Analysis
-
max time kernel
178s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 05:21
Static task
static1
Behavioral task
behavioral1
Sample
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe
Resource
win7-20220812-en
General
-
Target
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe
-
Size
772KB
-
MD5
70b32a8786fff94ddf3dba0c175e4980
-
SHA1
1a9e9f72ea95df566971c62d05987ca30e1f8a08
-
SHA256
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6
-
SHA512
4ae96d2998c04b895e9ecb98638e79803f4308c85d315915653f436bae61fcbac5f4d50528c9668b5835b5d88673106a0ea381361c9671fa5cb1e3cc99c821e4
-
SSDEEP
24576:2MPTxtWEk5kS6Xq3QEPvrl8rZHty5jux:2aqEy6a3QEPvmxtyS
Malware Config
Signatures
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Bazar/Team9 Backdoor payload 4 IoCs
Processes:
resource yara_rule C:\Windows\System32\OpenSSH\ssh-agent.exe BazarBackdoorVar3 C:\Windows\System32\OpenSSH\ssh-agent.exe BazarBackdoorVar3 behavioral2/memory/3732-154-0x0000000140000000-0x000000014025D000-memory.dmp BazarBackdoorVar3 behavioral2/memory/3732-155-0x0000000140000000-0x000000014025D000-memory.dmp BazarBackdoorVar3 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 5 IoCs
Processes:
elevation_service.exeelevation_service.exemaintenanceservice.exeOSE.EXEssh-agent.exepid process 1752 elevation_service.exe 2864 elevation_service.exe 1720 maintenanceservice.exe 3832 OSE.EXE 3732 ssh-agent.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
elevation_service.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2629973501-4017243118-3254762364-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdgkfajodaliacghnafobjnclblcfmlm\1.0_0\manifest.json e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe -
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exeelevation_service.exedescription ioc process File opened (read-only) \??\E: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\H: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\V: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\Z: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\G: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\K: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\N: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\S: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\T: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\Q: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\M: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\U: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\W: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\J: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\I: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\Y: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\F: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\O: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\P: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\R: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\L: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\X: e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened (read-only) \??\F: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\K: elevation_service.exe -
Drops file in System32 directory 64 IoCs
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exeelevation_service.exedescription ioc process File opened for modification \??\c:\windows\system32\vds.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\dllhost.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\msiexec.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\perceptionsimulation\perceptionsimulationservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\sensordataservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\fxssvc.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\vds.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\lsass.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\system32\WindowsPowerShell\v1.0\glidemac.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\system32\qgpkckle.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File created \??\c:\windows\system32\openssh\oggfejop.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\wbengine.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\Appvclient.exe elevation_service.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\wbem\wmiApsrv.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\msdtc.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\tieringengineservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\system32\aiqcljlp.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File created \??\c:\windows\system32\olemmfce.tmp elevation_service.exe File created \??\c:\windows\system32\okdpjkfb.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\msiexec.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\system32\ekahockl.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\lsass.