Analysis
-
max time kernel
119s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 15:44
Static task
static1
Behavioral task
behavioral1
Sample
24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe
Resource
win10v2004-20241007-en
General
-
Target
24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe
-
Size
3.1MB
-
MD5
71f261fe0ab0cca422bc60d71e18fdaf
-
SHA1
f37118da5d843ff34beef2870f6cfd9965f7d50e
-
SHA256
24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91
-
SHA512
eabc35e19b96c6655d76703e8a9fb469508c26d124acec99fee819e449b7c55a5c8025f9c1a215f06977eece8b8e6843039a1dae24a81904e21dcd32ec0695e6
-
SSDEEP
24576:yKGLlxj3f/tXkbAivCy+u2QXQJLWw/GBQyVQVz81:y//tXvuKW7QV2
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 9 IoCs
resource yara_rule behavioral1/memory/788-98-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-115-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-117-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-120-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-122-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-124-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-127-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-136-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral1/memory/788-138-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\msconfig32\\msconfig32.exe" reg.exe -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\msconfig32\msconfig32.exe = "C:\\Windows\\msconfig32\\msconfig32.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\lsoss32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\lsoss32.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run msconfig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\winupdt32 = "C:\\Users\\Admin\\AppData\\Roaming\\lsoss32.exe" msconfig32.exe -
Executes dropped EXE 3 IoCs
pid Process 1540 msconfig32.exe 788 msconfig32.exe 1932 msconfig32.exe -
Loads dropped DLL 4 IoCs
pid Process 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig32 = "C:\\Windows\\msconfig32\\msconfig32.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winupdt32 = "C:\\Users\\Admin\\AppData\\Roaming\\lsoss32.exe" msconfig32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdt32 = "C:\\Users\\Admin\\AppData\\Roaming\\lsoss32.exe" msconfig32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\msconfig32 = "C:\\Windows\\msconfig32\\msconfig32.exe" reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig32.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1540 set thread context of 788 1540 msconfig32.exe 45 PID 1540 set thread context of 1932 1540 msconfig32.exe 46 -
resource yara_rule behavioral1/memory/1932-112-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1932-110-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1932-106-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1932-116-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\msconfig32\msconfig32.txt 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe File opened for modification C:\Windows\msconfig32\msconfig32.txt 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe File created C:\Windows\msconfig32\msconfig32.exe 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe File opened for modification C:\Windows\msconfig32\msconfig32.exe msconfig32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msconfig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2876 reg.exe 2728 reg.exe 2620 reg.exe 2748 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 788 msconfig32.exe Token: SeCreateTokenPrivilege 788 msconfig32.exe Token: SeAssignPrimaryTokenPrivilege 788 msconfig32.exe Token: SeLockMemoryPrivilege 788 msconfig32.exe Token: SeIncreaseQuotaPrivilege 788 msconfig32.exe Token: SeMachineAccountPrivilege 788 msconfig32.exe Token: SeTcbPrivilege 788 msconfig32.exe Token: SeSecurityPrivilege 788 msconfig32.exe Token: SeTakeOwnershipPrivilege 788 msconfig32.exe Token: SeLoadDriverPrivilege 788 msconfig32.exe Token: SeSystemProfilePrivilege 788 msconfig32.exe Token: SeSystemtimePrivilege 788 msconfig32.exe Token: SeProfSingleProcessPrivilege 788 msconfig32.exe Token: SeIncBasePriorityPrivilege 788 msconfig32.exe Token: SeCreatePagefilePrivilege 788 msconfig32.exe Token: SeCreatePermanentPrivilege 788 msconfig32.exe Token: SeBackupPrivilege 788 msconfig32.exe Token: SeRestorePrivilege 788 msconfig32.exe Token: SeShutdownPrivilege 788 msconfig32.exe Token: SeDebugPrivilege 788 msconfig32.exe Token: SeAuditPrivilege 788 msconfig32.exe Token: SeSystemEnvironmentPrivilege 788 msconfig32.exe Token: SeChangeNotifyPrivilege 788 msconfig32.exe Token: SeRemoteShutdownPrivilege 788 msconfig32.exe Token: SeUndockPrivilege 788 msconfig32.exe Token: SeSyncAgentPrivilege 788 msconfig32.exe Token: SeEnableDelegationPrivilege 788 msconfig32.exe Token: SeManageVolumePrivilege 788 msconfig32.exe Token: SeImpersonatePrivilege 788 msconfig32.exe Token: SeCreateGlobalPrivilege 788 msconfig32.exe Token: 31 788 msconfig32.exe Token: 32 788 msconfig32.exe Token: 33 788 msconfig32.exe Token: 34 788 msconfig32.exe Token: 35 788 msconfig32.exe Token: SeDebugPrivilege 1932 msconfig32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 1540 msconfig32.exe 788 msconfig32.exe 788 msconfig32.exe 1932 msconfig32.exe 788 msconfig32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 1712 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 31 PID 1768 wrote to memory of 1712 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 31 PID 1768 wrote to memory of 1712 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 31 PID 1768 wrote to memory of 1712 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 31 PID 1712 wrote to memory of 3060 1712 cmd.exe 33 PID 1712 wrote to memory of 3060 1712 cmd.exe 33 PID 1712 wrote to memory of 