Analysis
-
max time kernel
152s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 01:52
Behavioral task
behavioral1
Sample
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe
Resource
win7-20220812-en
General
-
Target
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe
-
Size
397KB
-
MD5
9356c56374eed0fe79bd4772eaf7b6c0
-
SHA1
bfeea518e5673da831c383e14424b60f1e8153c5
-
SHA256
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
-
SHA512
2120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
SSDEEP
6144:Uk4qmzFrq5uOshWGPYBY3EEHKVJyAtTcAF/ST6E0uvr4MFKWG8aTv/ZN1sH7zCXi:39UqQxhQmEYyJCARK6PPM1aTHZNU7R
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
cybergate
2.6
Microsoft
jackerjumper.no-ip.biz:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
system32
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Modifies firewall policy service 2 TTPs 9 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchost.exe -
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\svchost.exe" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\system32\\svchost.exe" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Executes dropped EXE 3 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exeVoice Activated.exepid process 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 576 svchost.exe 1628 Voice Activated.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A417661-4H5J-62IW-3W4M-RRDP0MWGJU8Y} 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A417661-4H5J-62IW-3W4M-RRDP0MWGJU8Y}\StubPath = "C:\\Windows\\system32\\system32\\svchost.exe Restart" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A417661-4H5J-62IW-3W4M-RRDP0MWGJU8Y} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A417661-4H5J-62IW-3W4M-RRDP0MWGJU8Y}\StubPath = "C:\\Windows\\system32\\system32\\svchost.exe" explorer.exe -
Processes:
resource yara_rule behavioral1/memory/916-55-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/916-56-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/916-57-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/916-60-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/916-70-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/916-71-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx behavioral1/memory/916-76-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1272-81-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1272-82-0x0000000024080000-0x00000000240E2000-memory.dmp upx C:\Windows\SysWOW64\system32\svchost.exe upx behavioral1/memory/916-86-0x00000000240F0000-0x0000000024152000-memory.dmp upx \Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe upx C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe upx behavioral1/memory/976-95-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/916-96-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/976-101-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/916-102-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/916-103-0x0000000001E30000-0x0000000002EBE000-memory.dmp upx C:\Windows\SysWOW64\system32\svchost.exe upx \Windows\SysWOW64\system32\svchost.exe upx \Windows\SysWOW64\system32\svchost.exe upx behavioral1/memory/976-112-0x0000000004EB0000-0x0000000004F30000-memory.dmp upx behavioral1/memory/976-118-0x0000000024160000-0x00000000241C2000-memory.dmp upx behavioral1/memory/576-116-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/576-122-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/576-127-0x0000000000400000-0x0000000000480000-memory.dmp upx behavioral1/memory/576-128-0x0000000001DC0000-0x0000000002E4E000-memory.dmp upx behavioral1/memory/976-131-0x0000000004E80000-0x0000000005ACA000-memory.dmp upx behavioral1/memory/1272-132-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/976-134-0x0000000024160000-0x00000000241C2000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exepid process 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\system32\\svchost.exe" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\system32\\svchost.exe" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Enumerates connected drives 3 TTPs 37 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process File opened (read-only) \??