314-0x0000000002410000-0x0000000002433000-memory.dmp

    Filesize

    140KB

  • memory/2816-421-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2820-367-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2820-370-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2912-310-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB