Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
Resource
win10v2004-20241007-en
General
-
Target
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe
-
Size
205KB
-
MD5
b6ac49d55c1a26bd29fd8306257b512f
-
SHA1
23cccc09b0b56b5c4119ce8833c3b629cc38e1c5
-
SHA256
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3
-
SHA512
bc730922cf76cf76ac18b4860a26db2f8792073ac7fd0c4f794949930708630f0ba528cac2f0605a09fd8ee0f69edf6df8f777ad541862b57d7914aa6631af79
-
SSDEEP
768:NHP/0gh1VgRDfqkLOpONM+EoiKv35BMCD:FTBiuPONM+R5f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
winlogon.exeservices.exelsass.exeinetinfo.exeb14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\eksplorasi.exe\"" smss.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
Processes:
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exewinlogon.exeservices.exelsass.exeinetinfo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
Processes:
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exewinlogon.exeservices.exelsass.exeinetinfo.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe -
Disables RegEdit via registry modification 12 IoCs
Processes:
lsass.exeinetinfo.exeb14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exewinlogon.exeservices.exesmss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe -
Disables cmd.exe use via registry modification 6 IoCs
Processes:
winlogon.exeservices.exelsass.exeinetinfo.exeb14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe -
Drops file in Drivers directory 2 IoCs
Processes:
inetinfo.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Drops startup file 2 IoCs
Processes:
smss.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Executes dropped EXE 5 IoCs
Processes:
smss.exewinlogon.exeservices.exelsass.exeinetinfo.exepid process 4892 smss.exe 3632 winlogon.exe 4688 services.exe 4900 lsass.exe 3940 inetinfo.exe -
Adds Run key to start application 2 TTPs 12 IoCs
Processes:
winlogon.exeservices.exelsass.exeb14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exeinetinfo.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\sempalong.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus = "\"C:\\Users\\Admin\\AppData\\Local\\smss.exe\"" inetinfo.exe -
Drops file in System32 directory 2 IoCs
Processes:
smss.exedescription ioc process File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe -
Drops file in Windows directory 14 IoCs
Processes:
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exewinlogon.exesmss.exeservices.exelsass.exeinetinfo.exedescription ioc process File opened for modification C:\Windows\ShellNew\sempalong.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\eksplorasi.exe winlogon.exe File opened for modification C:\Windows\eksplorasi.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\eksplorasi.exe smss.exe File opened for modification C:\Windows\ShellNew\sempalong.exe services.exe File opened for modification C:\Windows\ShellNew\sempalong.exe lsass.exe File opened for modification C:\Windows\eksplorasi.exe lsass.exe File opened for modification C:\Windows\eksplorasi.exe inetinfo.exe File created C:\Windows\ShellNew\sempalong.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\ShellNew\sempalong.exe smss.exe File opened for modification C:\Windows\eksplorasi.exe services.exe File opened for modification C:\Windows\ShellNew\sempalong.exe inetinfo.exe File created C:\Windows\eksplorasi.exe b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe File opened for modification C:\Windows\ShellNew\sempalong.exe winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
at.exelsass.exeexplorer.exesmss.exeat.exeservices.exeinetinfo.exeb14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exewinlogon.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inetinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe -
Modifies registry class 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exewinlogon.exeservices.exelsass.exeinetinfo.exepid process 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe 4892 smss.exe 3632 winlogon.exe 4688 services.exe 4900 lsass.exe 3940 inetinfo.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exesmss.exedescription pid process target process PID 1684 wrote to memory of 2964 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe explorer.exe PID 1684 wrote to memory of 2964 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe explorer.exe PID 1684 wrote to memory of 2964 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe explorer.exe PID 1684 wrote to memory of 4892 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe smss.exe PID 1684 wrote to memory of 4892 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe smss.exe PID 1684 wrote to memory of 4892 1684 b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe smss.exe PID 4892 wrote to memory of 3632 4892 smss.exe winlogon.exe PID 4892 wrote to memory of 3632 4892 smss.exe winlogon.exe PID 4892 wrote to memory of 3632 4892 smss.exe winlogon.exe PID 4892 wrote to memory of 4488 4892 smss.exe at.exe PID 4892 wrote to memory of 4488 4892 smss.exe at.exe PID 4892 wrote to memory of 4488 4892 smss.exe at.exe PID 4892 wrote to memory of 856 4892 smss.exe at.exe PID 4892 wrote to memory of 856 4892 smss.exe at.exe PID 4892 wrote to memory of 856 4892 smss.exe at.exe PID 4892 wrote to memory of 4688 4892 smss.exe services.exe PID 4892 wrote to memory of 4688 4892 smss.exe services.exe PID 4892 wrote to memory of 4688 4892 smss.exe services.exe PID 4892 wrote to memory of 4900 4892 smss.exe lsass.exe PID 4892 wrote to memory of 4900 4892 smss.exe lsass.exe PID 4892 wrote to memory of 4900 4892 smss.exe lsass.exe PID 4892 wrote to memory of 3940 4892 smss.exe inetinfo.exe PID 4892 wrote to memory of 3940 4892 smss.exe inetinfo.exe PID 4892 wrote to memory of 3940 4892 smss.exe inetinfo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe"C:\Users\Admin\AppData\Local\Temp\b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2964
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3632
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Brengkolang.com"3⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4900
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3940
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5b6ac49d55c1a26bd29fd8306257b512f
SHA123cccc09b0b56b5c4119ce8833c3b629cc38e1c5
SHA256b14ae1dd5d9e275f4206cc8eefc1f15130f3981aef3b9035b76f9a6559a233f3
SHA512bc730922cf76cf76ac18b4860a26db2f8792073ac7fd0c4f794949930708630f0ba528cac2f0605a09fd8ee0f69edf6df8f777ad541862b57d7914aa6631af79
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
128KB
MD5e7bac13933ef47dd517a6ec75a446277
SHA14dbce8fb05ddb524f64e98c24acbfb5362aa8647
SHA2560a192f7d2dccdf6e42eaf689b0e92efa76c350a2084bbb20e9384b218d952514
SHA5129571bf85da731efefab7a7c7c245b5f3efdc2024fa7891a187f6049ad2aebd323426e200c7d4c8f2e354357ff4a8249fe96a0bd6a369a7798c2f87026ba91ff8