Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 06:08
Behavioral task
behavioral1
Sample
47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe
-
Size
64KB
-
MD5
6398c11a451ac8336a71e84b7d0cfed1
-
SHA1
88c4162f6ae08c966e9e60c15a6b0cfacd8355a1
-
SHA256
47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6
-
SHA512
dddcd61718bef6c78e3f9d1a5863ee13ac9719db09d4dadbb9493d1ed7c62bf086ffdc59de70f5fc0c175701b691b2f3f372e7c5389bdb912cc5b67c4397896f
-
SSDEEP
768:ii8n7UjPxg5I0T6GPjaojhYhwEv0yEieQL1JCMySpBIeVKr/SazNPvK7:L87UjPmTLj1Shwkv91Jdy6mMKbZzxK7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
resource yara_rule behavioral2/memory/4112-132-0x0000000002330000-0x0000000003355000-memory.dmp upx behavioral2/memory/4112-133-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4112-134-0x0000000002330000-0x0000000003355000-memory.dmp upx behavioral2/memory/4112-135-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4112-136-0x0000000002330000-0x0000000003355000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe Token: SeDebugPrivilege 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 784 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 9 PID 4112 wrote to memory of 788 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 16 PID 4112 wrote to memory of 64 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 11 PID 4112 wrote to memory of 2480 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 44 PID 4112 wrote to memory of 2500 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 45 PID 4112 wrote to memory of 2740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 52 PID 4112 wrote to memory of 2596 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 54 PID 4112 wrote to memory of 1080 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 55 PID 4112 wrote to memory of 3268 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 56 PID 4112 wrote to memory of 3364 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 57 PID 4112 wrote to memory of 3432 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 58 PID 4112 wrote to memory of 3528 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 59 PID 4112 wrote to memory of 3676 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 60 PID 4112 wrote to memory of 784 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 9 PID 4112 wrote to memory of 788 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 16 PID 4112 wrote to memory of 64 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 11 PID 4112 wrote to memory of 2480 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 44 PID 4112 wrote to memory of 2500 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 45 PID 4112 wrote to memory of 2740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 52 PID 4112 wrote to memory of 2596 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 54 PID 4112 wrote to memory of 1080 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 55 PID 4112 wrote to memory of 3268 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 56 PID 4112 wrote to memory of 3364 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 57 PID 4112 wrote to memory of 3432 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 58 PID 4112 wrote to memory of 3528 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 59 PID 4112 wrote to memory of 3676 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 60 PID 4112 wrote to memory of 784 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 9 PID 4112 wrote to memory of 788 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 16 PID 4112 wrote to memory of 64 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 11 PID 4112 wrote to memory of 2480 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 44 PID 4112 wrote to memory of 2500 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 45 PID 4112 wrote to memory of 2740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 52 PID 4112 wrote to memory of 2596 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 54 PID 4112 wrote to memory of 1080 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 55 PID 4112 wrote to memory of 3268 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 56 PID 4112 wrote to memory of 3364 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 57 PID 4112 wrote to memory of 3432 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 58 PID 4112 wrote to memory of 3528 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 59 PID 4112 wrote to memory of 3676 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 60 PID 4112 wrote to memory of 784 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 9 PID 4112 wrote to memory of 788 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 16 PID 4112 wrote to memory of 64 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 11 PID 4112 wrote to memory of 2480 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 44 PID 4112 wrote to memory of 2500 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 45 PID 4112 wrote to memory of 2740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 52 PID 4112 wrote to memory of 2596 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 54 PID 4112 wrote to memory of 1080 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 55 PID 4112 wrote to memory of 3268 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 56 PID 4112 wrote to memory of 3364 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 57 PID 4112 wrote to memory of 3432 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 58 PID 4112 wrote to memory of 3528 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 59 PID 4112 wrote to memory of 3676 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 60 PID 4112 wrote to memory of 4684 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 79 PID 4112 wrote to memory of 4684 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 79 PID 4112 wrote to memory of 4684 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 79 PID 4112 wrote to memory of 4684 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 79 PID 4112 wrote to memory of 4736 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 80 PID 4112 wrote to memory of 4736 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 80 PID 4112 wrote to memory of 4736 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 80 PID 4112 wrote to memory of 4736 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 80 PID 4112 wrote to memory of 4740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 81 PID 4112 wrote to memory of 4740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 81 PID 4112 wrote to memory of 4740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 81 PID 4112 wrote to memory of 4740 4112 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe 81 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:64
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2500
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2740
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe"C:\Users\Admin\AppData\Local\Temp\47b9a89d11588b8198db558699d26d1dd666df1f46d1bcc4a3c35ad35e338cd6.exe"2⤵
- UAC bypass
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4112 -
C:\Windows\SysWOW64\REGEDT32.EXE"C:\Windows\system32\REGEDT32.EXE"3⤵PID:4684
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:4736
-
-
C:\Windows\SysWOW64\WRITE.EXE"C:\Windows\system32\WRITE.EXE"3⤵PID:4740
-
-
C:\Windows\SysWOW64\REGEDT32.EXE"C:\Windows\system32\REGEDT32.EXE"3⤵PID:2208
-
-
C:\Windows\SysWOW64\WRITE.EXE"C:\Windows\system32\WRITE.EXE"3⤵PID:4928
-
-
C:\Windows\SysWOW64\CMD.EXE"C:\Windows\system32\CMD.EXE"3⤵PID:4932
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"3⤵PID:1960
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1080
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3268
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3364
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3432
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3528
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3676