Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe
Resource
win10v2004-20240802-en
General
-
Target
4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe
-
Size
91KB
-
MD5
da8f0e03aed232bed71c53dfa106a839
-
SHA1
a46e7c7a283421202fd8d4e73ec1b3d1211873ef
-
SHA256
4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1
-
SHA512
00157b7a045950644acda62ec2f9f6d3974fc778dc4adc431144f279d6d266c69519ceae609aeab255ea62fe0e6e81cc03e01a375e13991c38626cb35f3d9f54
-
SSDEEP
1536:FAwEmBGz1lNNqDaG0PoxhlzmercgAwEmBGz1lNNqDaG0Poxhlzm/:FGmUXNQDaG0A8erzGmUXNQDaG0A8/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2516 xk.exe 2744 IExplorer.exe 1400 WINLOGON.EXE 1264 CSRSS.EXE 2284 SERVICES.EXE 2388 LSASS.EXE 1900 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mig2.scr 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File created C:\Windows\SysWOW64\IExplorer.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File created C:\Windows\SysWOW64\shell.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe File created C:\Windows\xk.exe 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 2516 xk.exe 2744 IExplorer.exe 1400 WINLOGON.EXE 1264 CSRSS.EXE 2284 SERVICES.EXE 2388 LSASS.EXE 1900 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2516 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 31 PID 2236 wrote to memory of 2516 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 31 PID 2236 wrote to memory of 2516 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 31 PID 2236 wrote to memory of 2516 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 31 PID 2236 wrote to memory of 2744 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 32 PID 2236 wrote to memory of 2744 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 32 PID 2236 wrote to memory of 2744 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 32 PID 2236 wrote to memory of 2744 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 32 PID 2236 wrote to memory of 1400 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 33 PID 2236 wrote to memory of 1400 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 33 PID 2236 wrote to memory of 1400 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 33 PID 2236 wrote to memory of 1400 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 33 PID 2236 wrote to memory of 1264 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 34 PID 2236 wrote to memory of 1264 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 34 PID 2236 wrote to memory of 1264 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 34 PID 2236 wrote to memory of 1264 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 34 PID 2236 wrote to memory of 2284 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 35 PID 2236 wrote to memory of 2284 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 35 PID 2236 wrote to memory of 2284 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 35 PID 2236 wrote to memory of 2284 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 35 PID 2236 wrote to memory of 2388 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 36 PID 2236 wrote to memory of 2388 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 36 PID 2236 wrote to memory of 2388 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 36 PID 2236 wrote to memory of 2388 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 36 PID 2236 wrote to memory of 1900 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 37 PID 2236 wrote to memory of 1900 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 37 PID 2236 wrote to memory of 1900 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 37 PID 2236 wrote to memory of 1900 2236 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe 37 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe"C:\Users\Admin\AppData\Local\Temp\4eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2236 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5abe336368c1c860a86b8d5af8cbbf0e5
SHA1e01781bf5860ed34880ac17791e8c8c533e2776a
SHA256b9ac92cc4fd2110ea6e081599f1919bc8846457b8936c69cd4889a1c6babd3da
SHA5124669c6cedb52f0b491be56ea35bab2813df37856fa91330d60f59899d33883dde27a545123dc6e2b6d60dda158801211c5fe07a86edd2394e12cbeaae964b38e
-
Filesize
91KB
MD5da8f0e03aed232bed71c53dfa106a839
SHA1a46e7c7a283421202fd8d4e73ec1b3d1211873ef
SHA2564eb1bd0f8bf8e8577ba98ae9adcdb4adaf37cbc7af1b4c970f6c82bb16c980a1
SHA51200157b7a045950644acda62ec2f9f6d3974fc778dc4adc431144f279d6d266c69519ceae609aeab255ea62fe0e6e81cc03e01a375e13991c38626cb35f3d9f54
-
Filesize
91KB
MD57398c5ac5c3bc2646cc5ce706930490a
SHA1a760a5594bca87e8e9d0d313f4756b77a5c1c9bf
SHA256c0fb07ed5b7cbce48b16bf578d202119123aceb853696a5925f0438f08996df7
SHA512dac4d1dd2b4483ed8e4f9c16e4a074715676407313252174385680e554c48d1838525d9d6edc77e761ae4b7983f6c42f3adadcd5437ace6ca527bb70cd9f4989
-
Filesize
91KB
MD53ab20e763021517375600a20d6a4dd92
SHA1ca859aee0ea4be426b4ef14a711faaa22bc79a26
SHA2569171ec93af8571ddaa7e2d78a3892bdc2a8ab38dbc6ea2d06526038bb2782dfe
SHA512aa904216b201cbb836a2b8952785104700a1dae67738cdc685024aa23c13ffc36df10213a97074f47ee34e2710c58bc94d3a01f6e26e5c67ede662314c8bee79
-
Filesize
91KB
MD538ebb3d332bbb251f34b04887417f3dd
SHA1c072d7b122928e495a308fe3b4fdd63fc1696ad6
SHA2568ebe9202a6bbfc2cf0ed581323391d3a160dd895d0300c289a5d5e50d24f21b6
SHA51228a1a15c37e79c1291790e5b001da9ec02fef8d815e295d695ecc05115b8147b74914f01df716126e6c9b4cc6b506e0de7bb390b7a1c73fa8b70b5728cbdf27e
-
Filesize
91KB
MD5223076c7f809b63fe5c9ce17339f4324
SHA12d68ad021cfb99df65983c495df36a03e12aed8a
SHA2569479d2bda5a3738f6dc9518afe57e8506df2c45e247cbacf8a635efdc175197b
SHA512cd7a07a0de325ee1af4eebff784bca3b88145c53da606c525fdb69564678e813e8d3ab1a8659d301e97a1778a80fbee03a6e212b4725324fe1d185899cc9d5c6
-
Filesize
91KB
MD5bc81a7312bb5ece3a562765b637452ca
SHA19f312ef261179e4ce947ef266cf9343723dd06ad
SHA25610b6a505819395d3473f809f5d663717b3f3eee814b0e40aab29b17e421d9c91
SHA512fa96d1131025d8b1b80df25177fcdd150c35c364a691efaee68760b8fade03cf786786e89fb3a16cdfec76121fcb1e07937082304161fb3c76324d5e946b6891
-
Filesize
91KB
MD51b14449f93a1e4e19f2b39299072f9c6
SHA1cecc462f66d2da4bf6bce0d0856448f7344ec795
SHA256deca720abe76758de3a79fb7ee6d9375723b2b6c2df150060f8d9469cf667144
SHA5123ad33159a18d96062334cbdb7c36ad65988a477c0fc718f51845a404a4b63976ce216900614f8352ceb9f11e2d355ada25d97ad58adc6cb88c643208fe6be551