Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
16b76886a277b914372d8ad3da50f511.exe
Resource
win7-20231215-en
General
-
Target
16b76886a277b914372d8ad3da50f511.exe
-
Size
520KB
-
MD5
16b76886a277b914372d8ad3da50f511
-
SHA1
375fd05f0ecfb36884ebf80aa951738e44b9481f
-
SHA256
33001f3175b74bd653f9e2cd2aafeb280820b8778d71f4f859058548f12f4c2f
-
SHA512
43e355dbabd6abef06fe6bf00c140552be70f21f43977b6973730c865c597abd61ce7032eab004ef38fc6e42d0de9a988380e5dbf049583914c3c8d433b151d7
-
SSDEEP
12288:Gy7GJaXTC4IsjkvK1gtvkUTWFnH//ZNm45eO:tXcLKGtsfx1v
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 16b76886a277b914372d8ad3da50f511.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16b76886a277b914372d8ad3da50f511.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 16b76886a277b914372d8ad3da50f511.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 16b76886a277b914372d8ad3da50f511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Java(TM) Platform SE Auto Updater 2.0 = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\tasthost.exe" 16b76886a277b914372d8ad3da50f511.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 16b76886a277b914372d8ad3da50f511.exe -
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{4B5DFDC0-26AA-ECA5-430C-EF0DFFEBCBEF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\tasthost.exe" 16b76886a277b914372d8ad3da50f511.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B5DFDC0-26AA-ECA5-430C-EF0DFFEBCBEF} 16b76886a277b914372d8ad3da50f511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B5DFDC0-26AA-ECA5-430C-EF0DFFEBCBEF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\tasthost.exe" 16b76886a277b914372d8ad3da50f511.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{4B5DFDC0-26AA-ECA5-430C-EF0DFFEBCBEF} 16b76886a277b914372d8ad3da50f511.exe -
resource yara_rule behavioral2/memory/3368-1-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-4-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-7-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-12-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-13-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-14-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-15-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-16-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-17-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-18-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-19-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-20-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-23-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-24-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-26-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-27-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-28-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-30-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-37-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-52-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-57-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-60-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-63-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-65-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-70-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-72-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-78-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-80-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-82-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-84-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-85-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx behavioral2/memory/3368-86-0x00000000029C0000-0x0000000003A4E000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 16b76886a277b914372d8ad3da50f511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 16b76886a277b914372d8ad3da50f511.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform SE Auto Updater 2.0 = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\tasthost.exe" 16b76886a277b914372d8ad3da50f511.exe Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform SE Auto Updater 2.0 = "C:\\Users\\Admin\\AppData\\Roaming\\microsoft\\tasthost.exe" 16b76886a277b914372d8ad3da50f511.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16b76886a277b914372d8ad3da50f511.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\K: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\L: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\O: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\S: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\H: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\I: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\M: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\N: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\R: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\J: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\Q: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\E: 16b76886a277b914372d8ad3da50f511.exe File opened (read-only) \??