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\snmptrap.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vssvc.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\vssvc.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pibbaghj.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\svchost.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\searchindexer.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\SysWOW64\hkgajbjn.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\locator.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\spectrum.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\Agentservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\wbengine.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\perfhost.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\SysWOW64\sgrmbroker.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\windows\system32\lanmlgeh.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe -
Drops file in Program Files directory 32 IoCs
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exeelevation_service.exemaintenanceservice.exedescription ioc process File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe elevation_service.exe File created \??\c:\program files\windows media player\gocckohp.tmp elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7z.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files\google\chrome\Application\89.0.4389.114\elevation_service.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\jmmpndhg.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\opdlodcd.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File created C:\Program Files\Internet Explorer\akgcadpd.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe elevation_service.exe File created C:\Program Files\7-Zip\mnclgkoo.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File created \??\c:\program files (x86)\mozilla maintenance service\fgcdobib.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\program files\common files\microsoft shared\source engine\dfdgciqm.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File created C:\Program Files\7-Zip\bglnccaf.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created \??\c:\program files\google\chrome\Application\89.0.4389.114\lllgakkl.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File created C:\Program Files\7-Zip\ckjgpiji.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File created C:\Program Files\7-Zip\fijffced.tmp e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe -
Drops file in Windows directory 3 IoCs
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exeelevation_service.exedescription ioc process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
elevation_service.exepid process 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe 1752 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 648 648 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exeelevation_service.exedescription pid process Token: SeTakeOwnershipPrivilege 1844 e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe Token: SeTakeOwnershipPrivilege 1752 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
elevation_service.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe"C:\Users\Admin\AppData\Local\Temp\e38af0d79c15c641f3856bca0471b6e7205acac3d152816dc6ee8335e2a946f6.exe"1⤵
- Drops Chrome extension
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exeFilesize
2.1MB
MD5b28a38c4701489a6013bfb34282f3f70
SHA1ee8960071e9d4d11ae310ce62114d9aebce9711c
SHA256a03dddb0444d28be913f33743cc4deff96d68a01b8688fbe6ca3aecb7a77a029
SHA512c13225e1d48ff655eb0c787175abd1e2fe8318a925e1a3df1b1626416f13ab2596d09d22ffef9329a33e8a2e27f98d44ecfe2b6e49c869170c97a977297665db
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFilesize
788KB
MD5bf1798e4b4d62f9c9ee3b2a13c6639ac
SHA1164b72a907835638e8c8bc41199ed21e0a67d4e5
SHA25604b0883f53698dbb2db1a0861b6d91cb9b88bebb7164e9f30ecbe822821d0f7a
SHA5129ad0b26f387a8d652e222082f977b19db7880089c5b43b5fdbfd371a56f6350e74a14888dc9712ba1359e09486d59590f467acdc9e091efbe6b60e9b2cfd4173
-
C:\Program Files\7-Zip\7z.exeFilesize
1018KB
MD542466a0e78355f80892e3c265a28fc6a
SHA18b8e16f3624597414ca7c0b7cf0ec41e904582d1
SHA25601318727d5a8dbb9e7676e010a6d4782c61c093afe9a336e385b9b8aa2dfad6e
SHA512c1c8c8a159972961affae3989f88ebe736bde586c670d403577a6059a365a14eea5ea5112790b39ac137071e9ff875b28b5ad696bd1745a505d0ff69f1aec5b0
-
C:\Program Files\7-Zip\7zFM.exeFilesize
1.4MB
MD562c455924f6ba101211bd539ef86bd03
SHA1bb1fa34c553d34595faa9d768026e8f03064002f
SHA2564a08e4185fc9a073ad311189136f58c790b5f4067cb0145fa6c377653a087d09
SHA512b8c2d0e3d20cdfe1ea7c31cf4e9e2a5464e85a66c2bc380ddb642f8d54d986b57947498a821ef300bf5cd2143b3c6dc8c25a743e4c07a957ad93d50465338306
-
C:\Program Files\7-Zip\Uninstall.exeFilesize
575KB
MD5498848cfd0409f145adc20653b31b4bf
SHA140d199cb96aa8fb506ce87fa4ab1c4bc714faa0f
SHA256ebc76dd2f62b9ce26c7126aef9d0b9496c944147eec7cf65424dfc0cb7093432
