Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe
Resource
win10v2004-20240802-en
General
-
Target
3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe
-
Size
45KB
-
MD5
b5ef5fa18f36ee17c985575be18947cc
-
SHA1
1cb811d91db637d80e27b7364437b48797dc59e7
-
SHA256
3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c
-
SHA512
0ebfec1e8b477b09bcf66bd45f701369f962e89aea9b399df0fb98e15c7fceb609deb50b01195fde7f1c0eb80dc9911ffa5c4b50bb303be0e04d45e10a36f452
-
SSDEEP
768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nEn:1AwEmBT4JzRJwEeUW7f12xULgJzn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3484 xk.exe 1812 IExplorer.exe 4960 WINLOGON.EXE 2112 CSRSS.EXE 1768 SERVICES.EXE 5040 LSASS.EXE 4776 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File created C:\Windows\SysWOW64\shell.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File created C:\Windows\SysWOW64\Mig2.scr 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File created C:\Windows\SysWOW64\IExplorer.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe File created C:\Windows\xk.exe 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 3484 xk.exe 1812 IExplorer.exe 4960 WINLOGON.EXE 2112 CSRSS.EXE 1768 SERVICES.EXE 5040 LSASS.EXE 4776 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3484 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 82 PID 2160 wrote to memory of 3484 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 82 PID 2160 wrote to memory of 3484 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 82 PID 2160 wrote to memory of 1812 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 83 PID 2160 wrote to memory of 1812 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 83 PID 2160 wrote to memory of 1812 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 83 PID 2160 wrote to memory of 4960 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 84 PID 2160 wrote to memory of 4960 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 84 PID 2160 wrote to memory of 4960 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 84 PID 2160 wrote to memory of 2112 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 85 PID 2160 wrote to memory of 2112 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 85 PID 2160 wrote to memory of 2112 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 85 PID 2160 wrote to memory of 1768 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 86 PID 2160 wrote to memory of 1768 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 86 PID 2160 wrote to memory of 1768 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 86 PID 2160 wrote to memory of 5040 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 87 PID 2160 wrote to memory of 5040 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 87 PID 2160 wrote to memory of 5040 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 87 PID 2160 wrote to memory of 4776 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 88 PID 2160 wrote to memory of 4776 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 88 PID 2160 wrote to memory of 4776 2160 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe"C:\Users\Admin\AppData\Local\Temp\3bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2160 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1812
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4960
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1768
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5d91c8e8d2e6a377ae4e168f1caf0759b
SHA174eb8223006d93260197ed2c550f6a6e9da20c0a
SHA256b135ea2537274ae7af3555292a6acbcc3baed8747b1a077a7f8daadce365b715
SHA51252800671d599fdd415782d0cb74e5945b9fb7ef8817da82e45518a00096e4ae41f359733c36d7f541d1cd56c81de9cd1388bb4a7b053a93add545324655b9bb4
-
Filesize
45KB
MD531154212d43d31224e01f40376ce89b9
SHA14835e027b30dca89c072b5019ad987a79379efe8
SHA256cca3aec1a17ff4741c0da92406dc0173a6e319972e4a52153ff26ea040d90aee
SHA5125c9127f23bbd399584ee101fc4a1901340dcac32c6755118a1650fb189ba2a51b4a7870186179ca0a97c19b573a92edf0e014c4260c5219b56368a11bdc669de
-
Filesize
45KB
MD5d81d470767f687545ee641c8585a39bc
SHA1624f559a86fceab3a912d13f2e6dec186c4f92c4
SHA2568883847596ec2a7294769ca6422da3a88f14eddcd7de20c0e98dbbd04aeef831
SHA5125ad5202d29f15872694c754058f1a618069b9ec0846f1fef69d27d6616760365f0336909b66159ca30739f6722d8ed07dc1c166905fdb5ed43b263c8d3df9985
-
Filesize
45KB
MD5eacb2b0c0886aedeba9c398dd348c03c
SHA135b6c8f45f09c5b54a84dbd76dddbe9146d360c1
SHA256653612308134678067e8c48c0ed69a4b4a11d2293f0e63fd468632568414aac6
SHA512c7571e2feead73c6f7a4dd055d1e74d066a9cc637778345a6c373fc2d2eceacbe6ca270a87a7a06f28073d0a1afdd33efdcf43133829b77a7de281672f7970de
-
Filesize
45KB
MD5bf6ca5260e8c8838c7f7151dd0701af2
SHA19a2b743e6d39c041123209c04dee8cf3ddb876b2
SHA25671d4752061d75421fd66dff9b679c442882ef785fb96dc70015e2e43e4c79105
SHA512ede7a73aaebe8fd92063df898afa60bae9dfe956332b0cdf0778feebdffc623fd1eb810f659e109c5c2afc803fb3d9d954d4c35b60321f5e9db7e45fa31d6600
-
Filesize
45KB
MD5b5ef5fa18f36ee17c985575be18947cc
SHA11cb811d91db637d80e27b7364437b48797dc59e7
SHA2563bdf1c6844a3e4815ea9e7ea8b3e60a9e73557fce4a95ea72d060c3dc85e5d6c
SHA5120ebfec1e8b477b09bcf66bd45f701369f962e89aea9b399df0fb98e15c7fceb609deb50b01195fde7f1c0eb80dc9911ffa5c4b50bb303be0e04d45e10a36f452
-
Filesize
45KB
MD5aa92f875c753071f0ccb5445a06312e7
SHA17e8f733f987ce255f9d0c706ae44c879aa648b6d
SHA256652416c0d4b6493f48f8e79f14c3d5b33d222791f19909a02816e25992691cd1
SHA512395c5eac169698f12c0266979f9d3ec8636d8ccef97dcde89558ea23243298d74ce14f425264e7d904e3fd2631c9bd13f309d0337bd8fb122af8b561b982dca0
-
Filesize
45KB
MD5118b0610671081ab036149e8cc89e94c
SHA1d7e1e6c1e53c84dbcff84f4d8939bf92b5994ebe
SHA25606da3c372184ae411294e9d1dac3ba2dc4085994b70502ffef153844e1c4bfb0
SHA51273613f2be27af922db44eebae71ca9f05975fc65c392e55e968ab7de33a9fa4638c809780fa6d4b61f2d1c6592a2824e692c7559f831e526e525cc55ac3a3676