Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2023, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
ea39a694769de620936e8ee9d4af40a65f356928.exe
Resource
win7-20221111-en
General
-
Target
ea39a694769de620936e8ee9d4af40a65f356928.exe
-
Size
100KB
-
MD5
adaac25444ac37cd4fe1da9f8e05c4e0
-
SHA1
ea39a694769de620936e8ee9d4af40a65f356928
-
SHA256
eea056ee1bdb488b2e78f97c8fd97f4a8b6fc5702fe8979441c031e8a2b7c905
-
SHA512
3315fa9d3bc8fede1e1b401d64ef853074f6ce6aa58db363c4130f566188fcaa70604d335b49400ca2dd8b3f64c291a8ccaa8c976c9295e12376275487bdfeda
-
SSDEEP
3072:HoLA8rHxhUqA9X2kL2j/bT5iOZMomoc/VokHILiX:ILRRhZkyT5XZMyc/GkHIA
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/2512-133-0x00000000022B0000-0x000000000333E000-memory.dmp upx behavioral2/memory/2512-134-0x00000000022B0000-0x000000000333E000-memory.dmp upx behavioral2/memory/2512-135-0x00000000022B0000-0x000000000333E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc ea39a694769de620936e8ee9d4af40a65f356928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ea39a694769de620936e8ee9d4af40a65f356928.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\J: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\O: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Q: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\I: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\K: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\N: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\U: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\X: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Y: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\E: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\L: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\R: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\S: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\V: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\F: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\H: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\M: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\P: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\T: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\W: ea39a694769de620936e8ee9d4af40a65f356928.exe File opened (read-only) \??\Z: ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops file in Program Files directory 11 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe ea39a694769de620936e8ee9d4af40a65f356928.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe ea39a694769de620936e8ee9d4af40a65f356928.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI ea39a694769de620936e8ee9d4af40a65f356928.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings ea39a694769de620936e8ee9d4af40a65f356928.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe Token: SeDebugPrivilege 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 784 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 8 PID 2512 wrote to memory of 780 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 28 PID 2512 wrote to memory of 60 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 11 PID 2512 wrote to memory of 2348 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 31 PID 2512 wrote to memory of 2360 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 32 PID 2512 wrote to memory of 2472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 33 PID 2512 wrote to memory of 3044 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 50 PID 2512 wrote to memory of 776 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 49 PID 2512 wrote to memory of 3232 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 54 PID 2512 wrote to memory of 3328 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 53 PID 2512 wrote to memory of 3396 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 58 PID 2512 wrote to memory of 3472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 59 PID 2512 wrote to memory of 3716 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 60 PID 2512 wrote to memory of 4684 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 63 PID 2512 wrote to memory of 784 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 8 PID 2512 wrote to memory of 780 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 28 PID 2512 wrote to memory of 60 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 11 PID 2512 wrote to memory of 2348 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 31 PID 2512 wrote to memory of 2360 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 32 PID 2512 wrote to memory of 2472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 33 PID 2512 wrote to memory of 3044 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 50 PID 2512 wrote to memory of 776 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 49 PID 2512 wrote to memory of 3232 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 54 PID 2512 wrote to memory of 3328 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 53 PID 2512 wrote to memory of 3396 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 58 PID 2512 wrote to memory of 3472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 59 PID 2512 wrote to memory of 3716 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 60 PID 2512 wrote to memory of 4684 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 63 PID 2512 wrote to memory of 784 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 8 PID 2512 wrote to memory of 780 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 28 PID 2512 wrote to memory of 60 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 11 PID 2512 wrote to memory of 2348 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 31 PID 2512 wrote to memory of 2360 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 32 PID 2512 wrote to memory of 2472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 33 PID 2512 wrote to memory of 3044 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 50 PID 2512 wrote to memory of 776 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 49 PID 2512 wrote to memory of 3232 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 54 PID 2512 wrote to memory of 3328 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 53 PID 2512 wrote to memory of 3396 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 58 PID 2512 wrote to memory of 3472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 59 PID 2512 wrote to memory of 3716 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 60 PID 2512 wrote to memory of 4684 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 63 PID 2512 wrote to memory of 784 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 8 PID 2512 wrote to memory of 780 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 28 PID 2512 wrote to memory of 60 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 11 PID 2512 wrote to memory of 2348 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 31 PID 2512 wrote to memory of 2360 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 32 PID 2512 wrote to memory of 2472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 33 PID 2512 wrote to memory of 3044 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 50 PID 2512 wrote to memory of 776 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 49 PID 2512 wrote to memory of 3232 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 54 PID 2512 wrote to memory of 3328 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 53 PID 2512 wrote to memory of 3396 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 58 PID 2512 wrote to memory of 3472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 59 PID 2512 wrote to memory of 3716 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 60 PID 2512 wrote to memory of 4684 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 63 PID 2512 wrote to memory of 784 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 8 PID 2512 wrote to memory of 780 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 28 PID 2512 wrote to memory of 60 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 11 PID 2512 wrote to memory of 2348 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 31 PID 2512 wrote to memory of 2360 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 32 PID 2512 wrote to memory of 2472 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 33 PID 2512 wrote to memory of 3044 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 50 PID 2512 wrote to memory of 776 2512 ea39a694769de620936e8ee9d4af40a65f356928.exe 49 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ea39a694769de620936e8ee9d4af40a65f356928.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:60
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2360
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:776
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\ea39a694769de620936e8ee9d4af40a65f356928.exe"C:\Users\Admin\AppData\Local\Temp\ea39a694769de620936e8ee9d4af40a65f356928.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2512
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3232
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3396
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3472
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4684