Analysis
-
max time kernel
175s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ecca15057a3be4c5e61a99ac58ad9db0.dll
Resource
win7-20230831-en
General
-
Target
NEAS.ecca15057a3be4c5e61a99ac58ad9db0.dll
-
Size
120KB
-
MD5
ecca15057a3be4c5e61a99ac58ad9db0
-
SHA1
798d839952f7418de192501837dee63f28e7a315
-
SHA256
a6fe3ab46eaa6dc8ccbd699a12475445d9cf08b7fa96b3d8e5d466171dda74fc
-
SHA512
30ab16751a90d5c3a36b25e00d41d80bdf6c30976e6b3b289d331fc6f160ea18c5d31236074b0bc218932873d51f4705cf13d09264899cc023f2d0ec47f59eea
-
SSDEEP
1536:7qPSluvlYG6zhTHxZUirwGoVyJ8K9j43nKheLtNTcN+J/HqGQon34/QhAW:808kz1pPOm9aZLzTr9P3vhAW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e582381.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e582381.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" e583f27.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" e583f27.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" e583f27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e583f27.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e583f27.exe -
Executes dropped EXE 3 IoCs
pid Process 4864 e582381.exe 2300 e583479.exe 4796 e583f27.exe -
resource yara_rule behavioral2/memory/4864-7-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-9-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-10-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-11-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-12-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-18-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-23-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-33-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-42-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-38-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-34-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-46-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-47-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-48-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-50-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-53-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-62-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-65-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-66-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-68-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-70-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4864-76-0x0000000000810000-0x00000000018CA000-memory.dmp upx behavioral2/memory/4796-99-0x0000000000B70000-0x0000000001C2A000-memory.dmp upx behavioral2/memory/4796-132-0x0000000000B70000-0x0000000001C2A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" e583f27.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" e583f27.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc e583f27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" e582381.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e583f27.exe -
Enumerates connected drives 3 TTPs 7 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: e582381.exe File opened (read-only) \??\E: e582381.exe File opened (read-only) \??\G: e582381.exe File opened (read-only) \??\H: e582381.exe File opened (read-only) \??\I: e582381.exe File opened (read-only) \??\J: e582381.exe File opened (read-only) \??\K: e582381.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\e582fd5 e582381.exe File opened for modification C:\Windows\SYSTEM.INI e582381.exe File created C:\Windows\e588875 e583f27.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4864 e582381.exe 4864 e582381.exe 4864 e582381.exe 4864 e582381.exe 4796 e583f27.exe 4796 e583f27.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe Token: SeDebugPrivilege 4864 e582381.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 4196 1936 rundll32.exe 85 PID 1936 wrote to memory of 4196 1936 rundll32.exe 85 PID 1936 wrote to memory of 4196 1936 rundll32.exe 85 PID 4196 wrote to memory of 4864 4196 rundll32.exe 88 PID 4196 wrote to memory of 4864 4196 rundll32.exe 88 PID 4196 wrote to memory of 4864 4196 rundll32.exe 88 PID 4864 wrote to memory of 788 4864 e582381.exe 83 PID 4864 wrote to memory of 792 4864 e582381.exe 82 PID 4864 wrote to memory of 336 4864 e582381.exe 9 PID 4864 wrote to memory of 2448 4864 e582381.exe 17 PID 4864 wrote to memory of 2468 4864 e582381.exe 57 PID 4864 wrote to memory of 2624 4864 e582381.exe 53 PID 4864 wrote to memory of 1320 4864 e582381.exe 48 PID 4864 wrote to memory of 3292 4864 e582381.exe 47 PID 4864 wrote to memory of 3468 4864 e582381.exe 46 PID 4864 wrote to memory of 3620 4864 e582381.exe 45 PID 4864 wrote to memory of 3680 4864 e582381.exe 19 PID 4864 wrote to memory of 3768 4864 e582381.exe 44 PID 4864 wrote to memory of 3896 4864 e582381.exe 43 PID 4864 wrote