Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe
Resource
win10v2004-20240802-en
General
-
Target
1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe
-
Size
45KB
-
MD5
fc04ee8fd24f7b363731651f601b4cf0
-
SHA1
54b37e1124d1a95b3786fb63acbee106b210d3ad
-
SHA256
1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0db
-
SHA512
93a38c2b3b5e8fc23cc4d77131da7ee06d6d1ea4eefb5c07cf9604d71a16044a1f3e4fc1b702c9cdbd91d92be57baa6d08ab1d6da42f885649e62eafe654e26f
-
SSDEEP
768:xmFQj8rM9whcqet8Wfxd9Mmnfa+TAOBJgZiPGyilSniJO14ktp7DFK+5nE/:zAwEmBZ04faWmtN4nic+6G/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 4484 xk.exe 2160 IExplorer.exe 3544 WINLOGON.EXE 1720 CSRSS.EXE 3688 SERVICES.EXE 3284 LSASS.EXE 4828 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File created C:\Windows\SysWOW64\shell.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File created C:\Windows\SysWOW64\Mig2.scr 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File created C:\Windows\SysWOW64\IExplorer.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe File created C:\Windows\xk.exe 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\Desktop\ 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 4484 xk.exe 2160 IExplorer.exe 3544 WINLOGON.EXE 1720 CSRSS.EXE 3688 SERVICES.EXE 3284 LSASS.EXE 4828 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2044 wrote to memory of 4484 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 82 PID 2044 wrote to memory of 4484 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 82 PID 2044 wrote to memory of 4484 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 82 PID 2044 wrote to memory of 2160 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 83 PID 2044 wrote to memory of 2160 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 83 PID 2044 wrote to memory of 2160 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 83 PID 2044 wrote to memory of 3544 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 84 PID 2044 wrote to memory of 3544 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 84 PID 2044 wrote to memory of 3544 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 84 PID 2044 wrote to memory of 1720 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 85 PID 2044 wrote to memory of 1720 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 85 PID 2044 wrote to memory of 1720 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 85 PID 2044 wrote to memory of 3688 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 86 PID 2044 wrote to memory of 3688 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 86 PID 2044 wrote to memory of 3688 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 86 PID 2044 wrote to memory of 3284 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 87 PID 2044 wrote to memory of 3284 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 87 PID 2044 wrote to memory of 3284 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 87 PID 2044 wrote to memory of 4828 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 88 PID 2044 wrote to memory of 4828 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 88 PID 2044 wrote to memory of 4828 2044 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe"C:\Users\Admin\AppData\Local\Temp\1c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0dbN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2044 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3544
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3284
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD569bd1181af6348317548d5717a12f4c1
SHA16c672d4cb220e745168244a08467cefea37729da
SHA256218b2de5826ac9b7a12fcca3a537d9cc8ac0209211ac2b959671a098d438e434
SHA5128f29ced49c9dedb172a14655db6f198e0dd2bee5ef4709733835763301b338c780fddd7dd2e691213191c5332a160de7ee7b4f898f0a74fc30040c31a2822cbc
-
Filesize
45KB
MD5a0e608ca39b5720553076c155807f36a
SHA14c3996d21dc5190ffea9fe82a4fb55a646c418f5
SHA256f5d4de7637d217a78b5f12ca25421a800b772fd49a54f8578535bdc7edf3d403
SHA512f65b1ea7b6a09d9a0b1fe9ea082974e8263d76033bf8952d37674873ebd76d665236eac454f3e5b77b1454fec6d38f2fc4d95265eed74b47b28619edd796eed4
-
Filesize
45KB
MD59075fc2563b60499d84411d3af6346b1
SHA156d841c9b77980bfc6dd83a9dd95a3a7c49e5720
SHA256704e8a41ce7e8bd7128e07ecdf2d07c1f645a8db82c94e441c09a05d33f5b624
SHA512ce53642b20fdbf7cb48aa4a8e44275ce4eb0823f0c6c4621a49d1c12174fa88f29f6092d95aac87076565a65b39562d60899bcdfda3c7d8bdfaed64405f5712e
-
Filesize
45KB
MD5e25f3679afd7d25dcabcef92a70ee463
SHA124411031abccf3b3b3cbea443a4091a66722830f
SHA2563f54527c9a2efc41f44238608e877a11233a6e41ac5c5c0fe9a1ab0c478ed5b1
SHA51279db410dd55597eeda0267c355c875fa9aa32cc2957a0cac548b0cb89738f79be615cf6ffde88b4dc63df18a8a1959577208bedd43cebc44f6c8efdca4855e1f
-
Filesize
45KB
MD5329357452e6485ec209cbcbebb994d5e
SHA116944bc4de57ce189823eef2f1079f07fef04163
SHA2565046dc3bfe018426564e34668d5269693591e7e6c86a0d128642207c49b65441
SHA5127b4bed2d60376f70bdf5b669264ac082c812b21148c64dc3fecca601454450f934ce554ff5a4542f2abdf5b34afce75d6920e3706ee125c28631f3512a700e7b
-
Filesize
45KB
MD5fc04ee8fd24f7b363731651f601b4cf0
SHA154b37e1124d1a95b3786fb63acbee106b210d3ad
SHA2561c9d590072ecd4210edae3f2b91b1296695f18d56b7b98efa944c637ad65f0db
SHA51293a38c2b3b5e8fc23cc4d77131da7ee06d6d1ea4eefb5c07cf9604d71a16044a1f3e4fc1b702c9cdbd91d92be57baa6d08ab1d6da42f885649e62eafe654e26f
-
Filesize
45KB
MD5928fefc71399bc622fc33d0835e08497
SHA1b021aae341267f687bc00df844e4d4fa0cfb15bb
SHA2565f4b5b68fba453379a565e1723b92d333b8fa68de1755d5b709b48c82f3b73b0
SHA512f935f8fe506ea6360e9ec2f1a5aaff2a358217e8fd3a3c73b03807838f3d931e79b9756a6c03fd199178bd222233d0cb7b98bc5136b8893a530910e1edb33e29
-
Filesize
45KB
MD5b7a48b0409434c9d4e3b2a982db5dd37
SHA1b47f6de7dc163a2c7c8c33599a6a43b4df1d2c30
SHA256e923d1611c4d1548f6710bbf4fbed4ec44ab0f4f0a110237b63416a978a122c7
SHA512550266ff1aa47fc6a0a92007366ce0a1b7f766265f38db24f4fd9a184cb0dca50a1797d1d82b4413544afe4437c238c9a8757e532734f1e91aa878344fcbf528