Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 03:50

General

  • Target

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe

  • Size

    91KB

  • MD5

    a1251190bcef0dbe6e7dc45b5ee7feb3

  • SHA1

    63b17ad4571ffc28b33f537c3e36f8cdeea7555e

  • SHA256

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda

  • SHA512

    693b25fba9a299fc93af7ffb8e489170beba9f53a23f2b463fac4f326155cc47117584164efffdecc40d707b899fcbfe5954bfff44a5bc24be0e4540c7e0c51e

  • SSDEEP

    1536:yOcjUpkWb2TTgKwuPOcjUpkWb2TTgKwuu:yOcjWJu7tPOcjWJu7tu

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Disables RegEdit via registry modification 16 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 56 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 40 IoCs
  • Drops desktop.ini file(s) 9 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 50 IoCs
  • Drops file in Windows directory 32 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 57 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 7 IoCs
  • Suspicious use of SetWindowsHookEx 57 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe
    "C:\Users\Admin\AppData\Local\Temp\d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1080
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1796
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2020
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2248
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4656
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3244
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4608
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4472
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3460
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1412
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4252
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1296
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1304
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2640
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4476
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4064
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4176
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2668
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5096
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4332
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4888
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3016
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3116
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3012
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2768
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3544
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3532
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1436
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2880
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1480
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4252
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2396
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4396
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5104
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2812
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3800
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5024
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2172
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4996
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2936
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3004
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:632
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1292
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3952
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1416
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4020
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3300
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3100
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4040
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1084
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3052
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1436
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2728
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2136
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2684
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\4k51k4.exe

    Filesize

    91KB

    MD5

    41b75d6b0894e7178fbe49d5b3d63940

    SHA1

    787260083b19a6638a9ff90247f183547c7ffec9

    SHA256

    c613abbc122ecf0500da566317cd35d305f61c98dc447ae00fa4097ddab2409f

    SHA512

    83bb8ce40252910579645dd26449e4709b9e86fb94e6e0da06c97ff31d7b0d90614439fe725a11844e1d0cb08fa530fa1d261a3e3a310f76260f3fd530a280c4

  • C:\Puisi.txt

    Filesize

    442B

    MD5

    001424d7974b9a3995af292f6fcfe171

    SHA1

    f8201d49d594d712c8450679c856c2e8307d2337

    SHA256

    660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

    SHA512

    66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    b5c3e95022adddb0ebd4dbd549518283

    SHA1

    afabe86d7321440c5cb70eeb268334445b78687b

    SHA256

    c5b9d7c861f5e0711b9d3f882347a6f3e7bccc98390e7836e0e96ad9cfab291a

    SHA512

    108b6c8573de8196f312813b0508d1a0c5a13d2a53ed15af6b24408ca080e75fbe1c121ca746e9bd273a807d49cd876835f9bb047970f73da8152cdf80a84f14

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    ba1302b049d414fe1272e886543860f8

    SHA1

    6fa5f36c3be9657b0f927e9f89eb18710b63f022

    SHA256

    a975ba37abca29c45b5dc68f87c93356397c4b5645e34c689b6e61ee73ef77c9

    SHA512

    d11f513ce0823e8ea9d051e8c01451223a5dde8773e53d19c9f9c3a1f214c33392a23a523e667fc0398e96b359a21fd824af8448fc41290310522db0e3d49b56

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    b1ec8260d98edae04f2a54cc3c729b88

    SHA1

    fd56b826064300af21a0a27f64dafd7242ea7338

    SHA256

    c9da89c2fb910e85a59777b6cda4a09218149602e55c329eebca281f88220e23

    SHA512

    3aa34e46cb6aec37d1dfea8f48d060a03c3e25c7026983e32a8bbc984abdad36c1ac570bf043ebb6ab047e8c25a08354ffd8c32f4b270df9c8765cd9c998b121

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    472e14ba517e55fa574a44da87b0b751

