Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe
Resource
win10v2004-20240802-en
General
-
Target
43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe
-
Size
45KB
-
MD5
097b86281d6791d219db3e87794fb060
-
SHA1
1a6cc5a02809ed2d5e58b61a4f8ba5607e9a42c1
-
SHA256
43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7b
-
SHA512
9cf82bd2c88d26f38ffb29976ed4a70f59d6ede7c053aab3260f16f5b5bdcc3b2f2549e9409133b13d8f12b58bd2a5a4af34277f2d2bf84024cc13ba0e92828a
-
SSDEEP
768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nECb:1AwEmBT4JzRJwEeUW7f12xULgJzCb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3472 xk.exe 4692 IExplorer.exe 3668 WINLOGON.EXE 5004 CSRSS.EXE 3992 SERVICES.EXE 2452 LSASS.EXE 4328 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mig2.scr 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File created C:\Windows\SysWOW64\IExplorer.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File opened for modification C:\Windows\SysWOW64\shell.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File created C:\Windows\SysWOW64\shell.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xk.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe File opened for modification C:\Windows\xk.exe 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\Desktop\ 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 3472 xk.exe 4692 IExplorer.exe 3668 WINLOGON.EXE 5004 CSRSS.EXE 3992 SERVICES.EXE 2452 LSASS.EXE 4328 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3472 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 87 PID 1556 wrote to memory of 3472 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 87 PID 1556 wrote to memory of 3472 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 87 PID 1556 wrote to memory of 4692 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 88 PID 1556 wrote to memory of 4692 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 88 PID 1556 wrote to memory of 4692 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 88 PID 1556 wrote to memory of 3668 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 89 PID 1556 wrote to memory of 3668 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 89 PID 1556 wrote to memory of 3668 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 89 PID 1556 wrote to memory of 5004 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 90 PID 1556 wrote to memory of 5004 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 90 PID 1556 wrote to memory of 5004 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 90 PID 1556 wrote to memory of 3992 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 91 PID 1556 wrote to memory of 3992 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 91 PID 1556 wrote to memory of 3992 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 91 PID 1556 wrote to memory of 2452 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 92 PID 1556 wrote to memory of 2452 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 92 PID 1556 wrote to memory of 2452 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 92 PID 1556 wrote to memory of 4328 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 93 PID 1556 wrote to memory of 4328 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 93 PID 1556 wrote to memory of 4328 1556 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe 93 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe"C:\Users\Admin\AppData\Local\Temp\43085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7bN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1556 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:81⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD58fe7fe051aed3808cd164aef3696c4e5
SHA12a287934783495c38bc30be90a49cd56e9739eae
SHA2560a66b40d8bd68cdecea558ddd05e5d5404b90c1fb6a18e9bbe246c5069b0f908
SHA5126d9efd7f115d72a1a417dba62d8858a28bb9e6d7d0b501a034ce2abd83e3fdb15e1bcc834a16f39d66adbb465ea0082e31cf0900480eda6ad4b7897f4cc88ea1
-
Filesize
45KB
MD57d9223600478a36ec837b45328dd8488
SHA16e372b0d93ba44891a0b9e57ec796a4fdb26357e
SHA2567c7f53ad94ebe31b6c881d95ccfe47bee48208414dbc01407a587b3d3ae96871
SHA512276f9c4dd6b924324e5c6e8b4a7858bc8a169cd6377da8f590f437628ce616e6f72077a8ff51fb724d5543b4bef2e02c8f03090ccc52ac75b7b470540cbda29b
-
Filesize
45KB
MD55b7ee0db84fb70c76c0f4893ec5aeafd
SHA1a5aeba4607f8394fa3a2054e1dec6c1db7dfd5c5
SHA25689d3460cc64b14441096db197ee0d6b86fe8a7875309efdd7e429d929bb2f237
SHA512256e165e5d2cc02a1ce46f8ec69cf9e1af7c21253c735f5ba44261696b4673fb0fd217c2565b42a0cd2cdebad91aad0e49f6b0b79effccac35360337783399b7
-
Filesize
45KB
MD5097b86281d6791d219db3e87794fb060
SHA11a6cc5a02809ed2d5e58b61a4f8ba5607e9a42c1
SHA25643085352cab4a17df251d25b75a85fac2da3b777fc3c3e0a99c9270581b9aa7b
SHA5129cf82bd2c88d26f38ffb29976ed4a70f59d6ede7c053aab3260f16f5b5bdcc3b2f2549e9409133b13d8f12b58bd2a5a4af34277f2d2bf84024cc13ba0e92828a
-
Filesize
45KB
MD59afef5fdb7e28852e3d34c069484dfd2
SHA1a34245577729ba48417484049c28b0c7bdd3d937
SHA256b7d159bf381f97526870f43fd7dc6ee3a78de0ae6e22ece875894ce5fcd06531
SHA5121fad1d5cef33d6655798f8a556b695a18faecfe40a574a86934df0cc434c0069289d715fd12fa193f47c22a5ca63f62163c41faf500887034f2e2a058801bec7
-
Filesize
45KB
MD58718c01f79a541d883422db9972bf0ff
SHA1e9d404f0590e483c5f519db49072327b3b306901
SHA256fc53b0b0dba7f88e9fe34e05abed8336097ed37eca2918aeb5eddd4ac4121516
SHA5127d7bc4d376fa217112e78bd42dd919d1de84d1b4e59cc14d839795b5ad08ddd7f1c550f686298323bdb03d682001326f33282db704b957095df695037e6ab0f2
-
Filesize
45KB
MD5e3ee2c03fa838aedd22b67b9e799c10b
SHA133a954fcef4c056424e5b9e0e2ebcd20f91be0e4
SHA256a608d8edb7d012636fc4b112091f7884f57efbef5451420e69b1ab3be9d575cd
SHA512e617734d39a0d081627e12f90cf5946179c6a88661b3cf1a539d97559ade9c4b787a9b2fb28c061f664473beb5e556e330af70ad6151d4e4763c4973ff910fab
-
Filesize
45KB
MD5190ea9a65b7fe6f76626f726d1dc243f
SHA1b10ac7e48e7653ad342e5a37034b3d7da48a1d6f
SHA256e2f5eade992a30ca10ff7c685f20ad33b059468964d61f4b8a476173beb6bd0a
SHA5123c727d1e7b4474f7c76f53240bea9d8290d09a20539f2bde02245abedf9952f537712f6b2cc41c0025610d0b64e844c1aa1f6370ab20b801833068622bec4ca5