Overview
overview
10Static
static
10faef0354ee...4d.zip
windows7-x64
faef0354ee...4d.zip
windows10-2004-x64
faef0354ee...4d.zip
android-13-x64
faef0354ee...4d.zip
android-13-x64
faef0354ee...4d.zip
macos-10.15-amd64
faef0354ee...4d.zip
ubuntu-18.04-amd64
faef0354ee...4d.zip
debian-9-armhf
faef0354ee...4d.zip
debian-9-mips
faef0354ee...4d.zip
debian-9-mipsel
ransomware...3n.exe
windows7-x64
ransomware...3n.exe
windows10-2004-x64
ransomware...3n.exe
android-9-x86
ransomware...3n.exe
android-13-x64
ransomware...3n.exe
macos-10.15-amd64
ransomware...3n.exe
ubuntu-18.04-amd64
ransomware...3n.exe
debian-9-armhf
ransomware...3n.exe
debian-9-mips
ransomware...3n.exe
debian-9-mipsel
ransomware...ey.txt
windows7-x64
ransomware...ey.txt
windows10-2004-x64
ransomware...ey.txt
android-11-x64
ransomware...ey.txt
android-13-x64
ransomware...ey.txt
macos-10.15-amd64
ransomware...ey.txt
ubuntu-18.04-amd64
ransomware...ey.txt
debian-9-armhf
ransomware...ey.txt
debian-9-mips
ransomware...ey.txt
debian-9-mipsel
ransomware...ey.txt
windows7-x64
ransomware...ey.txt
windows10-2004-x64
ransomware...ey.txt
android-11-x64
ransomware...ey.txt
android-13-x64
ransomware...ey.txt
macos-10.15-amd64
Resubmissions
05-02-2025 08:55
250205-kvkxmayrcz 1005-02-2025 06:37
250205-hdsvsswldm 1017-03-2024 04:49
240317-ffz1saef65 10Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 08:55
Static task
static1
Behavioral task
behavioral1
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral9
Sample
faef0354ee5f7c458afa16423e9ab04d.zip
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral10
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
macos-20241106-en
Behavioral task
behavioral15
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral17
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral18
Sample
ransomwares/7ev3n/7ev3n.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral19
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral22
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral23
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
macos-20241106-en
Behavioral task
behavioral24
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral25
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral26
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral27
Sample
ransomwares/Fake GoldenEye/Key.txt
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral28
Sample
ransomwares/Fake PetrWrap/Key.txt
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
ransomwares/Fake PetrWrap/Key.txt
Resource
win10v2004-20250129-en
Behavioral task
behavioral30
Sample
ransomwares/Fake PetrWrap/Key.txt
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral31
Sample
ransomwares/Fake PetrWrap/Key.txt
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral32
Sample
ransomwares/Fake PetrWrap/Key.txt
Resource
macos-20241101-en
Errors
General
-
Target
ransomwares/7ev3n/7ev3n.exe
-
Size
315KB
-
MD5
9f8bc96c96d43ecb69f883388d228754
-
SHA1
61ed25a706afa2f6684bb4d64f69c5fb29d20953
-
SHA256
7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5
-
SHA512
550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6
-
SSDEEP
6144:BswDdb2MemnBVlz0SoVbO4A6OA4Trl28TyT6llY1/I8cWJWlfTXv:BswRSslz0P1OdFXJlJ8buXv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 396 system.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Local\\system.exe" reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ev3n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCHTASKS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "157" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3896 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2724 shutdown.exe Token: SeRemoteShutdownPrivilege 2724 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 884 LogonUI.