Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe
Resource
win10v2004-20240802-en
General
-
Target
fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe
-
Size
45KB
-
MD5
a8d8f49b36d5e4fab1ffe9da8937adf0
-
SHA1
d6591d24a1d52ef7578ae94fdbe961c1ac5edbde
-
SHA256
fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977d
-
SHA512
618dbf518405c270df3eeebaa6ca477da069afba9929405d02fdcfa026f96131a5cdf5c237df9ebf99a8dfb1dbd6aa39960c6a2ce3663043420d1b3d9478c343
-
SSDEEP
768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nEo:1AwEmBT4JzRJwEeUW7f12xULgJzo
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 5112 xk.exe 5020 IExplorer.exe 4336 WINLOGON.EXE 1764 CSRSS.EXE 1324 SERVICES.EXE 1008 LSASS.EXE 556 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Mig2.scr fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File opened for modification C:\Windows\SysWOW64\shell.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File created C:\Windows\SysWOW64\shell.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File created C:\Windows\SysWOW64\Mig2.scr fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File created C:\Windows\SysWOW64\IExplorer.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe File created C:\Windows\xk.exe fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\ fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 5112 xk.exe 5020 IExplorer.exe 4336 WINLOGON.EXE 1764 CSRSS.EXE 1324 SERVICES.EXE 1008 LSASS.EXE 556 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2996 wrote to memory of 5112 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 82 PID 2996 wrote to memory of 5112 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 82 PID 2996 wrote to memory of 5112 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 82 PID 2996 wrote to memory of 5020 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 83 PID 2996 wrote to memory of 5020 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 83 PID 2996 wrote to memory of 5020 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 83 PID 2996 wrote to memory of 4336 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 84 PID 2996 wrote to memory of 4336 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 84 PID 2996 wrote to memory of 4336 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 84 PID 2996 wrote to memory of 1764 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 85 PID 2996 wrote to memory of 1764 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 85 PID 2996 wrote to memory of 1764 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 85 PID 2996 wrote to memory of 1324 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 86 PID 2996 wrote to memory of 1324 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 86 PID 2996 wrote to memory of 1324 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 86 PID 2996 wrote to memory of 1008 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 87 PID 2996 wrote to memory of 1008 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 87 PID 2996 wrote to memory of 1008 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 87 PID 2996 wrote to memory of 556 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 88 PID 2996 wrote to memory of 556 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 88 PID 2996 wrote to memory of 556 2996 fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe"C:\Users\Admin\AppData\Local\Temp\fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977dN.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2996 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5112
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:556
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD529cfd98d72366a97d5cca905d54d751a
SHA14b0abe10324121bf7913bf06f5cc6d332847b098
SHA256f5b4c23b22f7f0cd7f5c4dbbb409223eb168124988d02fc515d05f78141ee402
SHA5120c0370dcf8eba411fb4b6def5d047b18f1fde036b8e0ae35d3b86d31c84b25600358086538c51bad49afb2be3e9ae6cdbaca3a97b87aaae615515c2543d10d3d
-
Filesize
45KB
MD5d3d6566f74c9fb8bc95aef965daf7e94
SHA169763fd66e33843868bff76a0bd634c92894f1ab
SHA256a5647450cacbfb8606474cff123d967e47b6dc682ff3dd74e50cc17166beb046
SHA5129eca6906e378010031673ca8e6290f060229ffb187d55bcb66614ee4263bcb152cd8dad37230b6bbe3db0af640649c1d56777bcbf9471e9d160ff7d9d2e2fe2c
-
Filesize
45KB
MD56672e44d14060dacba57c515be304d04
SHA15aeee37655bab8ef60a24cd5352c9823a20231a1
SHA2568c77188ad1012a65fed6e19b65e7a4440a836f76d080282df873a84b3ddd2566
SHA51298cd5197fe175ef4e8a1ba851d7012153ffb195a89638e0610ee6c2c8737c03a7853e537faddaf6deeaae2c7c237c4e7c5a5b0f126b3a63fe30fe327fa0698c4
-
Filesize
45KB
MD5c513b1f2b47c6c382101e15b60356209
SHA13508a061ea77cefdab3a94c2fc82242c43b56edd
SHA2562a9bb5c00f4e234611b35559b7b725013d08d2244395a39d7a6155966df642aa
SHA512038170e59f400294f6fc6d9f7543113fe038827610f378baaa509e95ac061a5891f579d523ea9e83f69ccba0191405d9f238daa1a49a611c61d0e82ce916ce1e
-
Filesize
45KB
MD5039151d4ee76acea55b995bf5f4e6dac
SHA1a78699087d7f4b44196be65971769b641cc885dd
SHA256e263addc669f08a091c1ee942e7640785f09bbfdc9d8b19a162222a3e237e76e
SHA5128cb9ccced06a41c04a4fa54630e3efada5044258a19ce8c27dd4c90def0b01d466efc0ca0aba2cc201565dee353e1375fd6ca6e406c6b404f440f1ddcd650c1b
-
Filesize
45KB
MD5a8d8f49b36d5e4fab1ffe9da8937adf0
SHA1d6591d24a1d52ef7578ae94fdbe961c1ac5edbde
SHA256fa1b84ec2305b894b74dd4967df44f50279b4fb47ebef3d0defbe1d2edac977d
SHA512618dbf518405c270df3eeebaa6ca477da069afba9929405d02fdcfa026f96131a5cdf5c237df9ebf99a8dfb1dbd6aa39960c6a2ce3663043420d1b3d9478c343
-
Filesize
45KB
MD5e1c64176835f3e465107f128976c2f32
SHA1dd1ae194051f95d9e9c62b2f50fc4a28510e6627
SHA256471eba31373beac7211648b13197600ae1aed2ea4045dc7f9b7545c841325b86
SHA512d8b4f12c196fe1552cb144dea040e3e25b85a06c6bdaad7c838fd344830b30cdc8c0646bf2418e9185c7b67bfebedd7a98a13f6ae9d1367acdc5e02b8ae80967
-
Filesize
45KB
MD570185147e8f480512eeb245fde8e445b
SHA1349b7d9a717e22d11720090873d0ef6af12ffc40
SHA2563ef50bc640099b5249a84e9f7acff43ee875eb72211c54517ce41d526b15824d
SHA5128dfc500933929a6a47ff91f072206babe27f5ee0407317488cfc820ef57f6425f84d7602250b3709d5c43e65045ee363473d64af586957db0e2fd90a6ce7f93d