Analysis
-
max time kernel
102s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 10:36 UTC
Static task
static1
Behavioral task
behavioral1
Sample
95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe
Resource
win10v2004-20240802-en
General
-
Target
95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe
-
Size
91KB
-
MD5
26c2701dd9f51b47452eef3c5c9b3b60
-
SHA1
a925fa09e6f938f7ddd90227253b4765cc6d4dd6
-
SHA256
95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ff
-
SHA512
6c7364f682cf762a8e792447d93586d98df9d4200cb2e5c46b66f0f55ec57f419a33f9454e643fd5902d8d4be862ff97009d401388a6a5f25d74fbfd9fab89a6
-
SSDEEP
1536:8AwEmBj3EXHn4x+9aa3AwEmBj3EXHn4x+9aR:8GmF3onW+Ma3GmF3onW+MR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 484 xk.exe 1892 IExplorer.exe 2408 WINLOGON.EXE 1296 CSRSS.EXE 1164 SERVICES.EXE 288 LSASS.EXE 2800 SMSS.EXE -
Loads dropped DLL 12 IoCs
pid Process 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File opened for modification C:\Windows\SysWOW64\shell.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File created C:\Windows\SysWOW64\shell.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File created C:\Windows\SysWOW64\Mig2.scr 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe File created C:\Windows\xk.exe 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\Desktop\ 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 484 xk.exe 1892 IExplorer.exe 2408 WINLOGON.EXE 1296 CSRSS.EXE 1164 SERVICES.EXE 288 LSASS.EXE 2800 SMSS.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2388 wrote to memory of 484 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 31 PID 2388 wrote to memory of 484 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 31 PID 2388 wrote to memory of 484 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 31 PID 2388 wrote to memory of 484 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 31 PID 2388 wrote to memory of 1892 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 32 PID 2388 wrote to memory of 1892 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 32 PID 2388 wrote to memory of 1892 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 32 PID 2388 wrote to memory of 1892 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 32 PID 2388 wrote to memory of 2408 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 33 PID 2388 wrote to memory of 2408 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 33 PID 2388 wrote to memory of 2408 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 33 PID 2388 wrote to memory of 2408 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 33 PID 2388 wrote to memory of 1296 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 34 PID 2388 wrote to memory of 1296 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 34 PID 2388 wrote to memory of 1296 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 34 PID 2388 wrote to memory of 1296 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 34 PID 2388 wrote to memory of 1164 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 35 PID 2388 wrote to memory of 1164 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 35 PID 2388 wrote to memory of 1164 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 35 PID 2388 wrote to memory of 1164 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 35 PID 2388 wrote to memory of 288 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 36 PID 2388 wrote to memory of 288 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 36 PID 2388 wrote to memory of 288 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 36 PID 2388 wrote to memory of 288 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 36 PID 2388 wrote to memory of 2800 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 37 PID 2388 wrote to memory of 2800 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 37 PID 2388 wrote to memory of 2800 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 37 PID 2388 wrote to memory of 2800 2388 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe 37 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe"C:\Users\Admin\AppData\Local\Temp\95f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ffN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2388 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:484
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:288
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD526c2701dd9f51b47452eef3c5c9b3b60
SHA1a925fa09e6f938f7ddd90227253b4765cc6d4dd6
SHA25695f074c0032b153e2cfff58cf8d4f5e4d1894df272692fb3cd65527cc84033ff
SHA5126c7364f682cf762a8e792447d93586d98df9d4200cb2e5c46b66f0f55ec57f419a33f9454e643fd5902d8d4be862ff97009d401388a6a5f25d74fbfd9fab89a6
-
Filesize
91KB
MD5c08b24ce9ca4ba050c264d475abd32ec
SHA15f28dd9d1a3d2921a88ddf8fefd30b9f0bfb80da
SHA2566ea85edbe540c5ec4328eebe7743cf0dafc35e45d40abd9e053a6369d9ec0c77
SHA5126a708b56cbe6481f243e09bfb6e9b273c4295dcbff9fff8f757110e1f3ac6d0e1a811310a73d8469846683a04e941590fd11c7f18a4b6087f5f23e29f71da9b7
-
Filesize
91KB
MD53799ad1a58abd9ad7234509fba67d4a5
SHA1c426abf1c5ed7c2677e7f71c08be68d7df3a1fa4
SHA2569a49526df7918df5a8d59f528ecc0dcd915a94822d792648be2dba649767c43b
SHA51262532f988e4ac6802775f1974827c27adbc8025851fbb5e9eba3062da895ecbe56d48657d224760165740344089a9aba7f3a452712a062d9383b8f8d1839ca91
-
Filesize
91KB
MD5eeeb958e139039028ebd4681e1a67ccd
SHA1cca41a5319e69b4a5e45c377fde14ef0d6165bee
SHA25660970163ef7350d53a8387b0775488e5ae77eba88cb54e00d656ca09527508b4
SHA5120c16fa236dea1769173724d6ec34de4cd72e72d5ccefcebbc82d3ca7266a982165101a559a1b53534d3cd4569d42afebd11fd87234ec6f3898f6b33e6edb74d9
-
Filesize
91KB
MD505806f8f9ffd00e498c6074a5f2f93f4
SHA1e2330b2047dac76e67094618ce2c4b2422ed6011
SHA256ac6fdd137bd0cdb12f1ea7ec6ca147eee8a36245abcc30d3526ff4575da73614
SHA51270eb8be603c922028bdd1696de1c96f590dffc17a1233939fce723b263040b9e8360cf39cec7e729b2af4183fe498f248bde6aa315a7561f875b86d91055551b
-
Filesize
91KB
MD599e2b1bc42b7df84dc3f087c6a46c30d
SHA1e0679c34015e224e035aa851d2a4698b124fd63e
SHA256aa90c7d0b8fc23f600452a1c3376bfee9d2e3a60e16312ce3423cd0178386e29
SHA512dc72dc86ccb35fdcff9b52b0b35f26ed063adb5b0ce187416800ba19e1912b4c456e5c03ad471884faef076cbc8399e8b265d1ac037a3398210f44b9395a3aa1
-
Filesize
91KB
MD50bfd5147c13b63299f13d0261700076a
SHA174dd1f72fb2a2a6aeed64cc39d0f2ed976156859
SHA256809a42885b3e7371e8c8b7d8153cb796731c4f6308822856696d9e6945fbd105
SHA5128883bba21b400b35bbf450fdd70fed98e3b48f51fae048fc21d809703fbd01a8a7d2bb304680fa0bb6bd71afda6c6a7fa56896fccd24c638b27b127d0237eb29
-
Filesize
91KB
MD5f7a896337ab218cf78ef3ee71b59def7
SHA13c5fd73005d8506e5b17a7a864dc90abe4688c4b
SHA2568c9925d957b1f735f4ea5cabf17d7d43f3dc45deae3852948a9f27a849dec8fe
SHA5125bc4a692d0375f7dd1541d273b9d10ccd123afc85c40cdbdedafb8457214d3ab9788fc2d6ff600b8918864be818d4f4907a3d26fe512b83d5d1ab5a5650f2200