Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2025, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
Resource
win10v2004-20250129-en
General
-
Target
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
-
Size
248KB
-
MD5
0a4b7e409a27aa973a66eba20bf662dd
-
SHA1
4e1abafdfe6e9c0cd30161bb6b46431c3c2d15cf
-
SHA256
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281
-
SHA512
4f07bdc3ad3c1322da1b5207eca1fd84b3f5f5d3814fd569d37281680b6524e87079e70bba295cef422b3b2e42e805d5f59b1b293cd3dcb711d8ea26458d28dc
-
SSDEEP
3072:etsLhXr6AQuO5MRDZ5ZuI80fP1yjQUEcOMyNx80oB1WtEkdGFEk0pyyNxRmvh:fGD5MR5HZrbbxt+WtzdGGk0UyDy
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 9 IoCs
resource yara_rule behavioral2/memory/4084-58-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-70-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-76-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-81-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-85-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-89-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-94-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-98-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades behavioral2/memory/4084-102-0x0000000000400000-0x000000000047B000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run winlogonr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" winlogonr.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA} winlogonr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" winlogonr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA} winlogonr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" winlogonr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe -
Executes dropped EXE 3 IoCs
pid Process 5000 winlogonr.exe 1052 winlogonr.exe 4084 winlogonr.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" winlogonr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" winlogonr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2640 set thread context of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 5000 set thread context of 1052 5000 winlogonr.exe 97 PID 5000 set thread context of 4084 5000 winlogonr.exe 98 -
resource yara_rule behavioral2/memory/1412-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1412-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1412-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1412-14-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1412-40-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4084-55-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-58-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/1412-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4084-51-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/1052-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4084-70-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-76-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-81-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-85-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-89-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-94-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-98-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/4084-102-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3960 reg.exe 3360 reg.exe 2056 reg.exe 2500 reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 1 4084 winlogonr.exe Token: SeCreateTokenPrivilege 4084 winlogonr.exe Token: SeAssignPrimaryTokenPrivilege 4084 winlogonr.exe Token: SeLockMemoryPrivilege 4084 winlogonr.exe Token: SeIncreaseQuotaPrivilege 4084 winlogonr.exe Token: SeMachineAccountPrivilege 4084 winlogonr.exe Token: SeTcbPrivilege 4084 winlogonr.exe Token: SeSecurityPrivilege 4084 winlogonr.exe Token: SeTakeOwnershipPrivilege 4084 winlogonr.exe Token: SeLoadDriverPrivilege 4084 winlogonr.exe Token: SeSystemProfilePrivilege 4084 winlogonr.exe Token: SeSystemtimePrivilege 4084 winlogonr.exe Token: SeProfSingleProcessPrivilege 4084 winlogonr.exe Token: SeIncBasePriorityPrivilege 4084 winlogonr.exe Token: SeCreatePagefilePrivilege 4084 winlogonr.exe Token: SeCreatePermanentPrivilege 4084 winlogonr.exe Token: SeBackupPrivilege 4084 winlogonr.exe Token: SeRestorePrivilege 4084 winlogonr.exe Token: SeShutdownPrivilege 4084 winlogonr.exe Token: SeDebugPrivilege 4084 winlogonr.exe Token: SeAuditPrivilege 4084 winlogonr.exe Token: SeSystemEnvironmentPrivilege 4084 winlogonr.exe Token: SeChangeNotifyPrivilege 4084 winlogonr.exe Token: SeRemoteShutdownPrivilege 4084 winlogonr.exe Token: SeUndockPrivilege 4084 winlogonr.exe Token: SeSyncAgentPrivilege 4084 winlogonr.exe Token: SeEnableDelegationPrivilege 4084 winlogonr.exe Token: SeManageVolumePrivilege 4084 winlogonr.exe Token: SeImpersonatePrivilege 4084 winlogonr.exe Token: SeCreateGlobalPrivilege 4084 winlogonr.exe Token: 31 4084 winlogonr.exe Token: 32 4084 winlogonr.exe Token: 33 4084 winlogonr.exe Token: 34 4084 winlogonr.exe Token: 35 4084 winlogonr.exe Token: SeDebugPrivilege 4084 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe Token: SeDebugPrivilege 1052 winlogonr.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 5000 winlogonr.exe 1052 winlogonr.exe 4084 winlogonr.exe 4084 winlogonr.exe 4084 winlogonr.exe 4084 winlogonr.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 2640 wrote to memory of 1412 2640 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 88 PID 1412 wrote to memory of 2200 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 89 PID 1412 wrote to memory of 2200 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 89 PID 1412 wrote to memory of 2200 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 89 PID 2200 wrote to memory of 4988 2200 cmd.exe 92 PID 2200 wrote to memory of 4988 2200 cmd.exe 92 PID 2200 wrote to memory of 4988 2200 cmd.exe 92 PID 1412 wrote to memory of 5000 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 93 PID 1412 wrote to memory of 5000 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 93 PID 1412 wrote to memory of 5000 1412 4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe 93 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 1052 5000 winlogonr.exe 97 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 5000 wrote to memory of 4084 5000 winlogonr.exe 98 PID 4084 wrote to memory of 628 4084 winlogonr.exe 99 PID 4084 wrote to memory of 628 4084 winlogonr.exe 99 PID 4084 wrote to memory of 628 4084 winlogonr.exe 99 PID 4084 wrote to memory of 2864 4084 winlogonr.exe 100 PID 4084 wrote to memory of 2864 4084 winlogonr.exe 100 PID 4084 wrote to memory of 2864 4084 winlogonr.exe 100 PID 4084 wrote to memory of 1568 4084 winlogonr.exe 102 PID 4084 wrote to memory of 1568 4084 winlogonr.exe 102 PID 4084 wrote to memory of 1568 4084 winlogonr.exe 102 PID 4084 wrote to memory of 4148 4084 winlogonr.exe 104 PID 4084 wrote to memory of 4148 4084 winlogonr.exe 104 PID 4084 wrote to memory of 4148 4084 winlogonr.exe 104 PID 628 wrote to memory of 3960 628 cmd.exe 107 PID 628 wrote to memory of 3960 628 cmd.exe 107 PID 628 wrote to memory of 3960 628 cmd.exe 107 PID 2864 wrote to memory of 3360 2864 cmd.exe 108 PID 2864 wrote to memory of 3360 2864 cmd.exe 108 PID 2864 wrote to memory of 3360 2864 cmd.exe 108 PID 1568 wrote to memory of 2056 1568 cmd.exe 109 PID 1568 wrote to memory of 2056 1568 cmd.exe 109 PID 1568 wrote to memory of 2056 1568 cmd.exe 109 PID 4148 wrote to memory of 2500 4148 cmd.exe 110 PID 4148 wrote to memory of 2500 4148 cmd.exe 110 PID 4148 wrote to memory of 2500 4148 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe"C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe"C:\Users\Admin\AppData\Local\Temp\4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BDFRS.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4988
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2500
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
248KB
MD5327b770d5c00d00afccdb8404ce93a03
SHA1f4af94963c46cece104eae4114ef377f16647162
SHA256fef4e97c5d2a5384baa3f3083e2ec086affa363b12cdfa0b54eda7da9f991d88
SHA5123d88f855592bade68d28741a553ee80438a6762595ee8bbb63171e53ac6cf3673c58f57da38961eacb43a42d1c9f23e83a1241c6cc0a5b1904bcd31292d2239f