\P: 16b76886a277b914372d8ad3da50f511.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 16b76886a277b914372d8ad3da50f511.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 900 reg.exe 4112 reg.exe 3740 reg.exe 3152 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: 1 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeCreateTokenPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeAssignPrimaryTokenPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeLockMemoryPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeIncreaseQuotaPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeMachineAccountPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeTcbPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeSecurityPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeTakeOwnershipPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeLoadDriverPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeSystemProfilePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeSystemtimePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeProfSingleProcessPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeIncBasePriorityPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeCreatePagefilePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeCreatePermanentPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeBackupPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeRestorePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeShutdownPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeAuditPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeSystemEnvironmentPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeChangeNotifyPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeRemoteShutdownPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeUndockPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeSyncAgentPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeEnableDelegationPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeManageVolumePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeImpersonatePrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeCreateGlobalPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: 31 3368 16b76886a277b914372d8ad3da50f511.exe Token: 32 3368 16b76886a277b914372d8ad3da50f511.exe Token: 33 3368 16b76886a277b914372d8ad3da50f511.exe Token: 34 3368 16b76886a277b914372d8ad3da50f511.exe Token: 35 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe Token: SeDebugPrivilege 3368 16b76886a277b914372d8ad3da50f511.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe 3368 16b76886a277b914372d8ad3da50f511.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 804 3368 16b76886a277b914372d8ad3da50f511.exe 82 PID 3368 wrote to memory of 812 3368 16b76886a277b914372d8ad3da50f511.exe 81 PID 3368 wrote to memory of 336 3368 16b76886a277b914372d8ad3da50f511.exe 78 PID 3368 wrote to memory of 2572 3368 16b76886a277b914372d8ad3da50f511.exe 50 PID 3368 wrote to memory of 2584 3368 16b76886a277b914372d8ad3da50f511.exe 49 PID 3368 wrote to memory of 2820 3368 16b76886a277b914372d8ad3da50f511.exe 45 PID 3368 wrote to memory of 3520 3368 16b76886a277b914372d8ad3da50f511.exe 39 PID 3368 wrote to memory of 3676 3368 16b76886a277b914372d8ad3da50f511.exe 36 PID 3368 wrote to memory of 3852 3368 16b76886a277b914372d8ad3da50f511.exe 35 PID 3368 wrote to memory of 3944 3368 16b76886a277b914372d8ad3da50f511.exe 34 PID 3368 wrote to memory of 4048 3368 16b76886a277b914372d8ad3da50f511.exe 8 PID 3368 wrote to memory of 1436 3368 16b76886a277b914372d8ad3da50f511.exe 33 PID 3368 wrote to memory of 3540 3368 16b76886a277b914372d8ad3da50f511.exe 32 PID 3368 wrote to memory of 388 3368 16b76886a277b914372d8ad3da50f511.exe 30 PID 3368 wrote to memory of 1412 3368 16b76886a277b914372d8ad3da50f511.exe 20 PID 3368 wrote to memory of 1116 3368 16b76886a277b914372d8ad3da50f511.exe 14 PID 3368 wrote to memory of 2964 3368 16b76886a277b914372d8ad3da50f511.exe 13 PID 3368 wrote to memory of 2740 3368 16b76886a277b914372d8ad3da50f511.exe 12 PID 3368 wrote to memory of 2936 3368 16b76886a277b914372d8ad3da50f511.exe 38 PID 3368 wrote to memory of 1536 3368 16b76886a277b914372d8ad3da50f511.exe 90 PID 3368 wrote to memory of 3004 3368 16b76886a277b914372d8ad3da50f511.exe 109 PID 3368 wrote to memory of 3004 3368 16b76886a277b914372d8ad3da50f511.exe 109 PID 3368 wrote to memory of 3004 3368 16b76886a277b914372d8ad3da50f511.exe 109 PID 3368 wrote to memory of 3648 3368 16b76886a277b914372d8ad3da50f511.exe 98 PID 3368 wrote to memory of 3648 3368 16b76886a277b914372d8ad3da50f511.exe 98 PID 3368 wrote to memory of 3648 3368 16b76886a277b914372d8ad3da50f511.exe 98 PID 3368 wrote to memory of 1952 3368 16b76886a277b914372d8ad3da50f511.exe 108 PID 3368 wrote to memory of 1952 3368 16b76886a277b914372d8ad3da50f511.exe 108 PID 3368 wrote to memory of 1952 3368 16b76886a277b914372d8ad3da50f511.exe 108 PID 3368 wrote to memory of 4076 3368 16b76886a277b914372d8ad3da50f511.exe 106 PID 3368 wrote to memory of 4076 3368 16b76886a277b914372d8ad3da50f511.exe 