3060 1712 cmd.exe 33 PID 1712 wrote to memory of 3060 1712 cmd.exe 33 PID 1712 wrote to memory of 1368 1712 cmd.exe 34 PID 1712 wrote to memory of 1368 1712 cmd.exe 34 PID 1712 wrote to memory of 1368 1712 cmd.exe 34 PID 1712 wrote to memory of 1368 1712 cmd.exe 34 PID 1768 wrote to memory of 2780 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 35 PID 1768 wrote to memory of 2780 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 35 PID 1768 wrote to memory of 2780 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 35 PID 1768 wrote to memory of 2780 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 35 PID 2780 wrote to memory of 2904 2780 cmd.exe 37 PID 2780 wrote to memory of 2904 2780 cmd.exe 37 PID 2780 wrote to memory of 2904 2780 cmd.exe 37 PID 2780 wrote to memory of 2904 2780 cmd.exe 37 PID 1768 wrote to memory of 2652 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 38 PID 1768 wrote to memory of 2652 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 38 PID 1768 wrote to memory of 2652 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 38 PID 1768 wrote to memory of 2652 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 38 PID 2652 wrote to memory of 2700 2652 cmd.exe 40 PID 2652 wrote to memory of 2700 2652 cmd.exe 40 PID 2652 wrote to memory of 2700 2652 cmd.exe 40 PID 2652 wrote to memory of 2700 2652 cmd.exe 40 PID 1768 wrote to memory of 2552 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 41 PID 1768 wrote to memory of 2552 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 41 PID 1768 wrote to memory of 2552 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 41 PID 1768 wrote to memory of 2552 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 41 PID 2552 wrote to memory of 2848 2552 cmd.exe 43 PID 2552 wrote to memory of 2848 2552 cmd.exe 43 PID 2552 wrote to memory of 2848 2552 cmd.exe 43 PID 2552 wrote to memory of 2848 2552 cmd.exe 43 PID 1768 wrote to memory of 1540 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 44 PID 1768 wrote to memory of 1540 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 44 PID 1768 wrote to memory of 1540 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 44 PID 1768 wrote to memory of 1540 1768 24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe 44 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 788 1540 msconfig32.exe 45 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 1540 wrote to memory of 1932 1540 msconfig32.exe 46 PID 788 wrote to memory of 1760 788 msconfig32.exe 47 PID 788 wrote to memory of 1760 788 msconfig32.exe 47 PID 788 wrote to memory of 1760 788 msconfig32.exe 47 PID 788 wrote to memory of 1760 788 msconfig32.exe 47 PID 788 wrote to memory of 1672 788 msconfig32.exe 48 PID 788 wrote to memory of 1672 788 msconfig32.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe"C:\Users\Admin\AppData\Local\Temp\24217d63742343a17b813350bfdcc0dccd91be2ed9a65d9ca0e0415065fe8d91.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ZOPLXA.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UaETp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "msconfig32" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\efdBR.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "msconfig32" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gpDSo.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe, C:\Windows\msconfig32\msconfig32.exe" /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\msconfig32\msconfig32.exe"C:\Windows\msconfig32\msconfig32.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\msconfig32\msconfig32.exeC:\Windows\msconfig32\msconfig32.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\msconfig32\msconfig32.exe" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\msconfig32\msconfig32.exe" /t REG_SZ /d "C:\Windows\msconfig32\msconfig32.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\lsoss32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lsoss32.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\lsoss32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\lsoss32.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2728
-
-
-
-
C:\Windows\msconfig32\msconfig32.exeC:\Windows\msconfig32\msconfig32.exe3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD54e99d945ca61ed0b261a73d985f5420e
SHA1ce08b5c3939572703ae753bfa72c0224400d7bb2
SHA256ddcc7514a0ca6c4c261d55a5c818136cb6035676d1a56dbb224734c5db1a3064
SHA512988b5bab81311ca5efd773fdd8c872173b42bebce79467615c7ad5ffdb3a0f670300b1d39ab86f62b2a6bea2aa140abfaca211b2c868c4a412a6d5a4c4a8fb8a
-
Filesize
255B
MD5180e420d8578c4341546b0f2676f52c5
SHA13683c541fe1ad96c37fcfa91f3d819f2c43ccf84
SHA25627bad6b003d19c5063cfc49ee5828c5ebb82659ee5c89ed2df20ae1c4917ba28
SHA5125bbcdd40178a399dd4e879e39328824c47edc39a040b7d1eed90368bbdab0d51d9cb187357cc3a223ed22086ff650c10f3841fc9bb50469eb9a72ca343c77ed9
-
Filesize
133B
MD55c5f6bd3f5ab15437a8d5a452f236cc7
SHA143dc4c4bcee42f7975f0027e2734c57115e5d7ce
SHA2568f96e1c2750dc729faf255eb4df3f1e501d3394d8043f69dc56036a03b9ed947
SHA512eed35f38654e1c5b4c1ea010f93d6be03250b77bd0e6f79ce12aaaa7333b9346afbd328f4de21e3fa6948d252cb9203a8bd103e0058c129d3130e7399e18b08f
-
Filesize
164B
MD50af5f35091719d8ee61893a158b66625
SHA11f81728601f8714bfa7e2ca92f9d6a8f6aa89700
SHA256ceac3aee5e97d760c72b18d62c3dfc7d73904366e230c2362c49e8ed700d46f9
SHA512f01c7ecbb9682c2469628f7d1c7e38891b1b9352a27eed50e3597b281fc136f18a6deb4ca04843f632cce295dd8f194ff8c37d31d7167a7a25734d0789bf9baa
-
Filesize
3.1MB
MD57b36ba7d71abb40e90490133e4bd6b1e
SHA172f0efc0eef9cd7815b949664a66b56a47e002b4
SHA256837f29a7a5fcbcf58dd8853d75d79a355177454cdf0dac9bbfd768a2bf1224de
SHA5125762c3a87cc7e982c17a542a08d2dfc67db71a963f7722cad53c464a8d54f654af2732b6543f4966049851d988a15435b576f57e452ed176d4548cc0b935a101