Overview
overview
10Static
static
10The-MALWAR...on.txt
windows7-x64
3The-MALWAR...2aed41
windows7-x64
3The-MALWAR...ka.exe
windows7-x64
7The-MALWAR...if.exe
windows7-x64
10The-MALWAR...il.exe
windows7-x64
8The-MALWAR...at.exe
windows7-x64
1The-MALWAR...98.exe
windows7-x64
1The-MALWAR...aj.exe
windows7-x64
7The-MALWAR...jB.exe
windows7-x64
7The-MALWAR...om.exe
windows7-x64
6The-MALWAR...1C.exe
windows7-x64
5The-MALWAR...90.exe
windows7-x64
8The-MALWAR...6a.exe
windows7-x64
8The-MALWAR...it.exe
windows7-x64
1The-MALWAR...ng.exe
windows7-x64
7The-MALWAR....a.exe
windows7-x64
10The-MALWAR...1A.exe
windows7-x64
8The-MALWAR...as.exe
windows7-x64
6The-MALWAR...te.exe
windows7-x64
7The-MALWAR....a.exe
windows7-x64
3The-MALWAR...le.exe
windows7-x64
3The-MALWAR...us.exe
windows7-x64
10The-MALWAR...er.exe
windows7-x64
7The-MALWAR...ff.exe
windows7-x64
3Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Trojan/WindowsXPHorrorEdition.txt
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Trojan/XCSSETMacMalware/TrojanSpy.MacOS.XCSSET.A.6fa938770e83ef2e177e8adf4a2ea3d2d5b26107c30f9d85c3d1a557db2aed41
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Trojan/Zika.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Virus/Floxif/Floxif.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Virus/Gnil/Gnil.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Virus/WinNuke.98.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Virus/Xpaj/xpaj.exe
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Virus/Xpaj/xpajB.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Worm/Bezilom.exe
Resource
win7-20241010-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Worm/Blaster/607B60AD512C50B7D71DCCC057E85F1C.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Worm/Blaster/8676210e6246948201aa014db471de90.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Worm/Blaster/8a17f336f86e81f04d8e66fa23f9b36a.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Worm/Blaster/DComExploit.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Worm/Bumerang.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Worm/Fagot.a.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Worm/Heap41A.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Worm/Mantas.exe
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Worm/NadIote/Nadlote.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Worm/Netres.a.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Worm/Nople.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Worm/Vobfus/Vobus.exe
Resource
win7-20240729-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/rogues/AdwereCleaner.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/rogues/SpySheriff.exe
Resource
win7-20240903-en
General
-
Target
The-MALWARE-Repo-master/Worm/NadIote/Nadlote.exe
-
Size
240KB
-
MD5
57aecbcdcb3a5ad31ac07c5a62b56085
-
SHA1
a443c574f039828d237030bc18895027ca780337
-
SHA256
ab020413dce53c9d57cf22d75eaf1339d72252d5316617a935149e02fee42fd3
-
SHA512
7921f184411f898a78c7094176fa47368b1c6ba7d6a3f58df4332e6865325287f25622f1d13765fd08d499d34974461b2ee81319adc24ce3901cc72d132b3027
-
SSDEEP
6144:fFzclWnzp5DFV0FuS5hPGR/CnA1G+Ghgav/06hyTu:RcURxR/CnA0rhgaJy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2732 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 CMD.exe 2592 CMD.exe -
Adds Run key to start application 2 TTPs 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "smss\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\smss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Csrss = "c:\\RECYCLER\\smss.exe " reg.exe -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\c:\autorun.INF smss.exe File opened for modification \??\f:\autorun.INF smss.exe File opened for modification \??\c:\RECYCLER:\autorun.INF smss.exe File opened for modification \??\c:\RECYCLER\autorun.INF smss.exe File opened for modification \??\d:\autorun.INF smss.exe File opened for modification \??\e:\autorun.INF smss.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\Program Files\Messenger\msmsgs.exe smss.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\smss.exe Nadlote.exe File opened for modification C:\Windows\smss.exe Nadlote.exe File opened for modification C:\Windows\smss.exe smss.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nadlote.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 10 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1076 PING.EXE 2548 cmd.exe 1796 PING.EXE 1980 cmd.exe 868 cmd.exe 1968 PING.EXE 1572 cmd.exe 2200 cmd.exe 720 PING.EXE 2784 PING.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2784 ipconfig.exe -
