Trojan.MSIL.FakeMS.LA
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 7,548 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 245 |
| First Seen: | October 5, 2023 |
| Last Seen: | April 22, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.MSIL.FakeMS.LA |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
705c8df36786b6f626b0dcb3b43f43b9
SHA1:
75cdb86457cbb612981da841951a1d6184af2bc9
File Size:
27.14 KB, 27136 bytes
|
|
MD5:
bbb99cf31fe22f16fec8c9fd816556f4
SHA1:
cdf72ca4238691cfb66b96d06b73954ff4a6814e
SHA256:
9B165D663325A8964D7D8150A09D34F711C53CAF794B2C2830323360399658F6
File Size:
40.45 KB, 40448 bytes
|
|
MD5:
685786fe7c12d2c7d5bb9c47a419d784
SHA1:
3921f367f310f57cef37f8a91df276e445a8a77d
SHA256:
29705F2BE5BB8FD94B35C8A3CEED36735C1657A46311D64411A79A08E4C28C24
File Size:
26.11 KB, 26112 bytes
|
|
MD5:
aaff3a8594ab4bb3f17e67ecd1898ce0
SHA1:
76713e947079f6fe52f129d8b7c69cac2f605b39
SHA256:
E3396E27164A8A1BBEA588D3470D0C77AEFDBD3F7479DDE3D9D24004EB2E016C
File Size:
26.62 KB, 26624 bytes
|
|
MD5:
cffe7079fd66c9c641a8395c74a7e1e6
SHA1:
bd11a2ab6f3d6faf4bb1d6258a66d2a55c2cbe9c
SHA256:
3D32652226CF0177C3CDB031856FD867BDDEDF2A261C2E6A1D620B8C17365062
File Size:
52.74 KB, 52736 bytes
|
Show More
|
MD5:
dbd367f5dac281366ebf8d2c6afbfe71
SHA1:
b1e368d3f04cbd88a5490ae0ec38bc98f3e925ce
SHA256:
CD811AE4C38103603BE19E44F21974FE192A04B66352901A8A3118B3F32CB7CE
File Size:
33.28 KB, 33280 bytes
|
|
MD5:
b935f5eacf271722c54f35c35b131733
SHA1:
a15f5e7b3a81923aaa5dbb9dc5998eb3f84d8a9b
SHA256:
75FCDB8C4573BDAD978E9EAE5254EEAD21FF5489BAF9F98E35FE1DCA0C8E0C5E
File Size:
27.65 KB, 27648 bytes
|
|
MD5:
fe22ebdf4085a7ea0102918629772759
SHA1:
e8c68ea6a993d911301116157100227014d8a0e0
SHA256:
CDACC759A856C645DF6D276412EAFB7A436AF494287D5DF308EDDBD0CC99E3E0
File Size:
588.29 KB, 588288 bytes
|
|
MD5:
383e33802feb9044055832207645deaf
SHA1:
00582bfe616c20176117f9a72b040b29e5e02a18
SHA256:
010FCE8997B5A0817D3F557F0D65906B26A724860F111E1232541E6E579E6943
File Size:
34.30 KB, 34304 bytes
|
|
MD5:
7d503b981d51d26ad5c8c1a0c3bd86c4
SHA1:
f4b30d247ae20cb21c5ad7d11e0ab3fc54cda795
SHA256:
AA4254DEB76DC8F1760A4868C65EBF255B859875EB3582BF55C0C6BFA42C4808
File Size:
26.62 KB, 26624 bytes
|
|
MD5:
b559ed1c15fd02eebb1a2c28d2a81d26
SHA1:
f547ffbc7999f17394514f78294c6dc1d3a11442
SHA256:
7062296225352C3FBCF4F8A548F1AB772A46BEE34C00C7667559BBA21B957C1D
File Size:
174.08 KB, 174080 bytes
|
|
MD5:
58692c0e5283cc7a07e2af0141d647ec
SHA1:
dbee2e11df08cc80407c234f9916462ddea121b5
SHA256:
10DE2512B87A5AAF92532A60629EC513346A282857BDE66FE75A9F61B9441602
File Size:
6.57 MB, 6571706 bytes
|
|
MD5:
ff1b523090a219e917ec26223a8a2250
SHA1:
3cece8113b8919826b4859a4a58f3f1055ef7c5c
SHA256:
6A7941E0C364BBCF29E1534C7F4B6A16E3D17A90F17B592A868470E712B92E46
File Size:
83.97 KB, 83968 bytes
|
|
MD5:
30b0f87791c5b372f94da081bc2e253d
SHA1:
52b09d907705ede98971fb7a89320cf703007ee3
SHA256:
0F52E8CE285FE1262A034756923102A02B9442B33F0676CE3C3B5A1C76742332
File Size:
34.82 KB, 34816 bytes
|
|
MD5:
6199b03f49eb85da0239d9fc22a60127
SHA1:
75bf3f59c1ff489ae6aa51556578db9f2279e633
SHA256:
B0CA5B7962DC08B21C8AC3A9BDF793879172D210C9D9A54CA71926A9CF1B01E9
File Size:
546.30 KB, 546304 bytes
|
|
MD5:
d246a0604a9193ca75e12fa0d090cbab
SHA1:
60bdcbc93a81f508fe927d1708dcd45bd27a77a7
SHA256:
E06558F88EB44BE08C547B437FEED7E88E8D0F3E2456E7D4ACF581A9F28F6D4E
File Size:
101.38 KB, 101376 bytes
|
|
MD5:
1a25365962bd83e3156dea335ad78454
SHA1:
e5aca6e1ede1f868b165298c7fbcf1415416d7f4
SHA256:
CB02F10D9D3ED2E0EF02555F3A3D66F415B982B2685BFA3D34BA49066D6EC336
File Size:
27.14 KB, 27136 bytes
|
|
MD5:
462392003ee1778b92825796c68f763f
SHA1:
252fb0b79ab34c72fed5c9a38ed33992e9877cf6
SHA256:
CB61C2F3F76A0B164C2C640ABED7CB6243E70FD8844760428B4564003EB67CB5
File Size:
437.76 KB, 437760 bytes
|
|
MD5:
6c3a0e61301f59e30317b53b07992875
SHA1:
b2f90c3ac09516fa0fadc296f1891f7e873f47d7
SHA256:
4924AA21FC8C4A89EBADE3A44D55E011F204C29C938AFDDF48C5C46FD3B386AE
File Size:
326.66 KB, 326656 bytes
|
|
MD5:
bec747800b76a781b35db75f98edcdc0
SHA1:
96603ced3bab90197c596bb66173cc9fb5624c12
SHA256:
E9E259F57002989AB6EC214B33A28EE2EA6393C4117E27F35CA9DE0D6D9BDA87
File Size:
129.54 KB, 129536 bytes
|
|
MD5:
a367bea51801368baf26eb6f17e306a8
SHA1:
19e255d5c0887efb67a37e25357cfd048fc17c3c
SHA256:
46C2AEE4E11017A3A404A41153B219322A1AA3350E0E3A7986839DDE2506BA72
File Size:
322.56 KB, 322560 bytes
|
|
MD5:
1c6e865dce1d8d853e0d0be3a51718e7
SHA1:
2eda397c63fd9bbea9191ae0f92a514637ff8335
SHA256:
80DFF662C1BEF50078C4EF29EB8755DCE25F7864A95FDC852B77808B1C046072
File Size:
138.75 KB, 138752 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File is .NET application
