Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Resource
win7-20220901-en
General
-
Target
b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
-
Size
260KB
-
MD5
6e262f942aa819fe4555bc41df893c60
-
SHA1
ebcbdece979ecdb400e2dfe2a101ed15a8a1de25
-
SHA256
b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6
-
SHA512
736a5547b4c953d052575f959830f447a9a8f55d817cefa1704b1ec1e2a4f934ece18041d6ca10f28c4f245b384840e4388da4bb7520be64d6f3773000d85cbd
-
SSDEEP
6144:wj16JTe7QDT1lC7H0q6k+RCoXe8xrubntZ8u:m8JC8DT1lsHZv4BekEtZh
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Executes dropped EXE 2 IoCs
pid Process 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
resource yara_rule behavioral1/memory/1760-55-0x0000000001FD0000-0x000000000305E000-memory.dmp upx behavioral1/memory/1760-57-0x0000000001FD0000-0x000000000305E000-memory.dmp upx behavioral1/memory/1760-61-0x0000000001FD0000-0x000000000305E000-memory.dmp upx behavioral1/memory/1760-101-0x0000000001FD0000-0x000000000305E000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vqvkvf = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Vqvkvf.exe" notepad.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Enumerates connected drives 3 TTPs 35 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\I: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\L: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\J: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\N: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\E: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\F: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\H: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\G: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\M: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\K: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe File opened (read-only) \??\O: b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1760 set thread context of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 568 set thread context of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 848 svchost.exe 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe Token: SeDebugPrivilege 848 svchost.exe Token: SeDebugPrivilege 1648 calc.exe Token: SeDebugPrivilege 1568 notepad.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1112 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 5 PID 1760 wrote to memory of 1176 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 10 PID 1760 wrote to memory of 1204 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 7 PID 1760 wrote to memory of 1112 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 5 PID 1760 wrote to memory of 1176 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 10 PID 1760 wrote to memory of 1204 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 7 PID 1760 wrote to memory of 1112 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 5 PID 1760 wrote to memory of 1176 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 10 PID 1760 wrote to memory of 1204 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 7 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 1760 wrote to memory of 568 1760 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 27 PID 568 wrote to memory of 848 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 568 wrote to memory of 848 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 568 wrote to memory of 848 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 568 wrote to memory of 848 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 1648 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 568 wrote to memory of 848 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 848 wrote to memory of 1568 848 svchost.exe 30 PID 848 wrote to memory of 1568 848 svchost.exe 30 PID 848 wrote to memory of 1568 848 svchost.exe 30 PID 848 wrote to memory of 1568 848 svchost.exe 30 PID 848 wrote to memory of 1568 848 svchost.exe 30 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 568 wrote to memory of 880 568 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 31 PID 880 wrote to memory of 848 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 880 wrote to memory of 848 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 29 PID 880 wrote to memory of 1648 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 880 wrote to memory of 1648 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 28 PID 880 wrote to memory of 1568 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 30 PID 880 wrote to memory of 1568 880 b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"5⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:880
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Filesize260KB
MD56e262f942aa819fe4555bc41df893c60
SHA1ebcbdece979ecdb400e2dfe2a101ed15a8a1de25
SHA256b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6
SHA512736a5547b4c953d052575f959830f447a9a8f55d817cefa1704b1ec1e2a4f934ece18041d6ca10f28c4f245b384840e4388da4bb7520be64d6f3773000d85cbd
-
C:\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Filesize260KB
MD56e262f942aa819fe4555bc41df893c60
SHA1ebcbdece979ecdb400e2dfe2a101ed15a8a1de25
SHA256b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6
SHA512736a5547b4c953d052575f959830f447a9a8f55d817cefa1704b1ec1e2a4f934ece18041d6ca10f28c4f245b384840e4388da4bb7520be64d6f3773000d85cbd
-
\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Filesize260KB
MD56e262f942aa819fe4555bc41df893c60
SHA1ebcbdece979ecdb400e2dfe2a101ed15a8a1de25
SHA256b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6
SHA512736a5547b4c953d052575f959830f447a9a8f55d817cefa1704b1ec1e2a4f934ece18041d6ca10f28c4f245b384840e4388da4bb7520be64d6f3773000d85cbd
-
\Users\Admin\AppData\Local\Temp\b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6.exe
Filesize260KB
MD56e262f942aa819fe4555bc41df893c60
SHA1ebcbdece979ecdb400e2dfe2a101ed15a8a1de25
SHA256b9605f80ee0f224142ca3d2f614d618c64eb7d351ea21f95bc7d56fed56e69e6
SHA512736a5547b4c953d052575f959830f447a9a8f55d817cefa1704b1ec1e2a4f934ece18041d6ca10f28c4f245b384840e4388da4bb7520be64d6f3773000d85cbd