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2028 wrote to memory of 396 2028 7ev3n.exe 82 PID 2028 wrote to memory of 396 2028 7ev3n.exe 82 PID 2028 wrote to memory of 396 2028 7ev3n.exe 82 PID 396 wrote to memory of 4832 396 system.exe 83 PID 396 wrote to memory of 4832 396 system.exe 83 PID 396 wrote to memory of 4832 396 system.exe 83 PID 396 wrote to memory of 3896 396 system.exe 85 PID 396 wrote to memory of 3896 396 system.exe 85 PID 396 wrote to memory of 3896 396 system.exe 85 PID 396 wrote to memory of 344 396 system.exe 87 PID 396 wrote to memory of 344 396 system.exe 87 PID 396 wrote to memory of 344 396 system.exe 87 PID 396 wrote to memory of 1972 396 system.exe 88 PID 396 wrote to memory of 1972 396 system.exe 88 PID 396 wrote to memory of 1972 396 system.exe 88 PID 396 wrote to memory of 2264 396 system.exe 89 PID 396 wrote to memory of 2264 396 system.exe 89 PID 396 wrote to memory of 2264 396 system.exe 89 PID 396 wrote to memory of 1344 396 system.exe 90 PID 396 wrote to memory of 1344 396 system.exe 90 PID 396 wrote to memory of 1344 396 system.exe 90 PID 396 wrote to memory of 1796 396 system.exe 91 PID 396 wrote to memory of 1796 396 system.exe 91 PID 396 wrote to memory of 1796 396 system.exe 91 PID 396 wrote to memory of 1700 396 system.exe 93 PID 396 wrote to memory of 1700 396 system.exe 93 PID 396 wrote to memory of 1700 396 system.exe 93 PID 1700 wrote to memory of 2936 1700 cmd.exe 99 PID 1700 wrote to memory of 2936 1700 cmd.exe 99 PID 1700 wrote to memory of 2936 1700 cmd.exe 99 PID 1796 wrote to memory of 4680 1796 cmd.exe 100 PID 1796 wrote to memory of 4680 1796 cmd.exe 100 PID 1796 wrote to memory of 4680 1796 cmd.exe 100 PID 2264 wrote to memory of 332 2264 cmd.exe 101 PID 2264 wrote to memory of 332 2264 cmd.exe 101 PID 2264 wrote to memory of 332 2264 cmd.exe 101 PID 1972 wrote to memory of 1436 1972 cmd.exe 102 PID 1972 wrote to memory of 1436 1972 cmd.exe 102 PID 1972 wrote to memory of 1436 1972 cmd.exe 102 PID 344 wrote to memory of 1912 344 cmd.exe 103 PID 344 wrote to memory of 1912 344 cmd.exe 103 PID 344 wrote to memory of 1912 344 cmd.exe 103 PID 1344 wrote to memory of 2400 1344 cmd.exe 104 PID 1344 wrote to memory of 2400 1344 cmd.exe 104 PID 1344 wrote to memory of 2400 1344 cmd.exe 104 PID 396 wrote to memory of 1484 396 system.exe 110 PID 396 wrote to memory of 1484 396 system.exe 110 PID 396 wrote to memory of 1484 396 system.exe 110 PID 1484 wrote to memory of 2996 1484 cmd.exe 112 PID 1484 wrote to memory of 2996 1484 cmd.exe 112 PID 1484 wrote to memory of 2996 1484 cmd.exe 112 PID 396 wrote to memory of 3460 396 system.exe 113 PID 396 wrote to memory of 3460 396 system.exe 113 PID 396 wrote to memory of 3460 396 system.exe 113 PID 3460 wrote to memory of 2724 3460 cmd.exe 115 PID 3460 wrote to memory of 2724 3460 cmd.exe 115 PID 3460 wrote to memory of 2724 3460 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\ransomwares\7ev3n\7ev3n.exeC:\Users\Admin\AppData\Local\Temp\ransomwares\7ev3n\7ev3n.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\system.exe"C:\Users\Admin\AppData\Local\system.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\SCHTASKS.exeC:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3896
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:1912
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:644⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1436
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
-
C:\windows\SysWOW64\cmd.exeC:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:644⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:643⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:644⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 10 -f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b5855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD5c845363aae0b9f8f4c33759ac4610840
SHA1fa0d93ee743416cf7f6bd39d888973c36e64cb44
SHA25609968bc0c94979ff041838aea1119727122e3e33c7558c135e3f6ba8e4de62eb
SHA512550fe7d835ab46421b4b20e1425330ce43c7cacc72f7cff657a956cbd2aacc48c3e40d8fa84262e6b5af5205853662cc69202da277ccb807b4acf87196383d14
-
Filesize
315KB
MD57787b26cc7083a988b78dee3aa13a6e1
SHA1ea1563ef64c3b20f8de9a2c5f2b2bedcd5bfdcac
SHA256832c2d8424c525c3ff8d1918d0d7a9c3779386dfc0a5da7c061fa8b0de6bd5ee
SHA512bcb5e9dcb40e9428271445d44114ea533764b3c2dec86b10781807ded1a0daabaa916ea09c1c1df6d65368b1e98c202708c5072f044e1b62390826a0a5626af5