Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe
Resource
win7-20220812-en
General
-
Target
abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe
-
Size
677KB
-
MD5
4b6713a3f4b49c317fd14823bc9bf9d0
-
SHA1
7392852e0a99616ce988b0a8a957bdd60bb6d14a
-
SHA256
abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6
-
SHA512
21d1858af3ad4762d599f7c79b95b61bfd6d11c95f72b912578894d52e3940bf70806f14b5168e7ed79792dc6c4081890f700f9b4f73be24bd2557f0a9bc4271
-
SSDEEP
12288:L4paur/3PRgXjqAu2IyMDpomrfuAYYmeb0Yo/eIPOoN3iEfGIzaw:L43/RHAu2I1D27YSvNPJiAGkv
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00090000000122d1-73.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
resource yara_rule behavioral1/memory/1280-55-0x00000000006E0000-0x000000000176E000-memory.dmp upx behavioral1/memory/1280-57-0x00000000006E0000-0x000000000176E000-memory.dmp upx behavioral1/memory/1280-69-0x00000000006E0000-0x000000000176E000-memory.dmp upx behavioral1/files/0x00090000000122d1-73.dat upx behavioral1/memory/1068-75-0x00000000003D0000-0x00000000003E2000-memory.dmp upx behavioral1/memory/1068-76-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral1/memory/1068-78-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx behavioral1/memory/1068-82-0x0000000003CD0000-0x0000000004D5E000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Loads dropped DLL 3 IoCs
pid Process 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\srtserv = "C:\\ProgramData\\srtserv\\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\R: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\S: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\Z: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\J: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\X: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\E: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\G: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\H: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\I: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\K: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\N: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\O: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\Q: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\F: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\W: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\U: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\M: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\T: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\V: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\Y: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe File opened (read-only) \??\L: abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000000c55997a100041646d696e00380008000400efbe0c55cb700c55997a2a00000030000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000000c55cb70122041707044617461003c0008000400efbe0c55cb700c55cb702a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = c6003100000000004b55ee4917004142423743457e310000ae0008000400efbe4b55ee494b55ee492a000000a854000000000c0000000000000000000000000000006100620062003700630065003300370030006600320065003000620037003800390066003700660063006200330036003300340038006300330063006200340034003700370062003300630032006100320039003400310030006100310065003700620033006200370039003800650037006500360038003300320064003600000018000000 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000000c55cb701100557365727300600008000400efbeee3a851a0c55cb702a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000000c55ed7210204c6f63616c00380008000400efbe0c55cb700c55ed722a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000004b55ee49102054656d700000360008000400efbe0c55cb704b55ee492a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Token: SeDebugPrivilege 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1248 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1280 wrote to memory of 1316 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1280 wrote to memory of 1372 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1280 wrote to memory of 624 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 28 PID 1280 wrote to memory of 624 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 28 PID 1280 wrote to memory of 624 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 28 PID 1280 wrote to memory of 624 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 28 PID 1280 wrote to memory of 1068 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 29 PID 1280 wrote to memory of 1068 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 29 PID 1280 wrote to memory of 1068 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 29 PID 1280 wrote to memory of 1068 1280 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 29 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 PID 1068 wrote to memory of 1248 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 17 PID 1068 wrote to memory of 1316 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 16 PID 1068 wrote to memory of 1372 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 15 PID 1068 wrote to memory of 1240 1068 abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe 30 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe"C:\Users\Admin\AppData\Local\Temp\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1280 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d63⤵PID:624
-
-
C:\ProgramData\srtserv\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exeC:\ProgramData\srtserv\abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6.exe -wait3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1068
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1316
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
677KB
MD54b6713a3f4b49c317fd14823bc9bf9d0
SHA17392852e0a99616ce988b0a8a957bdd60bb6d14a
SHA256abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6
SHA51221d1858af3ad4762d599f7c79b95b61bfd6d11c95f72b912578894d52e3940bf70806f14b5168e7ed79792dc6c4081890f700f9b4f73be24bd2557f0a9bc4271
-
Filesize
677KB
MD54b6713a3f4b49c317fd14823bc9bf9d0
SHA17392852e0a99616ce988b0a8a957bdd60bb6d14a
SHA256abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6
SHA51221d1858af3ad4762d599f7c79b95b61bfd6d11c95f72b912578894d52e3940bf70806f14b5168e7ed79792dc6c4081890f700f9b4f73be24bd2557f0a9bc4271
-
Filesize
255B
MD56b361e2848bcfaf5a9a8caa69ace0571
SHA1c7d50dc186bcd4348cf66485e243100afbf46215
SHA2567836cda7f04c5111216c119493220534a56cca4f7f889514e4c79a9f8436c18a
SHA512020b4c650300e277033c32d6f328f56405247a98720f2ae2e99e6e25913c4f72e0f97696631af2179afa4212eddd9e7a56e86291db4b012f31067dec42fe4fa2
-
Filesize
677KB
MD54b6713a3f4b49c317fd14823bc9bf9d0
SHA17392852e0a99616ce988b0a8a957bdd60bb6d14a
SHA256abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6
SHA51221d1858af3ad4762d599f7c79b95b61bfd6d11c95f72b912578894d52e3940bf70806f14b5168e7ed79792dc6c4081890f700f9b4f73be24bd2557f0a9bc4271
-
Filesize
677KB
MD54b6713a3f4b49c317fd14823bc9bf9d0
SHA17392852e0a99616ce988b0a8a957bdd60bb6d14a
SHA256abb7ce370f2e0b789f7fcb36348c3cb4477b3c2a29410a1e7b3b798e7e6832d6
SHA51221d1858af3ad4762d599f7c79b95b61bfd6d11c95f72b912578894d52e3940bf70806f14b5168e7ed79792dc6c4081890f700f9b4f73be24bd2557f0a9bc4271
-
Filesize
23KB
MD5374f995dd3d9e5d293c98f0ddab39618
SHA1f27b6bdf00907065c1403a019addd2021e0b4943
SHA256a81ce38be4c24ab23b0adce23f1be7c0605dce20a16715298b8c4b18bffef457
SHA512a7dee38640eaa780daebdab9b3016da48a3ebcd9a972290bd379a52bde5327205b1ed86e7f93660553b37d2a106bf26f1fab3c13d42d52f2b6ffbccd43d13726