Modifies registry key 1 TTPs 41 IoCs
pid Process 1796 reg.exe 1588 reg.exe 664 reg.exe 1528 reg.exe 2112 reg.exe 2096 reg.exe 1492 reg.exe 1672 reg.exe 1744 reg.exe 588 reg.exe 2804 reg.exe 1812 reg.exe 852 reg.exe 1032 reg.exe 1776 reg.exe 2680 reg.exe 408 reg.exe 3004 reg.exe 684 reg.exe 1828 reg.exe 2136 reg.exe 2208 reg.exe 2684 reg.exe 1368 reg.exe 812 reg.exe 2624 reg.exe 2500 reg.exe 1720 reg.exe 2236 reg.exe 2648 reg.exe 1028 reg.exe 1736 reg.exe 3056 reg.exe 2668 reg.exe 552 reg.exe 2036 reg.exe 1088 reg.exe 1664 reg.exe 584 reg.exe 968 reg.exe 2296 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification \??\c:\RECYCLER:\autorun.INF smss.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 1796 PING.EXE 1968 PING.EXE 1076 PING.EXE 720 PING.EXE 2784 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2284 Nadlote.exe 2732 smss.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2388 2284 Nadlote.exe 28 PID 2284 wrote to memory of 2388 2284 Nadlote.exe 28 PID 2284 wrote to memory of 2388 2284 Nadlote.exe 28 PID 2284 wrote to memory of 2388 2284 Nadlote.exe 28 PID 2284 wrote to memory of 2592 2284 Nadlote.exe 29 PID 2284 wrote to memory of 2592 2284 Nadlote.exe 29 PID 2284 wrote to memory of 2592 2284 Nadlote.exe 29 PID 2284 wrote to memory of 2592 2284 Nadlote.exe 29 PID 2388 wrote to memory of 2648 2388 cmd.exe 32 PID 2388 wrote to memory of 2648 2388 cmd.exe 32 PID 2388 wrote to memory of 2648 2388 cmd.exe 32 PID 2388 wrote to memory of 2648 2388 cmd.exe 32 PID 2592 wrote to memory of 2732 2592 CMD.exe 33 PID 2592 wrote to memory of 2732 2592 CMD.exe 33 PID 2592 wrote to memory of 2732 2592 CMD.exe 33 PID 2592 wrote to memory of 2732 2592 CMD.exe 33 PID 2732 wrote to memory of 3068 2732 smss.exe 34 PID 2732 wrote to memory of 3068 2732 smss.exe 34 PID 2732 wrote to memory of 3068 2732 smss.exe 34 PID 2732 wrote to memory of 3068 2732 smss.exe 34 PID 3068 wrote to memory of 2112 3068 cmd.exe 36 PID 3068 wrote to memory of 2112 3068 cmd.exe 36 PID 3068 wrote to memory of 2112 3068 cmd.exe 36 PID 3068 wrote to memory of 2112 3068 cmd.exe 36 PID 2732 wrote to memory of 2548 2732 smss.exe 37 PID 2732 wrote to memory of 2548 2732 smss.exe 37 PID 2732 wrote to memory of 2548 2732 smss.exe 37 PID 2732 wrote to memory of 2548 2732 smss.exe 37 PID 2732 wrote to memory of 2612 2732 smss.exe 38 PID 2732 wrote to memory of 2612 2732 smss.exe 38 PID 2732 wrote to memory of 2612 2732 smss.exe 38 PID 2732 wrote to memory of 2612 2732 smss.exe 38 PID 2732 wrote to memory of 2496 2732 smss.exe 40 PID 2732 wrote to memory of 2496 2732 smss.exe 40 PID 2732 wrote to memory of 2496 2732 smss.exe 40 PID 2732 wrote to memory of 2496 2732 smss.exe 40 PID 2612 wrote to memory of 1664 2612 cmd.exe 43 PID 2612 wrote to memory of 1664 2612 cmd.exe 43 PID 2612 wrote to memory of 1664 2612 cmd.exe 43 PID 2612 wrote to memory of 1664 2612 cmd.exe 43 PID 2548 wrote to memory of 3004 2548 cmd.exe 44 PID 2548 wrote to memory of 3004 2548 cmd.exe 44 PID 2548 wrote to memory of 3004 2548 cmd.exe 44 PID 2548 wrote to memory of 3004 2548 cmd.exe 44 PID 2496 wrote to memory of 2784 2496 cmd.exe 45 PID 2496 wrote to memory of 2784 2496 cmd.exe 45 PID 2496 wrote to memory of 2784 2496 cmd.exe 45 PID 2496 wrote to memory of 2784 2496 cmd.exe 45 PID 2284 wrote to memory of 2980 2284 Nadlote.exe 46 PID 2284 wrote to memory of 2980 2284 Nadlote.exe 46 PID 2284 wrote to memory of 2980 2284 Nadlote.exe 46 PID 2284 wrote to memory of 2980 2284 Nadlote.exe 46 PID 2980 wrote to memory of 588 2980 cmd.exe 48 PID 2980 wrote to memory of 588 2980 cmd.exe 48 PID 2980 wrote to memory of 588 2980 cmd.exe 48 PID 2980 wrote to memory of 588 2980 cmd.exe 48 PID 2732 wrote to memory of 604 2732 smss.exe 49 PID 2732 wrote to memory of 604 2732 smss.exe 49 PID 2732 wrote to memory of 604 2732 smss.exe 49 PID 2732 wrote to memory of 604 2732 smss.exe 49 PID 604 wrote to memory of 584 604 cmd.exe 51 PID 604 wrote to memory of 584 604 cmd.exe 51 PID 604 wrote to memory of 584 604 cmd.exe 51 PID 604 wrote to memory of 584 604 cmd.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Worm\NadIote\Nadlote.exe"C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Worm\NadIote\Nadlote.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2648
