Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
Resource
win10v2004-20241007-en
General
-
Target
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
-
Size
205KB
-
MD5
b6ac49d55c1a26bd29fd8306257b512f
-
SHA1
23cccc09b0b56b5c4119ce8833c3b629cc38e1c5
-
SHA256
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3
-
SHA512
bc730922cf76cf76ac18b4860a26db2f8792073ac7fd0c4f794949930708630f0ba528cac2f0605a09fd8ee0f69edf6df8f777ad541862b57d7914aa6631af79
-
SSDEEP
768:NHP/0gh1VgRDfqkLOpONM+EoiKv35BMCD:FTBiuPONM+R5f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe -
Disables RegEdit via registry modification 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe -
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Executes dropped EXE 5 IoCs
pid Process 1044 smss.exe 2848 winlogon.exe 4796 services.exe 3116 lsass.exe 1836 inetinfo.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" winlogon.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\eksplorasi.exe smss.exe File opened for modification C:\Windows\eksplorasi.exe inetinfo.exe File opened for modification C:\Windows\eksplorasi.exe winlogon.exe File opened for modification C:\Windows\ShellNew\sempalong.exe services.exe File opened for modification C:\Windows\ShellNew\sempalong.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\ShellNew\sempalong.exe smss.exe File opened for modification C:\Windows\ShellNew\sempalong.exe winlogon.exe File created C:\Windows\ShellNew\sempalong.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\eksplorasi.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\ShellNew\sempalong.exe lsass.exe File opened for modification C:\Windows\eksplorasi.exe lsass.exe File opened for modification C:\Windows\ShellNew\sempalong.exe inetinfo.exe File created C:\Windows\eksplorasi.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\eksplorasi.exe services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inetinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 1044 smss.exe 2848 winlogon.exe 4796 services.exe 3116 lsass.exe 1836 inetinfo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 32 wrote to memory of 2956 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 84 PID 32 wrote to memory of 2956 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 84 PID 32 wrote to memory of 2956 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 84 PID 32 wrote to memory of 1044 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 86 PID 32 wrote to memory of 1044 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 86 PID 32 wrote to memory of 1044 32 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 86 PID 1044 wrote to memory of 2848 1044 smss.exe 89 PID 1044 wrote to memory of 2848 1044 smss.exe 89 PID 1044 wrote to memory of 2848 1044 smss.exe 89 PID 1044 wrote to memory of 3120 1044 smss.exe 90 PID 1044 wrote to memory of 3120 1044 smss.exe 90 PID 1044 wrote to memory of 3120 1044 smss.exe 90 PID 1044 wrote to memory of 3540 1044 smss.exe 94 PID 1044 wrote to memory of 3540 1044 smss.exe 94 PID 1044 wrote to memory of 3540 1044 smss.exe 94 PID 1044 wrote to memory of 4796 1044 smss.exe 95 PID 1044 wrote to memory of 4796 1044 smss.exe 95 PID 1044 wrote to memory of 4796 1044 smss.exe 95 PID 1044 wrote to memory of 3116 1044 smss.exe 97 PID 1044 wrote to memory of 3116 1044 smss.exe 97 PID 1044 wrote to memory of 3116 1044 smss.exe 97 PID 1044 wrote to memory of 1836 1044 smss.exe 100 PID 1044 wrote to memory of 1836 1044 smss.exe 100 PID 1044 wrote to memory of 1836 1044 smss.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe"C:\Users\Admin\AppData\Local\Temp\b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2956
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Brengkolang.com"3⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4796
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD5adeaeafb9d86b5f483ffb8702c5a9948
SHA1a3190bb9693e6b1e0331907d9152dfd4bfe7c8be
SHA25679fd548345f6cc08d3b04d87893ecf0297a5b8d496af86bdea38de80ba27126b
SHA51222685760720efd629844921fee4ff59df9c7e0e3c2f56f028bb99dcfdee1934328438fab9197d5215c4a70748625baf9936fb27b253758020ccf63f84d710b56
-
Filesize
205KB
MD5b6ac49d55c1a26bd29fd8306257b512f
SHA123cccc09b0b56b5c4119ce8833c3b629cc38e1c5
SHA256b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3
SHA512bc730922cf76cf76ac18b4860a26db2f8792073ac7fd0c4f794949930708630f0ba528cac2f0605a09fd8ee0f69edf6df8f777ad541862b57d7914aa6631af79
-
Filesize
128KB
MD5e7bac13933ef47dd517a6ec75a446277
SHA14dbce8fb05ddb524f64e98c24acbfb5362aa8647
SHA2560a192f7d2dccdf6e42eaf689b0e92efa76c350a2084bbb20e9384b218d952514
SHA5129571bf85da731efefab7a7c7c245b5f3efdc2024fa7891a187f6049ad2aebd323426e200c7d4c8f2e354357ff4a8249fe96a0bd6a369a7798c2f87026ba91ff8
-
Filesize
64KB
MD59b120ca419e3e900adae497eaf299826
SHA18279b2e61131733059ed97db384164f467086806
SHA2569b3ce4cf7f1fab1878ce2735d43b05cdeca4da2b9224eb393124ddb343811a5f
SHA5126724ac61ed3b68fe5fd21c7ecb2e6fc9256d8798b175fe8098511d5c27ea25564af0dc9068c548637db43297f173e191761bc7940e97bd661f1729535949c278