106 PID 3368 wrote to memory of 4076 3368 16b76886a277b914372d8ad3da50f511.exe 106 PID 3004 wrote to memory of 900 3004 cmd.exe 102 PID 3004 wrote to memory of 900 3004 cmd.exe 102 PID 3004 wrote to memory of 900 3004 cmd.exe 102 PID 4076 wrote to memory of 3740 4076 cmd.exe 104 PID 4076 wrote to memory of 3740 4076 cmd.exe 104 PID 4076 wrote to memory of 3740 4076 cmd.exe 104 PID 3648 wrote to memory of 4112 3648 cmd.exe 103 PID 3648 wrote to memory of 4112 3648 cmd.exe 103 PID 3648 wrote to memory of 4112 3648 cmd.exe 103 PID 3368 wrote to memory of 804 3368 16b76886a277b914372d8ad3da50f511.exe 82 PID 3368 wrote to memory of 812 3368 16b76886a277b914372d8ad3da50f511.exe 81 PID 3368 wrote to memory of 336 3368 16b76886a277b914372d8ad3da50f511.exe 78 PID 3368 wrote to memory of 2572 3368 16b76886a277b914372d8ad3da50f511.exe 50 PID 3368 wrote to memory of 2584 3368 16b76886a277b914372d8ad3da50f511.exe 49 PID 3368 wrote to memory of 2820 3368 16b76886a277b914372d8ad3da50f511.exe 45 PID 3368 wrote to memory of 3520 3368 16b76886a277b914372d8ad3da50f511.exe 39 PID 3368 wrote to memory of 3676 3368 16b76886a277b914372d8ad3da50f511.exe 36 PID 3368 wrote to memory of 3852 3368 16b76886a277b914372d8ad3da50f511.exe 35 PID 3368 wrote to memory of 3944 3368 16b76886a277b914372d8ad3da50f511.exe 34 PID 3368 wrote to memory of 4048 3368 16b76886a277b914372d8ad3da50f511.exe 8 PID 3368 wrote to memory of 1436 3368 16b76886a277b914372d8ad3da50f511.exe 33 PID 3368 wrote to memory of 3540 3368 16b76886a277b914372d8ad3da50f511.exe 32 PID 3368 wrote to memory of 388 3368 16b76886a277b914372d8ad3da50f511.exe 30 PID 3368 wrote to memory of 1412 3368 16b76886a277b914372d8ad3da50f511.exe 20 PID 3368 wrote to memory of 1116 3368 16b76886a277b914372d8ad3da50f511.exe 14 PID 3368 wrote to memory of 2964 3368 16b76886a277b914372d8ad3da50f511.exe 13 PID 3368 wrote to memory of 2740 3368 16b76886a277b914372d8ad3da50f511.exe 12 PID 3368 wrote to memory of 1536 3368 16b76886a277b914372d8ad3da50f511.exe 90 PID 3368 wrote to memory of 3256 3368 16b76886a277b914372d8ad3da50f511.exe 96 PID 3368 wrote to memory of 3004 3368 16b76886a277b914372d8ad3da50f511.exe 109 PID 1952 wrote to memory of 3152 1952 cmd.exe 105 PID 1952 wrote to memory of 3152 1952 cmd.exe 105 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 16b76886a277b914372d8ad3da50f511.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4048
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2740
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:2964
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:1116
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1412
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:388
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3540
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1436
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3944
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe"C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Modifies Installed Components in the registry
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3368 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4564
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\16b76886a277b914372d8ad3da50f511.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies registry key
PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\microsoft\tasthost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\microsoft\tasthost.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4076
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1952
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3004
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2936
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2584
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2572
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:336
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:812
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1536
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3772
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
PID:900
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\microsoft\tasthost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\microsoft\tasthost.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies registry key
PID:3740
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies registry key
PID:3152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD58f0d45c98d85082a32c5f5f3de357e22
SHA17e386c4b9f0e59fa0e7cb1943d304d8d2e0250f7
SHA256da65a0b8b1646b5f5d72f8a207b980c4d49ea43406c933d341aaa7f7f17f03de
SHA512c1b116591b86de9e75ef5b4786cfc0f1b562ef658fcb9ec9824c8d0d051d2ca42ef78e5a900d45cec158b48ee5f46c8136892c26d6a21a95ca25fa1b1a57966e
-
Filesize
43KB
MD51cfaf94a69e91fc7476f6b452b540483
SHA102f58952ce5a7d387e5d896c998ba34ed3a9763a
SHA25686623b2824cc8df0ff9c14948d1147704dc3621809b4942d51b1f6c5b1ce5e2a
SHA5123a3988b7dc81cc898b60b5364d88343a3b88d0a9326390291ae96434509c5ef71595cdb2cc48adb1cb92bb5299f27536a2e335731c1cae55f3be87ff0993ddef