    SHA1

    a880337004819dd0da12464b0565826a34060e5b

    SHA256

    2d420a48d32a17b03ef1721d4dc8af9111dd9343698c8719e3ab46b484b0f686

    SHA512

    1069d626c7909fed14f25b206d0adc4c16252402f87eb40ee89f93a2386d4ee9e426cce450efa9911fad5518ea3201983f19fdd6177d3676446ba5dc1b241c19

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    7d9b32fc08c0d785065918b7ea775761

    SHA1

    926c6ced032a0c9a3968832464e3e098f7016a9b

    SHA256

    464ff09f3c895246c1453e27c0bcdcfe16c649dcc4b94328128c6bbc24bb6009

    SHA512

    e3424bbadb94dea36e6d898427ccbfe184766bea80289947f4ddce31e3077dc60b47c0052a05e051c2f1a21b15bf65029047bbc565e8b49f174388148a786093

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    a1251190bcef0dbe6e7dc45b5ee7feb3

    SHA1

    63b17ad4571ffc28b33f537c3e36f8cdeea7555e

    SHA256

    d9091b79d5200bafbd337473096b1b08bec7ca87527d817ebb12f6be645d0dda

    SHA512

    693b25fba9a299fc93af7ffb8e489170beba9f53a23f2b463fac4f326155cc47117584164efffdecc40d707b899fcbfe5954bfff44a5bc24be0e4540c7e0c51e

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    0e2a84efa08ff569732a7c93c0ce9beb

    SHA1

    325d012ef8bd00883734e90ec3d4c1873e7cb7bf

    SHA256

    354d54f07ad124de06f8e8780a5d94fb2c7927e945112bac45343243e5e34747

    SHA512

    9c41cfbd76c003421f11efd6862fd1f6c753e43b818b9203d0b9b29e9c561f9241f05728c19d5a60d34f5a31122d536a42dc47655fd90d8a0ae9a209915065b2

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    54febab3f0d2bf4431114e5ff6e204c0

    SHA1

    1a23cef72b5badd44ea802cf07d0478913d1538c

    SHA256

    0e126823031deab229f097630f7f74e227bf0a2b5c0d0cca058a645d99ea5877

    SHA512

    0ac54111a8418a0d39c268292f35196cab6ea525d54bc6e03013f1d233e4306f92f34882ee926385dd6e9ba35171495513f5953b25798e5950c69fb283ede022

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    70016dcf60da3939471962d59f2613eb

    SHA1

    8ea22cd95119ab19b4b6939221f9d7e7b174f818

    SHA256

    649d34ce5e98ce810ec63ff5575dc8884aa17ac9214e697b184136d6617d99a4

    SHA512

    7011956b02d8f7063b2c023eb4661a9b52c1ba5b10070cdc8e6166c165b4de8aff2537932e4314307149360b23cca09b6cbed22892253342f9a78962fc70ceb8

  • C:\Windows\4k51k4.exe

    Filesize

    91KB

    MD5

    71130eb5f513ef7788704a6087d9984a

    SHA1

    a1a6429d4b14d6205154fff36d993a3306b138d0

    SHA256

    cc5e81390982d5bde2e0752c9fb920df72870525aa39809d8a012b7899e6ff66

    SHA512

    02bbf0183fb9f91210c094f8dd919db3473fddbd4a076b3f684368706f52e516840d18e52b616c9ff1aee2dc8e91598a313fe1dfeab1903c82ab1d2f0e10e6c5

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    e088c55c42c39b5930cd22120d1af909

    SHA1

    75606dc49cc0e7214ad2b326b2ce3d479a825191

    SHA256

    b86b9bfbc597edf7d2fd9d16126c33f17b1d0ed939faf56867f24d33f3f0f672

    SHA512

    11a9f035793076aac59474ce62e374a56e5c5db541c69913d19eec12c5f8e1eceff87fbe19dde8e796cd1093b19b208c5a626cbf0a020681cfa178e91cfcbbc5

  • C:\Windows\SysWOW64\MrHelloween.scr

    Filesize

    91KB

    MD5

    1fab0b4c5dcd0d92f136fcf906fcb208

    SHA1

    c30ad9fb9cb31e57d91bcdfd44310065bc8f1ff6

    SHA256

    f8d646207f03ac580eb533f76eb206c086bb64e100a0795651250d233029bae9

    SHA512

    7dc3696518053b7fe511857e85bf6f6b3fba5fc70de418e9d63457c9a4d90cb060d508c4110c507445ed5d4a4cb6cfb477b2d9339c9b88b514130a8f0059ecd0

