Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe
Resource
win10v2004-20241007-en
General
-
Target
587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe
-
Size
91KB
-
MD5
6c910197a009b83e313e0c358b4371a0
-
SHA1
4d7edfcfea9441634d41a96c36f63c586d835eae
-
SHA256
587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3
-
SHA512
87c0e579be770a4d92ddfea2cc15189bbc8437eb4728cf50ad9caf3ab857910601784a58301a87d9aefbaf573d2aa948b652860afc7918e156d889c57eed55d0
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6GuAwEmBZ04faWmtN4nic+6GG:zGms4Eton0uGms4Eton0G
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2172 xk.exe 1460 IExplorer.exe 3164 WINLOGON.EXE 3980 CSRSS.EXE 5060 SERVICES.EXE 4632 LSASS.EXE 4744 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File opened for modification C:\Windows\SysWOW64\shell.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File created C:\Windows\SysWOW64\shell.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File created C:\Windows\SysWOW64\Mig2.scr 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File created C:\Windows\SysWOW64\IExplorer.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe File created C:\Windows\xk.exe 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 2172 xk.exe 1460 IExplorer.exe 3164 WINLOGON.EXE 3980 CSRSS.EXE 5060 SERVICES.EXE 4632 LSASS.EXE 4744 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 980 wrote to memory of 2172 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 83 PID 980 wrote to memory of 2172 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 83 PID 980 wrote to memory of 2172 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 83 PID 980 wrote to memory of 1460 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 84 PID 980 wrote to memory of 1460 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 84 PID 980 wrote to memory of 1460 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 84 PID 980 wrote to memory of 3164 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 85 PID 980 wrote to memory of 3164 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 85 PID 980 wrote to memory of 3164 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 85 PID 980 wrote to memory of 3980 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 86 PID 980 wrote to memory of 3980 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 86 PID 980 wrote to memory of 3980 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 86 PID 980 wrote to memory of 5060 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 87 PID 980 wrote to memory of 5060 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 87 PID 980 wrote to memory of 5060 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 87 PID 980 wrote to memory of 4632 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 88 PID 980 wrote to memory of 4632 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 88 PID 980 wrote to memory of 4632 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 88 PID 980 wrote to memory of 4744 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 89 PID 980 wrote to memory of 4744 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 89 PID 980 wrote to memory of 4744 980 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe 89 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe"C:\Users\Admin\AppData\Local\Temp\587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:980 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1460
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3164
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5060
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4744
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD510b472f7a0e1bdc73071e34de5c7db1a
SHA18a661fefbaa05835370bb63a0f646cea9c040a78
SHA256bbb075b09aeeb9c69ea17d661781c0b08c6a5bdc9c268d9e11d7282dd36f39fa
SHA5122ca8534da16f5efca061acfde04521310352696c6253cee353d06f0720c1f717758dd0ad3318402fbc7ed394efc70f5103882d0b100a28f9e2eadbae7bb5fdfc
-
Filesize
91KB
MD5497ad7bfae94b8478a581d56f73ece0d
SHA183d751c5e1ba841eb17cdc2b89bd3896aa191900
SHA256377db37d4839b039cc13142527a7b377cd56c5b99fce86c94ac87f838a66a559
SHA512c8a2257c6883b9cc5a56346063b8741138023cd00bd8be4c2749354fbb9ad0b5741d58cf9872379a09c306b335417f8c574d537b4d07c1c6b577db593d246236
-
Filesize
91KB
MD5bb19f38c986330b609befa2b5e2fdde3
SHA19892bbbc6ff6a2d01095fa5a5740aee9f7869d34
SHA2565982e4cd505cb683ab0c9fb30587953c0b86022c0936e86185ad8805cd26bbf2
SHA512eb7e499840708d4f99e2f52218a4fdca5c21f9daf9a47c8e2b70389078e8517d2a43336ccc983443a1f9e15376412228eff9dbddd5f901e4fad228b48c5feab3
-
Filesize
91KB
MD5340a31662479dc8ddd789eb02036ebaf
SHA1664c706da7ec07f85987b59532ad4e2c7ecc4c85
SHA2567faf017c88c4236ac5fcc770201a5a64dfd3c3ff6a5ce02b0f7b41bf4b0f0f75
SHA512e543417783f37646a5fcd6d16b0a664378635303e6f2d12637ddf1afa9c74fa91ed202cacc374da83e51c987b4cf8c6a0155c5a4b14019ff3606c722ff44351b
-
Filesize
91KB
MD57ad2c28faa1b90093e10f560101fdf4e
SHA1cadb85b02c5f5a273c39279dd0935bdcac51b9a7
SHA256aeadbeff25e1657a5474bc6dd8ecafeffc1129709a9e47a32440d5bb55884cba
SHA512fa1cde4fdb47c4ba5e3fe80f6fd55f95693a0145b5c02dda75fad9526beb9af2767e97256b848fc5ab1310f55c01bf8a60ab23894888b854fccbf518c744418f
-
Filesize
91KB
MD56c910197a009b83e313e0c358b4371a0
SHA14d7edfcfea9441634d41a96c36f63c586d835eae
SHA256587c2cf1bfa4e84166957c8fd1a7d9a0aed0fdcb64e5fbf54bd35713ff35c0d3
SHA51287c0e579be770a4d92ddfea2cc15189bbc8437eb4728cf50ad9caf3ab857910601784a58301a87d9aefbaf573d2aa948b652860afc7918e156d889c57eed55d0
-
Filesize
91KB
MD55cd0d42a6f49a4158d58a0e41615cac1
SHA1abdae9a95380e027ac8ea4eb037a9eb3801d405c
SHA2567b1d78066296bc993c87b9397b783d1321fc5a862fd0f88935482afbff2f02c8
SHA5122939dbf8ab17fdef9b496358e1ea5df2ae04728df1ad2732f4c80dda65b4144d6362ae94e7693f20990317f07c4125abb23c2760a7c77777ed08f3495231bf66
-
Filesize
91KB
MD5722a25cf1560268124a095085968e063
SHA144e953742936b9fb9cd36c21c5eb3e7894a1704b
SHA256ff2a38982d9a537c891bf1143a53d6d62fb94e4a19da06baeed35634f44b167c
SHA5127f0ec819d45bb425e6c1bbcb96b3ca98c84814aa7ce2def7e958f1e6a30ec2db77ae79191f1369df7280812ba61a5c62ce596bc2520e26f85bfa03ab3a587305