Analysis
-
max time kernel
102s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 01:54
Static task
static1
Behavioral task
behavioral1
Sample
2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe
Resource
win7-20220901-en
General
-
Target
2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe
-
Size
160KB
-
MD5
a2f95eeb3673ab81a0afb1e4bde259e6
-
SHA1
bf7974abec8d5a479d553e08790e1c0370168fed
-
SHA256
2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa
-
SHA512
eec3e522543d778b336da4275f32975d2dbd27e28ae1f056ddfe78bcce9d22c7a990497c2db92f7dd7e8ff1e533c3f5831e4fd04d81e9382bda5f4873579e5e8
-
SSDEEP
3072:2nxwgxgfR/DVG7wBpEwfpNoICJwY7PuWZBD:e+xDVG0BpV0Jhi4BD
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
Executes dropped EXE 1 IoCs
pid Process 1624 WaterMark.exe -
resource yara_rule behavioral2/memory/3056-136-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3056-133-0x0000000003520000-0x00000000045AE000-memory.dmp upx behavioral2/memory/3056-137-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3056-141-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1624-147-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/1624-149-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/1624-151-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/1624-150-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral2/memory/3056-146-0x0000000003520000-0x00000000045AE000-memory.dmp upx behavioral2/memory/1624-153-0x0000000000400000-0x0000000000421000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAA3F.tmp 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993505" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2296910021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9FD8EA8F-5854-11ED-B696-5203DB9D3E0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2038160233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2296910021" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373900593" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{9FD8C37F-5854-11ED-B696-5203DB9D3E0F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993505" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2038160233" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2300659854" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993505" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993505" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30993505" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2300659854" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30993505" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe 1624 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe Token: SeDebugPrivilege 1624 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2536 iexplore.exe 620 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 620 iexplore.exe 620 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 1624 WaterMark.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3056 wrote to memory of 800 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 80 PID 3056 wrote to memory of 808 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 79 PID 3056 wrote to memory of 376 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 9 PID 3056 wrote to memory of 2528 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 42 PID 3056 wrote to memory of 2612 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 40 PID 3056 wrote to memory of 1624 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 81 PID 3056 wrote to memory of 1624 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 81 PID 3056 wrote to memory of 1624 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 81 PID 3056 wrote to memory of 2856 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 38 PID 3056 wrote to memory of 2724 3056 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe 36 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 5072 1624 WaterMark.exe 82 PID 1624 wrote to memory of 2536 1624 WaterMark.exe 83 PID 1624 wrote to memory of 2536 1624 WaterMark.exe 83 PID 1624 wrote to memory of 620 1624 WaterMark.exe 84 PID 1624 wrote to memory of 620 1624 WaterMark.exe 84 PID 2536 wrote to memory of 1344 2536 iexplore.exe 86 PID 2536 wrote to memory of 1344 2536 iexplore.exe 86 PID 2536 wrote to memory of 1344 2536 iexplore.exe 86 PID 620 wrote to memory of 1964 620 iexplore.exe 85 PID 620 wrote to memory of 1964 620 iexplore.exe 85 PID 620 wrote to memory of 1964 620 iexplore.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe"C:\Users\Admin\AppData\Local\Temp\2e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3056 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5072
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:620 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2724
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2612
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2528
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:808
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5a2f95eeb3673ab81a0afb1e4bde259e6
SHA1bf7974abec8d5a479d553e08790e1c0370168fed
SHA2562e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa
SHA512eec3e522543d778b336da4275f32975d2dbd27e28ae1f056ddfe78bcce9d22c7a990497c2db92f7dd7e8ff1e533c3f5831e4fd04d81e9382bda5f4873579e5e8
-
Filesize
160KB
MD5a2f95eeb3673ab81a0afb1e4bde259e6
SHA1bf7974abec8d5a479d553e08790e1c0370168fed
SHA2562e0e6c4e7555213a16299dde7333319feb145dc64c04b8e01efc50a7a79d1faa
SHA512eec3e522543d778b336da4275f32975d2dbd27e28ae1f056ddfe78bcce9d22c7a990497c2db92f7dd7e8ff1e533c3f5831e4fd04d81e9382bda5f4873579e5e8
-
Filesize
779B
MD5004e1f9f2b4726e5564e16c49fb4a831
SHA1b57e588e3371a7fee13eaa737aefdf4e126dcf51
SHA256bad8f107566ae2c13676df6b3c67da0642b6c850a6705acac03f460a6adb8dab
SHA5125971b426d98c2f4e66708d490f513d66f85b89aa31479ec8e60e6b54b2afe32b77cf8d853d367f5ee173685129d0ba179739be5cf72a11a641d1cee6a28c75c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DB145CFEEC544B1582FED1ADA3370DD
Filesize246B
MD572528a3e753c91fd843b520cd298dae5
SHA159338ff2c6a217d8dd06ce7e9953e1278473b1d6
SHA25626e9a0b027aa4e324764ebe313680516be65d1731aa59e82cd93d4f5216fb4ad
SHA51295965d290e4cf657313aef07cae35393cb64800247f61fe33265567044ba8d7a6f61d83209707d6d0391b6b2960658ba462ec51bb7c9c4b5562f005c34723d53
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9FD8C37F-5854-11ED-B696-5203DB9D3E0F}.dat
Filesize5KB
MD59a489e4da497f4270d23fd4ba74f68ef
SHA126706aa891532703c3931c254543636cf5632854
SHA25629a0b213f07f7b905ab1aacdba5466b7ac926d6526e30e6c21d7a0e68fab269b
SHA51216beaf7a5efae0a8f458ca6205ed689caabc8850d4dcfb3f04d371dd08f8bcad55ee0967eab0b3a3c7af3e2b748c351a53a20d2052974cd32958cb83d166d87f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9FD8EA8F-5854-11ED-B696-5203DB9D3E0F}.dat
Filesize3KB
MD50bffd0177456fa9eaad5656d19bcef9a
SHA1d42a138574aae68a5b480efad0b6c4a604405b2d
SHA2567123d2d31e8fd7d7e8f66066265ba8b9e33b0527c267b229f381aed94c689e08
SHA5120a25a8ec7c5e697a2bea9d6c7efd6fa058c653fbce1f7908b7518c9a896830a1224f9bbbf5ca2ec3c6c868f84d281cf2c3b4446e50be69262c232d3b56c672e4