  • C:\Windows\SysWOW64\MrHelloween.scr

    Filesize

    91KB

    MD5

    fd4ff240470561c0c199a101018801d8

    SHA1

    fee1357f47e28ab1de1e33f04664ba253261ed3a

    SHA256

    0cdb197f1e4d5427aa44d4efbb4ae4d3ae9bd9724a558c613972ef0d57644998

    SHA512

    7fee620bb6710832b7cd296728c2125d7ad1b6f4d6e7344af98dbe034289ec959dc97d597ecdb3c112238fd07de95f9da993b77e4d5d6e0d086104699eb7d86c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    e227ce22a5da5a5835a82ec01634e047

    SHA1

    74e59340682fd6d524fc6ea952541994429b5737

    SHA256

    1937c6685874015e95d5127a139ece79eb6a11e59f678ea4011cc096e5f89ddb

    SHA512

    423fc69502bfd26517fcba834c1f54b1ee6910f4ea723a04d5ab34dea8f3c26977aaf83b9e24950f590fcdc43ffd0ada7a2e758915bfb688e734e7885c75a700

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    d2d8d4c08bae899112f545ee60197f76

    SHA1

    19297e95fc7c1e7f321058dbe0eae8dd1d71a3ed

    SHA256

    e53cf8f0dae28cfe1e3e95c4d87b11de711fd36d119475365e34dd3ca87b2d93

    SHA512

    3c98a219221d48d7d08e7ba1909f0240f7f04be2796d22af8607a9614ad32afbad0bc8d9adc258c333a2a1f3b2b9db9e00d6f05b3d3992d87c2e2c8b1bca6fbc

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    1ec423ffef1d841fa024cb9e43181944

    SHA1

    95bb77f77531c5693ac3abb46eeec243a9ab3094

    SHA256

    dc95f0c46c2ac28ed47d308fb63a4c2bb00a4a67543d65a5021ca8df84208ea3

    SHA512

    cd19147c7783a27bc02b158fd24dd72db0e1398b749967125aa8202cd1168d979d64011058ed7b07a2ba4132ef178c46ca29dc014691ab9400f0b491deb1bfc4

  • F:\4K51K4\Folder.htt

    Filesize

    640B

    MD5

    5d142e7978321fde49abd9a068b64d97

    SHA1

    70020fcf7f3d6dafb6c8cd7a55395196a487bef4

    SHA256

    fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061

    SHA512

    2351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9

  • F:\desktop.ini

    Filesize

    221B

    MD5

    eac89efdcfea825026dfab7138c6bea4

    SHA1

    8f72066ea7dd029348abda8efcffbd5df407d9ab

    SHA256

    a0dd10de1158a4d05ea916c190bf95dc4c53ae3851c47ab8449a9ce96943334f

    SHA512

    53be6131110d45808a26f442cf3da2244a9380e5f5747e0498bd8fcf54dec9cf4a230c413b0e54b5caaf9eb222f78f3932733f2479cb6b591613af41dc3e2f98

  • memory/632-481-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1080-147-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1080-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1084-490-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1292-499-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1296-203-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1296-217-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1304-305-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1304-226-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1412-539-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1412-225-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1416-512-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1436-508-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1436-327-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1796-221-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1796-538-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2020-219-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2248-228-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2396-432-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2640-335-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2668-540-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2668-230-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2684-531-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2728-518-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2880-360-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3004-291-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3004-543-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3012-418-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3052-500-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3116-393-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3300-528-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3460-404-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3532-316-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3544-263-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3544-541-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3952-506-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4020-520-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4040-544-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4040-314-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4064-382-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4064-375-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4176-395-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4252-201-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4252-197-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4332-330-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4476-361-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4656-311-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4888-340-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4888-346-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4996-407-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5024-349-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5096-264-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5096-318-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5104-278-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5104-542-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB