Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 05:14
Behavioral task
behavioral1
Sample
d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe
Resource
win10v2004-20240802-en
General
-
Target
d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe
-
Size
63KB
-
MD5
76f9dbccaef55bacde3b372f2a02b3f0
-
SHA1
290f1635e8d357fb9bd9a5d361e9e6e6ad187221
-
SHA256
d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466b
-
SHA512
0080d834a121217fb1a344201b0305ceb77b6b3c3c988fb1576461a0190f480d56b79dab78d1c45d578297ad46f2108f87490ce31e4119edc7275a349e91a24e
-
SSDEEP
768:jSxam3Usjr3REXXr8yxFChMp7v9DLKrzCnbcuyD7UVeQI5nodcAvcV4RP0U+t6:jRsjdEIUFC2p79OCnouy8VDiAG4RsfU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 436 xk.exe 1368 IExplorer.exe 2308 WINLOGON.EXE 3764 CSRSS.EXE 232 SERVICES.EXE 3644 LSASS.EXE 3020 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
resource yara_rule behavioral2/memory/3780-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234aa-8.dat upx behavioral2/files/0x00070000000234ae-106.dat upx behavioral2/files/0x00070000000234b2-113.dat upx behavioral2/memory/436-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234b4-118.dat upx behavioral2/memory/1368-120-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2308-124-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234b5-126.dat upx behavioral2/files/0x00070000000234b6-132.dat upx behavioral2/memory/3764-133-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/232-138-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234b7-140.dat upx behavioral2/memory/3644-147-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000234b8-145.dat upx behavioral2/memory/3020-152-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3780-153-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File created C:\Windows\SysWOW64\shell.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File created C:\Windows\SysWOW64\Mig2.scr d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File created C:\Windows\SysWOW64\IExplorer.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe File created C:\Windows\xk.exe d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\ d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 436 xk.exe 1368 IExplorer.exe 2308 WINLOGON.EXE 3764 CSRSS.EXE 232 SERVICES.EXE 3644 LSASS.EXE 3020 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3780 wrote to memory of 436 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 82 PID 3780 wrote to memory of 436 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 82 PID 3780 wrote to memory of 436 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 82 PID 3780 wrote to memory of 1368 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 83 PID 3780 wrote to memory of 1368 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 83 PID 3780 wrote to memory of 1368 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 83 PID 3780 wrote to memory of 2308 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 84 PID 3780 wrote to memory of 2308 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 84 PID 3780 wrote to memory of 2308 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 84 PID 3780 wrote to memory of 3764 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 85 PID 3780 wrote to memory of 3764 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 85 PID 3780 wrote to memory of 3764 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 85 PID 3780 wrote to memory of 232 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 86 PID 3780 wrote to memory of 232 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 86 PID 3780 wrote to memory of 232 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 86 PID 3780 wrote to memory of 3644 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 87 PID 3780 wrote to memory of 3644 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 87 PID 3780 wrote to memory of 3644 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 87 PID 3780 wrote to memory of 3020 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 88 PID 3780 wrote to memory of 3020 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 88 PID 3780 wrote to memory of 3020 3780 d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe"C:\Users\Admin\AppData\Local\Temp\d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466bN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3780 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:232
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3644
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5df636b82d77c026ba4d5bdc244723670
SHA122f82e3b8a1b2d279e703301b27a640a8f40301b
SHA25604f6bab4bf6529bff07a69506b43e569e48da5dbc283d9572ed6596fdc5641ea
SHA5126a3c4739db846eec70595da35a79717212289562d2d7be3f3c9894021454f75b2be00bdd452b5169dea7b6d6767a2a5720648bd5ef86df3405fb060795605a69
-
Filesize
63KB
MD56a014b312ff81310a8d16d46c626ca92
SHA1a2aba769f823af957805d846284548f5fa8caa91
SHA256eb933f6b2c8a99d27a71f317861a0acfe4c715edf9cee9b9c3b284a248426a7c
SHA512a87bfd0ce9b58f9b08b9b7a7305ffd6472891c4c91253cc0c6171b615afbc1779b8646e40054f354282768c4d509735c4b2d86bfff9e9afac5e8bec84adcd54d
-
Filesize
63KB
MD555ddbd8156f62f0861c2648a8ec30341
SHA1d472e41b846ccab3a43a71bd11895c978bf1e17a
SHA256240c420c8389a787d8f72c6226235b49f6355ca906d1d7cbdf57ae6a59544591
SHA5122ff7e103d7f52f13809182bf34bd7002f51df209fdadc05933a38d7f5ca72a32a2ac8dbb1b4095ab9cb88d3dd776ab39b09750274cdfab5e57af27fa2150a623
-
Filesize
63KB
MD5287c23e4bf51f81fbc3a3c88bc925982
SHA1669161374c9c6a2dd430ab5aff7e31aa565c1227
SHA256191207308cdad206a96e45204ab4a61701fc03ed4d22512adb58a5119a9660c7
SHA512247b8f82a4a8f88212de187391fbba280ddcd8288e3438a56f49e9efbbabc8ebaf1ec10d1d587dfccf706f4b4bbe5e4ed3f13a31426289514cf88ab5b959de6d
-
Filesize
63KB
MD51fa0d52facf8789ae8a172ddc4bae00f
SHA13f559b5bd24d89420d43a5d85a2726e4c3f5672b
SHA25635960bb19e190dacd2efb6f496e26da5d5cda0afd4db70af5151d8dd7c60aba9
SHA51219b381f4dd3e8c1fad4dade85aa0edaa3532d8204488bea95a75dbdb8ed74169796a5badbf4ee2c7b6b5ac6ee54389bde02020d06eb29559fb47157aa4f23d57
-
Filesize
63KB
MD576f9dbccaef55bacde3b372f2a02b3f0
SHA1290f1635e8d357fb9bd9a5d361e9e6e6ad187221
SHA256d1f80878a34d33df0da9550eb796c89cf057501c29b9cbf06468b6a5261c466b
SHA5120080d834a121217fb1a344201b0305ceb77b6b3c3c988fb1576461a0190f480d56b79dab78d1c45d578297ad46f2108f87490ce31e4119edc7275a349e91a24e
-
Filesize
63KB
MD54299289b5636f0ba5ce55889a57dd61f
SHA15f314441b678bc15f8ca0b2468facd0870dff32c
SHA256b4c23bdeef3a6efe21538883fc053a67a54591a8c540eaaf55dd2bd0e04be0a0
SHA512117869604dc8596b886a16974082f18b1c7e37c9b77b6262a7bb50fd4616ffee324170e8461012e4a2ff94227ea30a310e25a771a06b126bdec7169f89815106
-
Filesize
63KB
MD58a8f1d033abc1992cd98481861ad8e0d
SHA13e6c62303b63dcbf8e0d64d48741829b0e6852b5
SHA256967c7a2a8523f80ece7c5a68e3f391cbf1c0e7de5239e37b534b39b5e423a3e1
SHA5128ed57713b49b5f8d3187df9a38c41cfb0f914cc6d22c3a4ce5a933f98c8da9f697085414db651a9362a014dc35fd445335cc20b2a56143cb2a08df633969f7be