- File is 32-bit executable
- File is 64-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
Show More
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version |
|
| Comments |
|
| Company Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
Show More
|
| Legal Copyright |
|
| Original Filename |
Show More
|
| Product Name |
|
| Product Version |
|
File Traits
- .NET
- HighEntropy
- Installer Version
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 52 |
|---|---|
| Potentially Malicious Blocks: | 0 |
| Whitelisted Blocks: | 52 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- MSIL.Agent.FSDA
- MSIL.FakeMS.HG
- MSIL.FakeMS.HK
- MSIL.FakeMS.LA
- MSIL.FakeMS.QA
Show More
- MSIL.FakeMS.QF
- MSIL.FakeMS.QH
- MSIL.FakeMS.QL
- MSIL.FakeMS.QN
- MSIL.FakeMS.SA
- MSIL.FakeMS.SC
- MSIL.FakeMS.TQ
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\dav rpc service | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| \device\namedpipe\pshost.133963328285050569.3524.defaultappdomain.75cdb86457cbb612981da841951a1d6184af2bc9_0000027136 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.133999763033761670.3676.defaultappdomain.cdf72ca4238691cfb66b96d06b73954ff4a6814e_0000040448 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134005291884792767.5980.defaultappdomain.3921f367f310f57cef37f8a91df276e445a8a77d_0000026112 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134005793038190569.3892.defaultappdomain.76713e947079f6fe52f129d8b7c69cac2f605b39_0000026624 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134009199829916850.5484.defaultappdomain.bd11a2ab6f3d6faf4bb1d6258a66d2a55c2cbe9c_0000052736 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134009789055019624.2656.defaultappdomain.b1e368d3f04cbd88a5490ae0ec38bc98f3e925ce_0000033280 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134063765224554601.5824.defaultappdomain.a15f5e7b3a81923aaa5dbb9dc5998eb3f84d8a9b_0000027648 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
Show More
| \device\namedpipe\pshost.134076727726139287.6440.defaultappdomain.e8c68ea6a993d911301116157100227014d8a0e0_0000588288 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134100771080867073.688.defaultappdomain.f4b30d247ae20cb21c5ad7d11e0ab3fc54cda795_0000026624 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134105932302514630.6448.defaultappdomain.f547ffbc7999f17394514f78294c6dc1d3a11442_0000174080 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134114024902585082.5412.defaultappdomain.52b09d907705ede98971fb7a89320cf703007ee3_0000034816 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134122957061448092.1076.defaultappdomain.75bf3f59c1ff489ae6aa51556578db9f2279e633_0000546304 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134124588256167128.1900.defaultappdomain.60bdcbc93a81f508fe927d1708dcd45bd27a77a7_0000101376 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134130797352046805.3812.defaultappdomain.e5aca6e1ede1f868b165298c7fbcf1415416d7f4_0000027136 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134138063991809473.7044.defaultappdomain.252fb0b79ab34c72fed5c9a38ed33992e9877cf6_0000437760 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134151346175507975.7704.defaultappdomain.b2f90c3ac09516fa0fadc296f1891f7e873f47d7_0000326656 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134171621435397121.7124.defaultappdomain.96603ced3bab90197c596bb66173cc9fb5624c12_0000129536 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134189425699083645.7024.defaultappdomain.19e255d5c0887efb67a37e25357cfd048fc17c3c_0000322560 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\pshost.134213562668149225.3888.defaultappdomain.2eda397c63fd9bbea9191ae0f92a514637ff8335_0000138752 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 524288 |
| \device\namedpipe\wkssvc | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\tst\23h2up.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_1d4tepgj.t4u.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_1vouahby.sbf.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_2ljszzpm.52t.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_2qhtbbcd.ftt.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_4qxmnzyi.1e4.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_50aquiwq.4ue.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_5oib4iid.pjc.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_bdcddwie.xzd.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_blnvbcfb.krw.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_cifu1rua.fzv.