Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 17:27
Behavioral task
behavioral1
Sample
707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe
Resource
win10v2004-20241007-en
General
-
Target
707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe
-
Size
2.0MB
-
MD5
2c35e49ed010ec1805b1d118a2b48f90
-
SHA1
2dba76e93ac539aeaf81bc14380a6e1726b12240
-
SHA256
707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3
-
SHA512
9426f2ec7a8b4cf3ad0520f9a1762cef124764982093e09aa617989d4b3c64573a3fe750200815bb1b81e6dd63d56f38a0d79b9bd3d6d69e1faaa032aaef8d5a
-
SSDEEP
49152:MsThC6TYNwUXz+JR2wjx8+X5gZ+th1aaucQPfM7cSCGDt7WWcrRhajx3l7bQonWq:MsThC6TYNwUXz+JR2wjx8+JgZ+th1aaF
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral1/memory/2200-56-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-70-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-74-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-76-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-79-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-81-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-84-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-86-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-88-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-90-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-93-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2200-95-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\Windowsdef.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\bot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\bot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2844 Windowsdef.exe 2200 Windowsdef.exe 2864 Windowsdef.exe -
Loads dropped DLL 7 IoCs
pid Process 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 2844 Windowsdef.exe 2844 Windowsdef.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDef = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\Windowsdef.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2844 set thread context of 2200 2844 Windowsdef.exe 34 PID 2844 set thread context of 2864 2844 Windowsdef.exe 35 -
resource yara_rule behavioral1/memory/1440-0-0x0000000000400000-0x00000000005FD000-memory.dmp upx behavioral1/files/0x00060000000186d9-27.dat upx behavioral1/memory/1440-45-0x0000000000400000-0x00000000005FD000-memory.dmp upx behavioral1/memory/2844-62-0x0000000000400000-0x00000000005FD000-memory.dmp upx behavioral1/memory/2864-60-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2864-59-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2200-56-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2864-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2200-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-70-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2864-71-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2200-74-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-76-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-79-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-81-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-84-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-86-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-88-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-90-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-93-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2200-95-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windowsdef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windowsdef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windowsdef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2916 reg.exe 1052 reg.exe 1828 reg.exe 2468 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 2864 Windowsdef.exe Token: 1 2200 Windowsdef.exe Token: SeCreateTokenPrivilege 2200 Windowsdef.exe Token: SeAssignPrimaryTokenPrivilege 2200 Windowsdef.exe Token: SeLockMemoryPrivilege 2200 Windowsdef.exe Token: SeIncreaseQuotaPrivilege 2200 Windowsdef.exe Token: SeMachineAccountPrivilege 2200 Windowsdef.exe Token: SeTcbPrivilege 2200 Windowsdef.exe Token: SeSecurityPrivilege 2200 Windowsdef.exe Token: SeTakeOwnershipPrivilege 2200 Windowsdef.exe Token: SeLoadDriverPrivilege 2200 Windowsdef.exe Token: SeSystemProfilePrivilege 2200 Windowsdef.exe Token: SeSystemtimePrivilege 2200 Windowsdef.exe Token: SeProfSingleProcessPrivilege 2200 Windowsdef.exe Token: SeIncBasePriorityPrivilege 2200 Windowsdef.exe Token: SeCreatePagefilePrivilege 2200 Windowsdef.exe Token: SeCreatePermanentPrivilege 2200 Windowsdef.exe Token: SeBackupPrivilege 2200 Windowsdef.exe Token: SeRestorePrivilege 2200 Windowsdef.exe Token: SeShutdownPrivilege 2200 Windowsdef.exe Token: SeDebugPrivilege 2200 Windowsdef.exe Token: SeAuditPrivilege 2200 Windowsdef.exe Token: SeSystemEnvironmentPrivilege 2200 Windowsdef.exe Token: SeChangeNotifyPrivilege 2200 Windowsdef.exe Token: SeRemoteShutdownPrivilege 2200 Windowsdef.exe Token: SeUndockPrivilege 2200 Windowsdef.exe Token: SeSyncAgentPrivilege 2200 Windowsdef.exe Token: SeEnableDelegationPrivilege 2200 Windowsdef.exe Token: SeManageVolumePrivilege 2200 Windowsdef.exe Token: SeImpersonatePrivilege 2200 Windowsdef.exe Token: SeCreateGlobalPrivilege 2200 Windowsdef.exe Token: 31 2200 Windowsdef.exe Token: 32 2200 Windowsdef.exe Token: 33 2200 Windowsdef.exe Token: 34 2200 Windowsdef.exe Token: 35 2200 Windowsdef.