Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
Resource
win10v2004-20240802-en
General
-
Target
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe
-
Size
293KB
-
MD5
8c3b257c8eeb716f031d139d0cb7e0f0
-
SHA1
c7830338effc41014091fabf61cf31e43833eee4
-
SHA256
d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98d
-
SHA512
f1680c394e87ad690528cca691dc3522762353bc3958938828764aae65ae1d206b14bb858323740f70acca94ebd3aa46950412a32c90a5e45c263f839ec6a58d
-
SSDEEP
3072:ut9VrYlEYNE+pYO/PZXgNtwVJiyQ2/YO/PZXgNtwVJiyQ2Prlsodwpx:ut9V82Y2yP9UOVJiyv1P9UOVJiyvLm
Malware Config
Extracted
remcos
1.7 Pro
Host
45.133.180.34:9455
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
microsoft.exe
-
copy_folder
defender
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
defender.dat
-
keylog_flag
false
-
keylog_folder
defender
-
keylog_path
%AppData%
-
mouse_option
true
-
mutex
remcos_kqvykhgolp
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screens
-
screenshot_path
%AppData%
-
screenshot_time
1
-
startup_value
defender
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender (2).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\WINDOWS\\system32\\userinit.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender (2).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ microsoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ misrosoft.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defender (2).exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defender.exe -
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run defender (2).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender (2).exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run microsoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1012 powershell.exe 2828 powershell.exe 3056 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe -
Executes dropped EXE 4 IoCs
pid Process 2740 misrosoft.exe 2672 defender (2).exe 1932 defender.exe 2544 microsoft.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 cmd.exe 2464 cmd.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\defender (2) = "C:\\Users\\Admin\\AppData\\Local\\Temp\\defender (2).exe" d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender (2).exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" defender (2).exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" misrosoft.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\defender = "\"C:\\Users\\Admin\\AppData\\Roaming\\defender\\microsoft.exe\"" microsoft.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ misrosoft.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ defender (2).exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ defender.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ microsoft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language misrosoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language defender (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2744 PING.EXE 1180 PING.EXE 2072 PING.EXE -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2796 reg.exe 2864 reg.exe 1748 reg.exe 1004 reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1180 PING.EXE 2072 PING.EXE 2744 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1012 powershell.exe 2828 powershell.exe 3056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 3056 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 microsoft.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1012 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 30 PID 2132 wrote to memory of 1012 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 30 PID 2132 wrote to memory of 1012 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 30 PID 2132 wrote to memory of 2740 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 32 PID 2132 wrote to memory of 2740 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 32 PID 2132 wrote to memory of 2740 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 32 PID 2132 wrote to memory of 2740 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 32 PID 2132 wrote to memory of 2828 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 33 PID 2132 wrote to memory of 2828 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 33 PID 2132 wrote to memory of 2828 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 33 PID 2740 wrote to memory of 2916 2740 misrosoft.exe 35 PID 2740 wrote to memory of 2916 2740 misrosoft.exe 35 PID 2740 wrote to memory of 2916 2740 misrosoft.exe 35 PID 2740 wrote to memory of 2916 2740 misrosoft.exe 35 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2740 wrote to memory of 2464 2740 misrosoft.exe 37 PID 2916 wrote to memory of 2796 2916 cmd.exe 38 PID 2916 wrote to memory of 2796 2916 cmd.exe 38 PID 2916 wrote to memory of 2796 2916 cmd.exe 38 PID 2916 wrote to memory of 2796 2916 cmd.exe 38 PID 2464 wrote to memory of 2744 2464 cmd.exe 40 PID 2464 wrote to memory of 2744 2464 cmd.exe 40 PID 2464 wrote to memory of 2744 2464 cmd.exe 40 PID 