\J: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\M: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\O: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\F: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\K: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\L: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\S: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\E: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\N: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\P: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\S: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\L: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\X: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\Z: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\G: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\H: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\U: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\Y: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\K: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\H: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\J: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\R: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\V: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\N: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\T: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\W: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\F: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\Q: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\M: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\E: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\I: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\R: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\T: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\G: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\I: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\O: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened (read-only) \??\Q: 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process File opened for modification C:\autorun.inf 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Drops file in System32 directory 4 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process File created C:\Windows\SysWOW64\system32\svchost.exe 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened for modification C:\Windows\SysWOW64\system32\svchost.exe 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened for modification C:\Windows\SysWOW64\system32\svchost.exe 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe File opened for modification C:\Windows\SysWOW64\system32\ 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Drops file in Program Files directory 1 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Drops file in Windows directory 1 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exepid process 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 576 svchost.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exepid process 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription pid process Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Token: SeDebugPrivilege 976 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exepid process 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Voice Activated.exepid process 1628 Voice Activated.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription pid process target process PID 916 wrote to memory of 1128 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe taskhost.exe PID 916 wrote to memory of 1188 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Dwm.exe PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE PID 916 wrote to memory of 1216 916 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Explorer.EXE -
System policy modification 1 TTPs 3 IoCs
Processes:
458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exesvchost.exe458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe"C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe"C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- System policy modification
-
C:\Windows\SysWOW64\system32\svchost.exe"C:\Windows\system32\system32\svchost.exe"4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\Voice Activated.exe"C:\Users\Admin\AppData\Local\Temp\Voice Activated.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
C:\Users\Admin\AppData\Local\Temp\Voice Activated.exeFilesize
88KB
MD5f51000d5b84b88248e65ef64437f750c
SHA1f2ad34140c390d2b01afe7185f4f2fb63f025a78
SHA25625739cc18bed2bddcd315bab9e621072a06e897a7def515e4dcd7bd2ed3fd3b9
SHA51251aa5fe4f9322b6f4eb64541413d12f280148668c228ba5b8c64451e84f529dfabe3048415c5d6bc0792b6950636d8d4eb76cc19996d305a950738864c989617
-
C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txtFilesize
317KB
MD5fc92151802d15968b1de0986a9ecc9a6
SHA14cf6e5d952eb9bb10fb830076ca55a00e9560451
SHA2561a7123b825bca9eb9c803ddee0776894d7f57a4855db1b542889b861bf04779a
SHA512f9231edd69078f0d38c562b16c3c0700e1c357ad2621e8e451b56fcdab834f96d9e1988ed3824c361e080bd913ea9985f608a691474e2fc5424228e5c935c8d8
-
C:\Windows\SYSTEM.INIFilesize
255B
MD5679af3e196fbee5ec3c7bed195336e62
SHA19ec2a8a292615481e069ef42570e6039f649d2d5
SHA256d3fa1d3c059345d195bfe88c931373793b4d36f46f913a4b25e0fca129b36480
SHA5127cf1d300436d1f628c90def226f3c62ae9fff185666309d64d31127e65f6a3c6c9584315123a3934fb07a12bf8b60e6790905f8f3a592e30b16175a37cb62d3b
-
C:\Windows\SysWOW64\system32\svchost.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