SHA512dc77e0c2240e9cdf8673bf7c1d208a2c53c43c948e738fcd0db4c6431d5cffccb7ddff1470d8b0e12ad088475019ddcec5df0ac37b7c4573101cccc1d6f75529
-
C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXEFilesize
797KB
MD51505f9da84f04972a2d82c1dfe1b5805
SHA175e0944f3ac0af0464066326402070fecb81b943
SHA256017fa4a696f6ebddb517b09933e4ef07e9a1e46e4ceab9271866c7aa1eb9633e
SHA512bc6bfeb2ae2063f99ffbf6bbb67d1cffd6b18dff58db035a566927fe4c40040550493cd5fef3490e39c0809aeaa74463781697b90a41cee1d9765cb8adf5994f
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exeFilesize
2.0MB
MD5351de0b2b3c28b71fde928332fc4eb34
SHA141bba31016e7eb7a28f298d1ddbd3e7f0bf143ea
SHA256611351037b32ea672ffc5805827bef65c8c8ada137b766afb8f949ee1b51d8c3
SHA5121e3a77a2749648338db3711383bd52bf1b2b5d2d25776651838862a7308d72e76f0187b3eed8a6b3ab0082bb625b54eefe128c91d47aa57673cb710d666e7da8
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
932KB
MD51c2b64b4fde132b000c5c3b5899e8568
SHA12860a5a2ec4512afbc32e5e14d104f8ae3daa5ce
SHA25631b6b97ac71502d7abfff6ff20780008643ce3786274d1e99817c78e1651bc74
SHA5121d6a0bd5f1daaa732b3ec50fc807d73207a357fb5e1274fe1bbf2b7c83c306bfbd10ad4ad99c0ee855777127da9520d4f2d6dde117881bca8c9e5ff3b9469eca
-
C:\Windows\System32\OpenSSH\ssh-agent.exeFilesize
932KB
MD51c2b64b4fde132b000c5c3b5899e8568
SHA12860a5a2ec4512afbc32e5e14d104f8ae3daa5ce
SHA25631b6b97ac71502d7abfff6ff20780008643ce3786274d1e99817c78e1651bc74
SHA5121d6a0bd5f1daaa732b3ec50fc807d73207a357fb5e1274fe1bbf2b7c83c306bfbd10ad4ad99c0ee855777127da9520d4f2d6dde117881bca8c9e5ff3b9469eca
-
C:\odt\office2016setup.exeFilesize
5.6MB
MD5dfccb2a46f546e7d1f310a7f296f5e41
SHA1b8b8ae95b187efc09dbccb3d51a379004a1e9eac
SHA256fc6ac343ab1a62a5518e7ce154c8172fab2a02a7e8a8a3a30378423327a10399
SHA5121cf3a90ae0a7a452a7dd06313fa587299a159fc0d5c9b21971c350dc86ecccae8f32b55912dafb601545d70c8b7ada1cd128842be6878275d099d37976a4f7b5
-
\??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exeFilesize
788KB
MD5bf1798e4b4d62f9c9ee3b2a13c6639ac
SHA1164b72a907835638e8c8bc41199ed21e0a67d4e5
SHA25604b0883f53698dbb2db1a0861b6d91cb9b88bebb7164e9f30ecbe822821d0f7a
SHA5129ad0b26f387a8d652e222082f977b19db7880089c5b43b5fdbfd371a56f6350e74a14888dc9712ba1359e09486d59590f467acdc9e091efbe6b60e9b2cfd4173
-
\??\c:\windows\system32\Appvclient.exeFilesize
1.3MB
MD53358872f42a7df5c5fffb639fd100a69
SHA132251163391300683d955a37991d481bc0f18daf
SHA256dbbf7cc5b5b8a3da44135aba26b3c370e8ba0b4ab2ed07ffc0d059f49dccbe33
SHA5129e8b816422c44d19badb2c2b283af1db23073e18d992f8760d943b520c506450f51ddcbd66d201eeff4222af85a742d33c4b105754407e82f53a973795f5e961
-
\??\c:\windows\system32\fxssvc.exeFilesize
1.2MB
MD5cd30eaa8665356407ae9d0c3bec628bb
SHA1f629db2cb5fc0aebb81735f375de961263990f6c
SHA25641146210e7a5c4a98f1e654f158f1c4b159c81ed7821d7c1697764dab7910c8c
SHA512dd9a6e6c9364a3fc2195bd1b38d65d838414b489535e53c214bc1c4df52a1ce4b9adbb8299a8f84c1fd5a910c741971c1a76d75c69fe1ae47de50c5499cd08ba
-
\??\c:\windows\system32\msdtc.exeFilesize
704KB
MD530249840167336f9582a43e654ceebf8
SHA1c3589864ffea8622e34cd51f6bc23ea9da66e9bd
SHA2562d093ffc158c502dac83f312b98ab9ec81913922b8b4f94def1bf9aed19daccc
SHA512876cabf806ef3e4fa4ef0c0056da32f85f04424867f3f774b580ddbc4b318198ea53dc3dc87096719bb4fa490ec452c7f3e6af32151f74456ead2759dd87963a
-
\??\c:\windows\system32\msiexec.exeFilesize
627KB
MD536488c1b55264867f6f83196c2ec956a
SHA1c9de081c1c75c0e9ec61ebf13cd6a6f64c1b4ae7
SHA2568379eb97fabeb760d7101fa41b80625960627b73c606dd3ee851568e479895df
SHA51265194a11dc6d6e1f2609b5c0b0021f02167cc1465bbda0d21cef73987ac28f9d2a56cd7ffc759d9c6e2d7a4f9c7707e7cbb6b09114756cc0055a0db500ae6b7b
-
\??\c:\windows\system32\snmptrap.exeFilesize
576KB
MD5fc72e4137590f9bd533bc2a6766ff8b7
SHA12fe3c00019e78dc0a9abb6e6b014972c9a15186e
SHA256e02be5f67efde38b0f7c2fa0ada90ab9376fb0881c670bad1069a1075a3e7788
SHA5127e5db6d6e46cecd7497bf9e0a29069b03f18b8ccb3b19ef31ce60eb7d69b259b450c5eed695dd369f104a9fa7b0417cc1d703914938d1fdb407528c8158bd32a
-
memory/1720-140-0x0000000140000000-0x000000014022A000-memory.dmpFilesize
2.2MB
-
memory/1720-139-0x0000000140000000-0x000000014022A000-memory.dmpFilesize
2.2MB
-
memory/1752-135-0x0000000140000000-0x0000000140369000-memory.dmpFilesize
3.4MB
-
memory/1752-144-0x0000000140000000-0x0000000140369000-memory.dmpFilesize
3.4MB
-
memory/1844-133-0x0000000001000000-0x0000000001280000-memory.dmpFilesize
2.5MB
-
memory/1844-132-0x0000000001000000-0x0000000001280000-memory.dmpFilesize
2.5MB
-
memory/2864-147-0x0000000140000000-0x0000000140387000-memory.dmpFilesize
3.5MB
-
memory/2864-137-0x0000000140000000-0x0000000140387000-memory.dmpFilesize
3.5MB
-
memory/3732-155-0x0000000140000000-0x000000014025D000-memory.dmpFilesize
2.4MB
-
memory/3732-154-0x0000000140000000-0x000000014025D000-memory.dmpFilesize
2.4MB
-
memory/3832-142-0x0000000140000000-0x000000014022A000-memory.dmpFilesize
2.2MB
-
memory/3832-151-0x0000000140000000-0x000000014022A000-memory.dmpFilesize
2.2MB