to memory of 3556 4864 e582381.exe 32 PID 4864 wrote to memory of 2264 4864 e582381.exe 31 PID 4864 wrote to memory of 2896 4864 e582381.exe 25 PID 4864 wrote to memory of 4620 4864 e582381.exe 24 PID 4864 wrote to memory of 1580 4864 e582381.exe 22 PID 4864 wrote to memory of 1936 4864 e582381.exe 23 PID 4864 wrote to memory of 4196 4864 e582381.exe 85 PID 4864 wrote to memory of 4196 4864 e582381.exe 85 PID 4864 wrote to memory of 2436 4864 e582381.exe 86 PID 4196 wrote to memory of 2300 4196 rundll32.exe 90 PID 4196 wrote to memory of 2300 4196 rundll32.exe 90 PID 4196 wrote to memory of 2300 4196 rundll32.exe 90 PID 4864 wrote to memory of 3948 4864 e582381.exe 89 PID 4196 wrote to memory of 4796 4196 rundll32.exe 91 PID 4196 wrote to memory of 4796 4196 rundll32.exe 91 PID 4196 wrote to memory of 4796 4196 rundll32.exe 91 PID 4864 wrote to memory of 788 4864 e582381.exe 83 PID 4864 wrote to memory of 792 4864 e582381.exe 82 PID 4864 wrote to memory of 336 4864 e582381.exe 9 PID 4864 wrote to memory of 2448 4864 e582381.exe 17 PID 4864 wrote to memory of 2468 4864 e582381.exe 57 PID 4864 wrote to memory of 2624 4864 e582381.exe 53 PID 4864 wrote to memory of 1320 4864 e582381.exe 48 PID 4864 wrote to memory of 3292 4864 e582381.exe 47 PID 4864 wrote to memory of 3468 4864 e582381.exe 46 PID 4864 wrote to memory of 3620 4864 e582381.exe 45 PID 4864 wrote to memory of 3680 4864 e582381.exe 19 PID 4864 wrote to memory of 3768 4864 e582381.exe 44 PID 4864 wrote to memory of 3896 4864 e582381.exe 43 PID 4864 wrote to memory of 3556 4864 e582381.exe 32 PID 4864 wrote to memory of 2264 4864 e582381.exe 31 PID 4864 wrote to memory of 2896 4864 e582381.exe 25 PID 4864 wrote to memory of 4620 4864 e582381.exe 24 PID 4864 wrote to memory of 1580 4864 e582381.exe 22 PID 4864 wrote to memory of 2436 4864 e582381.exe 86 PID 4864 wrote to memory of 3948 4864 e582381.exe 89 PID 4864 wrote to memory of 2300 4864 e582381.exe 90 PID 4864 wrote to memory of 2300 4864 e582381.exe 90 PID 4864 wrote to memory of 4796 4864 e582381.exe 91 PID 4864 wrote to memory of 4796 4864 e582381.exe 91 PID 4796 wrote to memory of 788 4796 e583f27.exe 83 PID 4796 wrote to memory of 792 4796 e583f27.exe 82 PID 4796 wrote to memory of 336 4796 e583f27.exe 9 PID 4796 wrote to memory of 2448 4796 e583f27.exe 17 PID 4796 wrote to memory of 2468 4796 e583f27.exe 57 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e582381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e583f27.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2448
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3680
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:1580
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.ecca15057a3be4c5e61a99ac58ad9db0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.ecca15057a3be4c5e61a99ac58ad9db0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\e582381.exeC:\Users\Admin\AppData\Local\Temp\e582381.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\e583479.exeC:\Users\Admin\AppData\Local\Temp\e583479.exe3⤵
- Executes dropped EXE
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\e583f27.exeC:\Users\Admin\AppData\Local\Temp\e583f27.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4796
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:4620
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:2896
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2264
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3556
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3896
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3768
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3620
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3292
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1320
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2468
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:792
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2436
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:3948
-
C:\Windows\System32\wuapihost.exeC:\Windows\System32\wuapihost.exe -Embedding1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
97KB
MD5d4ff010163077e08b834a077e57e0e50
SHA14cd7df8ff382f43a4e922e16c8a3e9cae00406b6
SHA256ec072393c71d9f2286b2ac8e070c7a16eacce3efa09543a4135871a7918a199c
SHA5125aa46aa048a3df63bf762bb551247272d0215a4c6dce09fef2a6e30f0582f0ea6ed1273e7a90690695fe100a2e3b11b6394112ae54e75399aeb3ee6e9f55b3b5
-
Filesize
257B
MD548954f3b65598b7d52a1d74f9fe5a659
SHA1a9db1c1d71f881cdd6c751907971a0993f853d3c
SHA2560afdbf6cf215c6ddbe93b07bd6783cf9f39e987c0f0f18ac3fccb93e6aada3c0
SHA51210fcce7d8cdfad5cfcfb0a087fbfba19ba2559c822323bddf5f35f8f32e0b2a29bf32864b2b9a374bd78710570a7f59f47bb70c395b7759f1fa9550efac3aa72