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 2844 Windowsdef.exe 2864 Windowsdef.exe 2200 Windowsdef.exe 2200 Windowsdef.exe 2200 Windowsdef.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2084 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 30 PID 1440 wrote to memory of 2084 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 30 PID 1440 wrote to memory of 2084 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 30 PID 1440 wrote to memory of 2084 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 30 PID 2084 wrote to memory of 2756 2084 cmd.exe 32 PID 2084 wrote to memory of 2756 2084 cmd.exe 32 PID 2084 wrote to memory of 2756 2084 cmd.exe 32 PID 2084 wrote to memory of 2756 2084 cmd.exe 32 PID 1440 wrote to memory of 2844 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 33 PID 1440 wrote to memory of 2844 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 33 PID 1440 wrote to memory of 2844 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 33 PID 1440 wrote to memory of 2844 1440 707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe 33 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2200 2844 Windowsdef.exe 34 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2844 wrote to memory of 2864 2844 Windowsdef.exe 35 PID 2200 wrote to memory of 2676 2200 Windowsdef.exe 36 PID 2200 wrote to memory of 2676 2200 Windowsdef.exe 36 PID 2200 wrote to memory of 2676 2200 Windowsdef.exe 36 PID 2200 wrote to memory of 2676 2200 Windowsdef.exe 36 PID 2200 wrote to memory of 2740 2200 Windowsdef.exe 37 PID 2200 wrote to memory of 2740 2200 Windowsdef.exe 37 PID 2200 wrote to memory of 2740 2200 Windowsdef.exe 37 PID 2200 wrote to memory of 2740 2200 Windowsdef.exe 37 PID 2200 wrote to memory of 1444 2200 Windowsdef.exe 38 PID 2200 wrote to memory of 1444 2200 Windowsdef.exe 38 PID 2200 wrote to memory of 1444 2200 Windowsdef.exe 38 PID 2200 wrote to memory of 1444 2200 Windowsdef.exe 38 PID 2200 wrote to memory of 2640 2200 Windowsdef.exe 40 PID 2200 wrote to memory of 2640 2200 Windowsdef.exe 40 PID 2200 wrote to memory of 2640 2200 Windowsdef.exe 40 PID 2200 wrote to memory of 2640 2200 Windowsdef.exe 40 PID 2740 wrote to memory of 2468 2740 cmd.exe 44 PID 2740 wrote to memory of 2468 2740 cmd.exe 44 PID 2740 wrote to memory of 2468 2740 cmd.exe 44 PID 2740 wrote to memory of 2468 2740 cmd.exe 44 PID 2676 wrote to memory of 1828 2676 cmd.exe 45 PID 2676 wrote to memory of 1828 2676 cmd.exe 45 PID 2676 wrote to memory of 1828 2676 cmd.exe 45 PID 2676 wrote to memory of 1828 2676 cmd.exe 45 PID 2640 wrote to memory of 1052 2640 cmd.exe 46 PID 2640 wrote to memory of 1052 2640 cmd.exe 46 PID 2640 wrote to memory of 1052 2640 cmd.exe 46 PID 2640 wrote to memory of 1052 2640 cmd.exe 46 PID 1444 wrote to memory of 2916 1444 cmd.exe 47 PID 1444 wrote to memory of 2916 1444 cmd.exe 47 PID 1444 wrote to memory of 2916 1444 cmd.exe 47 PID 1444 wrote to memory of 2916 1444 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe"C:\Users\Admin\AppData\Local\Temp\707b9bcb9f91c510825dee9fdcfe9e50ce21b6febecbc050056a0b2882f3ccb3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\eHfGW.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDef" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe"C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exeC:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1052
-
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exeC:\Users\Admin\AppData\Roaming\Directory\Windowsdef.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5130a1ad614bfc1851533b7a02e302622
SHA16cd68d0bacb7b24ca9baedc80d90f1bfca3bb92c
SHA2564620f5f49d3f3c3fcb10d7dd83e5fdc0b2efd44ae429ee5a8dc3e64d76e6bc9a
SHA51216b5e40deb2e66287b86bbff11ac986f36b94a5849fbe2ed7124296e95d563ec0e9b00cbd6008c993c383d1610d371177faf5a9cd5da77a34a778e901f9e7a25
-
Filesize
2.0MB
MD54a4529b0e4d2a16c275cf6eafabb7cef
SHA19629d0c31bd7a8d154284f94c75a88f522b9e4e0
SHA25637a21f0a92069ddf7de5e5d691a6af4c75022127da558c4ba54396d870e26dc3
SHA51246855da58c3ae4f682bfbec1b1a4603dc9dee4e16b8772cd1bbbcd001b68521ee5bbd13d80a5a9d8d1f28b4ee8be39576892393ee28c8470babb077f18da67d9