Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:53
Static task
static1
Behavioral task
behavioral1
Sample
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe
Resource
win7-20221111-en
General
-
Target
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe
-
Size
243KB
-
MD5
474e6cf3450bfe79631eb1aa0365db7c
-
SHA1
b42b1fd4a02f74018fbf3ae97d04e1a96e93d426
-
SHA256
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563
-
SHA512
f61b105edca3499f5eee9619bf3b6ee5e3a2914a9e17990002fb3085fd553a384eb099e791b0383d1611a6f0ffdc7c37a8af764a6c14568093ea7004281f3564
-
SSDEEP
6144:Aiv0A7NvO+K0l0mvoZELgDBYeSfq9a34/8MRWt6e:ZFNjK0zvov9VSfqQKRWt6e
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
Au_.exee07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe -
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe -
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 568 Au_.exe -
Processes:
resource yara_rule behavioral1/memory/1236-55-0x0000000001DB0000-0x0000000002E6A000-memory.dmp upx behavioral1/memory/1236-62-0x0000000001DB0000-0x0000000002E6A000-memory.dmp upx behavioral1/memory/568-63-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/568-70-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx behavioral1/memory/568-73-0x0000000001DD0000-0x0000000002E8A000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
Au_.exepid process 568 Au_.exe -
Loads dropped DLL 4 IoCs
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exepid process 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe -
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Au_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Au_.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe -
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Au_.exedescription ioc process File opened (read-only) \??\O: Au_.exe File opened (read-only) \??\P: Au_.exe File opened (read-only) \??\R: Au_.exe File opened (read-only) \??\T: Au_.exe File opened (read-only) \??\V: Au_.exe File opened (read-only) \??\Y: Au_.exe File opened (read-only) \??\H: Au_.exe File opened (read-only) \??\N: Au_.exe File opened (read-only) \??\Q: Au_.exe File opened (read-only) \??\W: Au_.exe File opened (read-only) \??\E: Au_.exe File opened (read-only) \??\F: Au_.exe File opened (read-only) \??\I: Au_.exe File opened (read-only) \??\L: Au_.exe File opened (read-only) \??\X: Au_.exe File opened (read-only) \??\G: Au_.exe File opened (read-only) \??\J: Au_.exe File opened (read-only) \??\S: Au_.exe File opened (read-only) \??\U: Au_.exe File opened (read-only) \??\Z: Au_.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
Au_.exedescription ioc process File opened for modification C:\autorun.inf Au_.exe -
Drops file in Program Files directory 1 IoCs
Processes:
Au_.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe Au_.exe -
Drops file in Windows directory 3 IoCs
Processes:
Au_.exee07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exedescription ioc process File created C:\Windows\6c2e13 Au_.exe File created C:\Windows\6c2711 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe File opened for modification C:\Windows\SYSTEM.INI e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\006C2B07_Rar\e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\006C2B07_Rar\e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exepid process 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe 568 Au_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Au_.exepid process 568 Au_.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription pid process Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe Token: SeDebugPrivilege 568 Au_.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription pid process target process PID 1236 wrote to memory of 1132 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe taskhost.exe PID 1236 wrote to memory of 1216 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Dwm.exe PID 1236 wrote to memory of 1264 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Explorer.EXE PID 1236 wrote to memory of 568 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Au_.exe PID 1236 wrote to memory of 568 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Au_.exe PID 1236 wrote to memory of 568 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Au_.exe PID 1236 wrote to memory of 568 1236 e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Au_.exe PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE PID 568 wrote to memory of 1132 568 Au_.exe taskhost.exe PID 568 wrote to memory of 1216 568 Au_.exe Dwm.exe PID 568 wrote to memory of 1264 568 Au_.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exeAu_.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Au_.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe"C:\Users\Admin\AppData\Local\Temp\e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:568
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\006C2B07_Rar\e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563.exe
Filesize175KB
MD598a340c720df3a50e4549a0b755096ab
SHA1800c259789099e7cb01b54b9858b2e2f7a90d1c5
SHA25640620458f14b2b8b79af2796613a4a2367192a1563d2e732d245989f3499d228
SHA512c1c40edfb4ed1ed3e7f8f6486f42400aed9d241dd74b510e11f424fbc9578c262e10733cede4857af82009a64cc1b01a2b706092b7c7add83a2a8f887a237ae8
-
Filesize
243KB
MD5474e6cf3450bfe79631eb1aa0365db7c
SHA1b42b1fd4a02f74018fbf3ae97d04e1a96e93d426
SHA256e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563
SHA512f61b105edca3499f5eee9619bf3b6ee5e3a2914a9e17990002fb3085fd553a384eb099e791b0383d1611a6f0ffdc7c37a8af764a6c14568093ea7004281f3564
-
Filesize
243KB
MD5474e6cf3450bfe79631eb1aa0365db7c
SHA1b42b1fd4a02f74018fbf3ae97d04e1a96e93d426
SHA256e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563
SHA512f61b105edca3499f5eee9619bf3b6ee5e3a2914a9e17990002fb3085fd553a384eb099e791b0383d1611a6f0ffdc7c37a8af764a6c14568093ea7004281f3564
-
Filesize
255B
MD58912cc9b989f021ebf33dfe939d5d6e4
SHA1a7dd1f3d89e96dc0e7f28d5e6e197a782601c574
SHA256bf8bc24ef34a3609c3fe1e279029d4b58226df0bd3aa8f845bf864cb44c076d1
SHA5120fccbaf55b96b7789bdc85069aa5dd9527b57ba7f322e1020c72cb25b83b941e5562c438aa524c1b9d31bb6c3fdbba394eb79ed36d36dd02628662cbe5ce2375
-
Filesize
14KB
MD53809b1424d53ccb427c88cabab8b5f94
SHA1bc74d911216f32a9ca05c0d9b61a2aecfc0d1c0e
SHA256426efd56da4014f12ec8ee2e268f86b848bbca776333d55482cb3eb71c744088
SHA512626a1c5edd86a71579e42bac8df479184515e6796fa21cb4fad6731bb775641d25f8eb8e86b939b9db9099453e85c572c9ea7897339a3879a1b672bc9226fcee
-
Filesize
10KB
MD532465a07028b927b22c38e642c2cb836
SHA1309cac412b2ecf6a36f6e989c828afcdd8c7a6e4
SHA256eda545d4dcb37098a90fce9692d5094bb56897f04eff6d40e3dedd122a4d1292
SHA5129d886a722bbbb5d8d77e97d256057fe685f1932042257a8382e13548fe835d01c64de65e2b5ad2c2ff99692b14c924e6ddb84797f6224f1772e8699b421e6aff
-
Filesize
120KB
MD55fa1d819dd6a34dd409482a5911267a0
SHA1f8a2509dfe6dfa4a9aec99033478892609eab70c
SHA256ecb3f1745770b6a0ab9e6d4255651ce5812b46713f45790f1f98ba811c67a518
SHA512369361b3752dd8ada9b06fa0388f2c7b4553d102d7d2cc8eb7d061055dab56b5bbb8e9615e8bada57121157ddbd557977c7ab5985d4ec8df0eb9a69b5d5c252e
-
Filesize
243KB
MD5474e6cf3450bfe79631eb1aa0365db7c
SHA1b42b1fd4a02f74018fbf3ae97d04e1a96e93d426
SHA256e07e15b58842f709e023b0bbf4d3b932283e21377d72cc4347712bba74a69563
SHA512f61b105edca3499f5eee9619bf3b6ee5e3a2914a9e17990002fb3085fd553a384eb099e791b0383d1611a6f0ffdc7c37a8af764a6c14568093ea7004281f3564