Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:37
Behavioral task
behavioral1
Sample
c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe
Resource
win10v2004-20240802-en
General
-
Target
c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe
-
Size
91KB
-
MD5
2b237e30ace1840eb0f0cf2151b599a0
-
SHA1
33dbfda47ed0b1d136f3d288507da6c425e64b11
-
SHA256
c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ff
-
SHA512
3b93adbbec97e0869d8aedbeab70dd6b47723423ee2da745a88c0d4348398137a8353adb7efde73cfcf00937cde4c75db52c877ffe1393e05f38ac989eba0113
-
SSDEEP
1536:XRsjdLaslqdBXvTUL0Hnouy8VjgRsjdLaslqdBXvTUL0Hnouy8VjK:XOJKqsout9gOJKqsout9K
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2096 xk.exe 184 IExplorer.exe 3592 WINLOGON.EXE 2036 CSRSS.EXE 4876 SERVICES.EXE 4436 LSASS.EXE 4156 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
resource yara_rule behavioral2/memory/3828-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234e2-8.dat upx behavioral2/files/0x00070000000234e6-106.dat upx behavioral2/files/0x00070000000234ea-111.dat upx behavioral2/memory/2096-113-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/184-115-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/184-119-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ec-121.dat upx behavioral2/memory/3592-126-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ed-128.dat upx behavioral2/memory/2036-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ee-135.dat upx behavioral2/memory/4876-140-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234ef-142.dat upx behavioral2/memory/4436-144-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4436-148-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234f0-150.dat upx behavioral2/memory/4156-155-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3828-156-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mig2.scr c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File opened for modification C:\Windows\SysWOW64\shell.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File created C:\Windows\SysWOW64\shell.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File created C:\Windows\SysWOW64\Mig2.scr c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File created C:\Windows\SysWOW64\IExplorer.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe File created C:\Windows\xk.exe c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 2096 xk.exe 184 IExplorer.exe 3592 WINLOGON.EXE 2036 CSRSS.EXE 4876 SERVICES.EXE 4436 LSASS.EXE 4156 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2096 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 82 PID 3828 wrote to memory of 2096 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 82 PID 3828 wrote to memory of 2096 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 82 PID 3828 wrote to memory of 184 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 83 PID 3828 wrote to memory of 184 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 83 PID 3828 wrote to memory of 184 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 83 PID 3828 wrote to memory of 3592 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 84 PID 3828 wrote to memory of 3592 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 84 PID 3828 wrote to memory of 3592 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 84 PID 3828 wrote to memory of 2036 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 85 PID 3828 wrote to memory of 2036 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 85 PID 3828 wrote to memory of 2036 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 85 PID 3828 wrote to memory of 4876 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 86 PID 3828 wrote to memory of 4876 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 86 PID 3828 wrote to memory of 4876 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 86 PID 3828 wrote to memory of 4436 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 87 PID 3828 wrote to memory of 4436 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 87 PID 3828 wrote to memory of 4436 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 87 PID 3828 wrote to memory of 4156 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 88 PID 3828 wrote to memory of 4156 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 88 PID 3828 wrote to memory of 4156 3828 c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe"C:\Users\Admin\AppData\Local\Temp\c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ffN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3828 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:184
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4876
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4156
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD571be9226814eaa4fc2cb6f7ee33c1bef
SHA172be26674cd10fd386423f50bd45fdebc9631c57
SHA25693bae9c01bf3bd0a6dc82a887aa69e24f48303f0c9d984b4c3fc6d5ec84db4b1
SHA51297a2700f119ad64761ed15306665a4df4ed76b6d0781732986b948d02182f40baff66027528a13456cfd3960d3268740cefd872e98312f2e743175de2b627c03
-
Filesize
91KB
MD54bf897a8d1e0233bd9522bd6993840dc
SHA1df018587188479416e78f16c7a95c1511f870529
SHA2564a863e6fde4197ba8dffdebf5b065d430293ad4a7b4d19b31ae18897bd73b7fa
SHA5122de23e5e4d18d140d5c7112c2641dff88f08949c3d4ddd74ee32022d1d8987a55ac43c1541aa353f56818fe9ef4a568f91fc998fbe3d3cd6f78bc9adfbc64762
-
Filesize
91KB
MD59e411a2e9d17851af56db3f209a5fb07
SHA1a47597d97d5915f15de112b3987e2dd0c8f7f357
SHA25629869eee02be0402d06f46156a4fdf1ce32839cea43e82848ed54ddb2ff582bf
SHA512071c51c9ba6cdf6f9d183bfade1b32da40b7e78c1540b6926480864f31d4b7f7f18faf8701b5ab0cd6dbf9e7415506079033c668d96875da957869328bcad3f0
-
Filesize
91KB
MD531c591329c5c2dfc6746215dc07a2d99
SHA19003f47b558a3da60b7a267efb0c85673eeb9c8c
SHA256516f8707d80c263ae539a891d54af161cab8effd5c77c1fe6c52417f82f13370
SHA512386e71a98f0af3456448cc20fe448514733e2cd1946d7bbe304a0e1255f1b56e6323a1a37bf9475f331045e552810ff48eec1d4d2f861d16fd9519fd0617cc7a
-
Filesize
91KB
MD5237413d4c61b94fe5c88949dd21b4a86
SHA1247c2cf0ad7aaa27b713c95dffb477eaf86fcc77
SHA2566fae87a1c2e3d3f2812620d87bf11aa0c9d8b7de6e18ec23a77d76bf364b9af7
SHA512534347c6021d50cf819f7c62b70430f8c7243ea1f4dd979cb3a2c64c8b2eaca8ea3b98f1504c24da74e441b52aebd16f0d312b16230ebe41a9ea633c4bd7e36e
-
Filesize
91KB
MD52b237e30ace1840eb0f0cf2151b599a0
SHA133dbfda47ed0b1d136f3d288507da6c425e64b11
SHA256c09cc3f87ca2a3f8f95221963d4283202c502453c3c36a5fb6162c0f226040ff
SHA5123b93adbbec97e0869d8aedbeab70dd6b47723423ee2da745a88c0d4348398137a8353adb7efde73cfcf00937cde4c75db52c877ffe1393e05f38ac989eba0113
-
Filesize
91KB
MD58816fb0dfdb0c236b2a016e903d00063
SHA142a61c4c09b05ba668204c3813d8f0aec733a360
SHA25675dea33513380be4a4b3182a659131b968b197c524ac23ef9e0be609d63bd687
SHA5124d641882b014712613b6161685e9b8b5c03198257e67998259f405ae09dbcc3eb6069d1fc768be8ead67f3d05d813f39d383a65049ab2717dc89a471a3c60c49
-
Filesize
91KB
MD5d047ff220dd98bdc2b03ef2b21bf5f1a
SHA190556030756ae6a2be04c157e3359695e7b308cf
SHA256031edeaf633e2c333a9eb582e9f72ffb1167cb439b2e08aff5d32a90c4f1f4e2
SHA51275de45d2bb0b9b6d74cc1f44fd611f25a8b63b367ca54c76ef4adce17f5c0237227149042b80befaee7b22a3d465f7f6a015b04dcb23baead28b9bf19b95f1fb