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C "c:\RECYCLER\smss.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\RECYCLER\smss.exec:\RECYCLER\smss.exe3⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ipconfig > c:\RECYCLER\IP.dlx4⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\ipconfig.exeipconfig5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net share Love2="c:\Documents and Settings" /unlimited | net share Love1=C:\Windows /unlimited | net share Love3=d:\ /unlimited4⤵PID:1660
-
C:\Windows\SysWOW64\net.exenet share Love2="c:\Documents and Settings" /unlimited5⤵PID:552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love2="c:\Documents and Settings" /unlimited6⤵PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet share Love1=C:\Windows /unlimited5⤵
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love1=C:\Windows /unlimited6⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet share Love3=d:\ /unlimited5⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share Love3=d:\ /unlimited6⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "smss\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "smss\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter L0 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1572 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter L0 -n 2 -w 35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵PID:2068
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter L1 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2200 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter L1 -n 2 -w 35⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵PID:2772
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter L2 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2548 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter L2 -n 2 -w 35⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵PID:1808
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter L3 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1980 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter L3 -n 2 -w 35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V smss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵PID:2072
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f4⤵PID:2260
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping ernet adapter L4 -n 2 -w 3 > "c:\RECYCLER\check_4_online.dlx"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:868 -
C:\Windows\SysWOW64\PING.EXEping ernet adapter L4 -n 2 -w 35⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1968
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵PID:704
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:280 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵PID:1764
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f2⤵PID:1228
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\MICROSOFT\WINDOWS\CURRENTVERSION\RUN /V Csrss /t REG_SZ /d "c:\RECYCLER\smss.exe " /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1744
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD557aecbcdcb3a5ad31ac07c5a62b56085
SHA1a443c574f039828d237030bc18895027ca780337
SHA256ab020413dce53c9d57cf22d75eaf1339d72252d5316617a935149e02fee42fd3
SHA5127921f184411f898a78c7094176fa47368b1c6ba7d6a3f58df4332e6865325287f25622f1d13765fd08d499d34974461b2ee81319adc24ce3901cc72d132b3027
-
Filesize
379B
MD5cba289891ec7b2f21bda3435f229537b
SHA1791eb6ade5b072480020f649151d3309d7ef8714
SHA25634e37c589c9cdfea750288f65d019afee10644722cc520f1e95febc5758fd4f0
SHA512626b0ccb36d6dbe9c0fd18b3c7a3f0636fc840a7f02b81c7c1883a638044202d979d330efefbe8d891d7ec043c64ddd536beb25994dfbdc66244822a6cc6736f
-
Filesize
508B
MD52e67faac2150767fd954d0dc545501a9
SHA19137791ddd1c4368d80fd00416ebab8c1f6994bf
SHA256f0ba860277c9cd7a3a651cea474e50b391bdfbde55c4a96968d4bb73425dde39
SHA5126d6bc600c7320e4ba34c5cbb3b2bd044b66e7338df8116973ba42968ca66139a986b2cdb69a75e38f23208d9972202ed174e30049276bc5343e939c53572c6db
-
Filesize
78B
MD51aee8eddef535a3c072b7f520eaf5560
SHA1adef396d2bf5e47ef40a8ebfd53ebba7476b108f
SHA25618e39b4a5a91f2cf56367c2d7b53830881d5d885bcccc234219c39fd0af44353
SHA512907237c3fcfbf310f423b3a44cc6dcb1ee1cff6ce2d996b36df1b04eb6d74a5b1ceae9b3f19367e831fc9a4ee908c583e1cf212a5f3e3539d4c1f1243ba1d787