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_d5zcls4r.eiz.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_dn50u0hb.q04.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_e2znmdsb.ubx.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_es1zq0kz.vas.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_f2bhvjwm.htx.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_fhxmrtzg.1mc.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_heonqdce.oar.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_hery0eni.fyk.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_hilxfa4n.e4d.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_hrjugsi0.bxg.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_ijmapy0z.rxf.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_iuv0hawr.wak.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_jpni24fa.3vk.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_lmklyqyw.b4w.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_lpwlfgph.1wn.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_luciboh1.ymb.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_opxqg3xe.f5v.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_r0qaqbkl.mpd.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_rh4xuezz.az3.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_rnq1ogdp.1tb.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_rq2yud4c.20z.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_rr2w15rf.ste.ps1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_rv1ovlyy.ssr.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_s1q3stfp.gkr.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_tevhojpc.3to.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_tlhxmxei.fg0.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_ukxrjqnm.5ct.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\__psscriptpolicytest_woc0x5r1.cxl.psm1 | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.0.cs | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.cmdline | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.dll | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.err | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.out | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\lc0etmiq\lc0etmiq.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsd8a44.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsy8a24.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\downloads\logs\pcinfostartuplog_09012026_110029.log | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\logs\pcinfostartuplog_09012026_110029.log | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\microsoft\tracing\rasapi32::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::enableconsoletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasapi32::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKLM\software\microsoft\tracing\rasmancs::enablefiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableautofiletracing | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::enableconsoletracing | RegNtPreCreateKey |
Show More
| HKLM\software\microsoft\tracing\rasmancs::filetracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::consoletracingmask | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::maxfilesize | RegNtPreCreateKey | |
| HKLM\software\microsoft\tracing\rasmancs::filedirectory | %windir%\tracing | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\powershell\1\shellids\microsoft.powershell::executionpolicy | Bypass | RegNtPreCreateKey |
| HKLM\software\microsoft\powershell\1\shellids\microsoft.powershell::executionpolicy | RemoteSigned | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
23 additional items are not displayed above. |
| User Data Access |
|
| Encryption Used |
|
| Anti Debug |
|
| Other Suspicious |
|
| Network Info Queried |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Network Winhttp |
|
| Process Shell Execute |
|
| Service Control |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\AnyDesk.exe" --install "C:\Program Files (x86)\AnyDesk" --start-with-win --silent
|
"C:\WINDOWS\system32\mode.com" con cols=60 lines=13
|
"C:\WINDOWS\system32\mode.com" "C:\WINDOWS\system32\mode.com" con cols=60 lines=13
|
"C:\WINDOWS\system32\cscript.exe" "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /inpkey:2FBND-M92WF-GWYQV-FCB8D-Y4KJ9
|
"C:\WINDOWS\system32\cscript.exe" "C:\Program Files\Microsoft Office\Office16\ospp.vbs" /act
|
Show More
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Druxhhez\AppData\Local\Temp\lc0etmiq\lc0etmiq.cmdline"
|