C:\Windows\SysWOW64\system32\svchost.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
\Users\Admin\AppData\Local\Temp\458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
\Users\Admin\AppData\Local\Temp\Voice Activated.exeFilesize
88KB
MD5f51000d5b84b88248e65ef64437f750c
SHA1f2ad34140c390d2b01afe7185f4f2fb63f025a78
SHA25625739cc18bed2bddcd315bab9e621072a06e897a7def515e4dcd7bd2ed3fd3b9
SHA51251aa5fe4f9322b6f4eb64541413d12f280148668c228ba5b8c64451e84f529dfabe3048415c5d6bc0792b6950636d8d4eb76cc19996d305a950738864c989617
-
\Users\Admin\AppData\Local\Temp\Voice Activated.exeFilesize
88KB
MD5f51000d5b84b88248e65ef64437f750c
SHA1f2ad34140c390d2b01afe7185f4f2fb63f025a78
SHA25625739cc18bed2bddcd315bab9e621072a06e897a7def515e4dcd7bd2ed3fd3b9
SHA51251aa5fe4f9322b6f4eb64541413d12f280148668c228ba5b8c64451e84f529dfabe3048415c5d6bc0792b6950636d8d4eb76cc19996d305a950738864c989617
-
\Windows\SysWOW64\system32\svchost.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
\Windows\SysWOW64\system32\svchost.exeFilesize
397KB
MD59356c56374eed0fe79bd4772eaf7b6c0
SHA1bfeea518e5673da831c383e14424b60f1e8153c5
SHA256458cdba55c2bc579f9dd17c28af59bcd979abafc0789047e8ef6ab78e74c63f8
SHA5122120e1b12959d0f92f8421984b84a9320919105f8c1ca66f878fd1b24c2c91e2ed02bbd3843554092373b376ca0536cd6a6f2ff9523ae10d26e149fe749c2975
-
memory/576-122-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/576-106-0x0000000000000000-mapping.dmp
-
memory/576-116-0x0000000001DC0000-0x0000000002E4E000-memory.dmpFilesize
16.6MB
-
memory/576-125-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/576-127-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/576-128-0x0000000001DC0000-0x0000000002E4E000-memory.dmpFilesize
16.6MB
-
memory/916-76-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/916-71-0x0000000001E30000-0x0000000002EBE000-memory.dmpFilesize
16.6MB
-
memory/916-55-0x0000000001E30000-0x0000000002EBE000-memory.dmpFilesize
16.6MB
-
memory/916-54-0x0000000076091000-0x0000000076093000-memory.dmpFilesize
8KB
-
memory/916-86-0x00000000240F0000-0x0000000024152000-memory.dmpFilesize
392KB
-
memory/916-56-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/916-57-0x0000000001E30000-0x0000000002EBE000-memory.dmpFilesize
16.6MB
-
memory/916-73-0x0000000003D30000-0x0000000003D32000-memory.dmpFilesize
8KB
-
memory/916-94-0x0000000005170000-0x00000000051F0000-memory.dmpFilesize
512KB
-
memory/916-58-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/916-96-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/916-60-0x0000000024010000-0x0000000024072000-memory.dmpFilesize
392KB
-
memory/916-102-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/916-103-0x0000000001E30000-0x0000000002EBE000-memory.dmpFilesize
16.6MB
-
memory/916-69-0x0000000003D30000-0x0000000003D32000-memory.dmpFilesize
8KB
-
memory/916-70-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/916-72-0x0000000000320000-0x0000000000322000-memory.dmpFilesize
8KB
-
memory/976-101-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/976-117-0x0000000004EB0000-0x0000000004EC6000-memory.dmpFilesize
88KB
-
memory/976-107-0x0000000004EB0000-0x0000000004F30000-memory.dmpFilesize
512KB
-
memory/976-136-0x0000000004E80000-0x0000000005ACA000-memory.dmpFilesize
12.3MB
-
memory/976-135-0x0000000003E10000-0x0000000003E12000-memory.dmpFilesize
8KB
-
memory/976-112-0x0000000004EB0000-0x0000000004F30000-memory.dmpFilesize
512KB
-
memory/976-134-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/976-124-0x0000000003E10000-0x0000000003E12000-memory.dmpFilesize
8KB
-
memory/976-114-0x0000000004EB0000-0x0000000004EC6000-memory.dmpFilesize
88KB
-
memory/976-118-0x0000000024160000-0x00000000241C2000-memory.dmpFilesize
392KB
-
memory/976-91-0x0000000000000000-mapping.dmp
-
memory/976-133-0x0000000004EB0000-0x0000000004F30000-memory.dmpFilesize
512KB
-
memory/976-95-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/976-131-0x0000000004E80000-0x0000000005ACA000-memory.dmpFilesize
12.3MB
-
memory/1216-63-0x0000000024010000-0x0000000024072000-memory.dmpFilesize
392KB
-
memory/1272-129-0x0000000000500000-0x0000000000502000-memory.dmpFilesize
8KB
-
memory/1272-75-0x00000000004E0000-0x00000000004E2000-memory.dmpFilesize
8KB
-
memory/1272-81-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/1272-74-0x0000000000500000-0x0000000000502000-memory.dmpFilesize
8KB
-
memory/1272-130-0x00000000004E0000-0x00000000004E2000-memory.dmpFilesize
8KB
-
memory/1272-132-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/1272-82-0x0000000024080000-0x00000000240E2000-memory.dmpFilesize
392KB
-
memory/1272-66-0x0000000000000000-mapping.dmp
-
memory/1272-68-0x00000000748F1000-0x00000000748F3000-memory.dmpFilesize
8KB
-
memory/1628-123-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1628-126-0x0000000000020000-0x0000000000022000-memory.dmpFilesize
8KB
-
memory/1628-111-0x0000000000000000-mapping.dmp