2464 wrote to memory of 2744 2464 cmd.exe 40 PID 2132 wrote to memory of 2672 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 41 PID 2132 wrote to memory of 2672 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 41 PID 2132 wrote to memory of 2672 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 41 PID 2132 wrote to memory of 2672 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 41 PID 2132 wrote to memory of 3056 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 42 PID 2132 wrote to memory of 3056 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 42 PID 2132 wrote to memory of 3056 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 42 PID 2672 wrote to memory of 2496 2672 defender (2).exe 44 PID 2672 wrote to memory of 2496 2672 defender (2).exe 44 PID 2672 wrote to memory of 2496 2672 defender (2).exe 44 PID 2672 wrote to memory of 2496 2672 defender (2).exe 44 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2672 wrote to memory of 1652 2672 defender (2).exe 46 PID 2496 wrote to memory of 2864 2496 cmd.exe 48 PID 2496 wrote to memory of 2864 2496 cmd.exe 48 PID 2496 wrote to memory of 2864 2496 cmd.exe 48 PID 2496 wrote to memory of 2864 2496 cmd.exe 48 PID 1652 wrote to memory of 1180 1652 cmd.exe 49 PID 1652 wrote to memory of 1180 1652 cmd.exe 49 PID 1652 wrote to memory of 1180 1652 cmd.exe 49 PID 1652 wrote to memory of 1180 1652 cmd.exe 49 PID 2132 wrote to memory of 1932 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 50 PID 2132 wrote to memory of 1932 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 50 PID 2132 wrote to memory of 1932 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 50 PID 2132 wrote to memory of 1932 2132 d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe 50 PID 1932 wrote to memory of 1264 1932 defender.exe 51 PID 1932 wrote to memory of 1264 1932 defender.exe 51 PID 1932 wrote to memory of 1264 1932 defender.exe 51 PID 1932 wrote to memory of 1264 1932 defender.exe 51 PID 1264 wrote to memory of 1748 1264 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe"C:\Users\Admin\AppData\Local\Temp\d543359dd622e82892a9ba6225d84707a56e723f4f093bdf0c95e27efdccf98dN.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\misrosoft.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\misrosoft.exe"C:\Users\Admin\AppData\Local\Temp\misrosoft.exe"2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2744
-
-
C:\Users\Admin\AppData\Roaming\defender\microsoft.exe"C:\Users\Admin\AppData\Roaming\defender\microsoft.exe"4⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1004
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\defender (2).exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\defender (2).exe"C:\Users\Admin\AppData\Local\Temp\defender (2).exe"2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1180
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\defender.exe"2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\PING.EXEPING 127.0.0.1 -n 24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
2Winlogon Helper DLL
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
6Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5018087124a68d932b08441955984e5a4
SHA14ce20358d6c440c9814ca7b892930f499913401c
SHA256df3917c693593e978512e4fdb0c3f0dc892393c88c1a1b09a2d6afa75e3240ec
SHA51266506ecb809019be202401021d8aae3bd3429b858832d9fc8ae9a90d3d293eeacc802d540c064d6b4a590a5c280317f66214be07a1b965ccf77eaa8d52efcd57
-
Filesize
159B
MD591a2507abed09c48bac27a9204b9f7e2
SHA1d34be7add1f08c7a3c0e6dc4a6251fcbb3620176
SHA25665cdf9c336984b99b79f4d22001adce5527c2bf96d5145f2b30389d07bed18f4
SHA5125f8e0420fa9edb57c980fcd94f350c3d68cf0e92eb00423b33e21f5023cc39f1229d8e7ffcd2ef098bc187fa3eda4652f88aa8871c8695783d360559470dc47a
-
Filesize
162B
MD55737f93a2888ece94ea7e3d0065018a7
SHA15da2432dfcdd598ab1bd30f44d991d17555b2a91
SHA25656daea2ce63233498e7355e41ea7333fc4a4b3f7b747d1da856b2594961ce649
SHA51222c7fa0d0ab7325ec7953bf6b14f7b2a332dbb46819cb664673b773f7fe9844d582833e6416a654799d3ae7ed2e00d91faa275dd05ba8f02b63d41742ecd8b5c
-
Filesize
201B
MD5fe1703cfb0217733080dace7a21c86e3
SHA1afd0b0c55a06ab80f01ff49b890faf9da676c15b
SHA2565e923f2f31cfb11dc2a824a10b0d7e9972e52f54f9e4eec5fe10fa509f1bd233
SHA512a30282dbebd07d986c3d501dfe8ade4e25f5ed8b6a1148356836db38deb12cee3c9679797c7a43e20f1616ba1d41b8b45e168dd2017a17d181636e83f6865488
-
Filesize
92KB
MD5cb70f204cff86929460417f9f9d2006a
SHA10f961fa8ea5c3732fddd7a920840940c5d9ebf36
SHA256199babe8f13c8a6a08754c697bf04df6b6f06c45de3c7ba7b55666f406baf912
SHA51203c2e62316ce6acd3e8c85cba20cb63bbb39a2ef7947a669e0feb45e911d5fe9a6fa87003eb00a9235749a74ed1f8d5e530ae1ed183f0d2f72d038882681d5c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b76ae39e5eb346b484be542ea5646ac1
SHA1ee1f2aa5f1ebb16952572d1542601fca787af19c
SHA256205bba75c50bae16beadb6c7ed019c4f4fbea975d81f1836f2e474ef718ee5ce
SHA512a6ca222e84e02890536c184f433056707562b5a6f7701a863d330656490f6829e9321d7ddddd453d3cbddd71d3c89ed9439b71eee8656c3f146a87418476a18d